Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wce.exe

Overview

General Information

Sample name:wce.exe
Analysis ID:1581372
MD5:4fb08ad6583c2d44a098e325699789cb
SHA1:76af4d288f66b71f7cd275d4e71d6010ac0feeea
SHA256:5884f3fc15c710fb754f31c368acaf37582ab1d63125233fd3cb91d50a9098af
Tags:exeuser-windshock
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Allocates memory in foreign processes
Contains functionality to inject threads in other processes
Installs new ROOT certificates
Machine Learning detection for sample
Sigma detected: Cred Dump Tools Dropped Files
Writes to foreign memory regions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • wce.exe (PID: 5304 cmdline: "C:\Users\user\Desktop\wce.exe" MD5: 4FB08AD6583C2D44A098E325699789CB)
    • conhost.exe (PID: 1720 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • lsass.exe (PID: 640 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
      • svchost.exe (PID: 2440 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
wce.exeiam_alt_iam_altAuto-generated rule - file iam-alt.exeFlorian Roth
  • 0x1de24:$s4: Error in cmdline!. Bye!.
  • 0x1e054:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1e150:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1e3b0:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1f47c:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1dfd4:$s6: nthash is too long!.
SourceRuleDescriptionAuthorStrings
0.2.wce.exe.160000.0.unpackiam_alt_iam_altAuto-generated rule - file iam-alt.exeFlorian Roth
  • 0x1de24:$s4: Error in cmdline!. Bye!.
  • 0x1e054:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1e150:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1e3b0:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1f47c:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1dfd4:$s6: nthash is too long!.
0.0.wce.exe.160000.0.unpackiam_alt_iam_altAuto-generated rule - file iam-alt.exeFlorian Roth
  • 0x1de24:$s4: Error in cmdline!. Bye!.
  • 0x1e054:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1e150:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1e3b0:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1f47c:$s5: Error: Cannot open LSASS.EXE!.
  • 0x1dfd4:$s6: nthash is too long!.

System Summary

barindex
Source: File createdAuthor: Teymur Kheirkhabarov, oscd.community: Data: EventID: 11, Image: C:\Users\user\Desktop\wce.exe, ProcessId: 5304, TargetFilename: C:\Users\user\AppData\Local\Temp\wceaux.dll
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc, CommandLine: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\system32\lsass.exe, ParentImage: C:\Windows\System32\lsass.exe, ParentProcessId: 640, ParentProcessName: lsass.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc, ProcessId: 2440, ProcessName: svchost.exe
Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\lsass.exe, CommandLine: C:\Windows\system32\lsass.exe, CommandLine|base64offset|contains: , Image: C:\Windows\System32\lsass.exe, NewProcessName: C:\Windows\System32\lsass.exe, OriginalFileName: C:\Windows\System32\lsass.exe, ParentCommandLine: "C:\Users\user\Desktop\wce.exe", ParentImage: C:\Users\user\Desktop\wce.exe, ParentProcessId: 5304, ParentProcessName: wce.exe, ProcessCommandLine: C:\Windows\system32\lsass.exe, ProcessId: 640, ProcessName: lsass.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: wce.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\wceaux.dllAvira: detection malicious, Label: HEUR/AGEN.1302736
Source: C:\Users\user\AppData\Local\Temp\wceaux.dllReversingLabs: Detection: 57%
Source: wce.exeReversingLabs: Detection: 89%
Source: wce.exeVirustotal: Detection: 85%Perma Link
Source: wce.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00165610 CreateFileA,CryptAcquireContextA,CloseHandle,CryptCreateHash,CloseHandle,CryptReleaseContext,ReadFile,CryptHashData,_wprintf,CryptDestroyHash,CryptReleaseContext,CloseHandle,CloseHandle,CryptGetHashParam,_wprintf,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,_wprintf,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,0_2_00165610
Source: wce.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: wce.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264841677.00000140AE074000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://3csp.icrosof4m/ocp0
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021397989.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264745983.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264766452.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021439393.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
Source: lsass.exe, 00000002.00000002.3265108043.00000140AE200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
Source: lsass.exe, 00000002.00000000.2021158842.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2223243490.00000140AD8C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264964918.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
Source: svchost.exe, 00000005.00000000.2234678531.000001428A88A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267309116.000001428A88A000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021397989.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264745983.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
Source: lsass.exe, 00000002.00000002.3265108043.00000140AE200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264766452.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021439393.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
Source: lsass.exe, 00000002.00000000.2021158842.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2223243490.00000140AD8C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264964918.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264766452.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021439393.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
Source: lsass.exe, 00000002.00000000.2021158842.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2223243490.00000140AD8C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264964918.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
Source: svchost.exe, 00000005.00000002.3267282147.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267681087.000001428B11B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
Source: lsass.exe, 00000002.00000000.2021158842.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264526846.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: lsass.exe, 00000002.00000000.2021158842.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264526846.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234563646.000001428A82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267107761.000001428A82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267725027.000001428B136000.00000004.00000001.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: svchost.exe, 00000005.00000002.3267131527.000001428A840000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab/D
Source: svchost.exe, 00000005.00000002.3267337195.000001428A8B1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?7bafc37f94505
Source: svchost.exe, 00000005.00000002.3267131527.000001428A840000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabe.com3D
Source: svchost.exe, 00000005.00000002.3267051978.000001428A813000.00000004.00000001.00020000.00000000.sdmp, 57C8EDB95DF3F0AD4EE2DC2B8CFD4157.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab
Source: svchost.exe, 00000005.00000000.2234583375.000001428A840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267282147.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267681087.000001428B11B000.00000004.00000001.00020000.00000000.sdmp, FB0D848F74F70BB2EAA93746D24D97490.5.dr, FB0D848F74F70BB2EAA93746D24D97491.5.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab
Source: svchost.exe, 00000005.00000000.2234649304.000001428A879000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab$
Source: svchost.exe, 00000005.00000002.3267681087.000001428B11B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/pinrulesstl.cab?62d1aa58da7f7
Source: lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
Source: lsass.exe, 00000002.00000000.2021099209.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264462364.00000140AD850000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
Source: lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
Source: svchost.exe, 00000005.00000000.2234583375.000001428A840000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234563646.000001428A82B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234812689.000001428A8FD000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234798148.000001428A8FB000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234649304.000001428A879000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234544775.000001428A813000.00000004.00000001.00020000.00000000.sdmp, 80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868.5.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A0.5.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB6151870.5.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.5.dr, E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB040.5.drString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uN
Source: svchost.exe, 00000005.00000000.2234701922.000001428A8B1000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3265108043.00000140AE200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021158842.00000140AD88B000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021397989.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264766452.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021439393.00000140AE05A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264745983.00000140AE000000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2223243490.00000140AD8C0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264964918.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
Source: lsass.exe, 00000002.00000002.3264942103.00000140AE19A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000003.2624869775.00000140AE172000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
Source: lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
Source: lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
Source: lsass.exe, 00000002.00000000.2021099209.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264462364.00000140AD850000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
Source: lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
Source: lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
Source: lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
Source: lsass.exe, 00000002.00000002.3264964918.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021582398.00000140AE151000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264964918.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1B3000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021678638.00000140AE1AB000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64AJump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04Jump to dropped file
Source: C:\Windows\System32\svchost.exeFile created: C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187Jump to dropped file

System Summary

barindex
Source: wce.exe, type: SAMPLEMatched rule: Auto-generated rule - file iam-alt.exe Author: Florian Roth
Source: 0.2.wce.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Auto-generated rule - file iam-alt.exe Author: Florian Roth
Source: 0.0.wce.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Auto-generated rule - file iam-alt.exe Author: Florian Roth
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_001674B0 OpenSCManagerA,OpenServiceA,QueryServiceStatus,DeleteService,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_001674B0
Source: C:\Windows\System32\svchost.exeFile deleted: C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Jump to behavior
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0017AC810_2_0017AC81
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00178D250_2_00178D25
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_001792760_2_00179276
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016C6BF0_2_0016C6BF
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00179EA30_2_00179EA3
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016C2D70_2_0016C2D7
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016B6D20_2_0016B6D2
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016BF050_2_0016BF05
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016BB670_2_0016BB67
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_001797C70_2_001797C7
Source: C:\Users\user\Desktop\wce.exeCode function: String function: 0016A932 appears 281 times
Source: C:\Users\user\Desktop\wce.exeCode function: String function: 0016F690 appears 35 times
Source: wce.exeStatic PE information: Resource name: BINARY type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Source: wce.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: wce.exe, type: SAMPLEMatched rule: iam_alt_iam_alt date = 2015-07-10, author = Florian Roth, description = Auto-generated rule - file iam-alt.exe, score = 2ea662ef58142d9e340553ce50d95c1b7a405672acdfd476403a565bdd0cfb90, reference = http://www.coresecurity.com/corelabs-research/open-source-tools/pass-hash-toolkit, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.2.wce.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: iam_alt_iam_alt date = 2015-07-10, author = Florian Roth, description = Auto-generated rule - file iam-alt.exe, score = 2ea662ef58142d9e340553ce50d95c1b7a405672acdfd476403a565bdd0cfb90, reference = http://www.coresecurity.com/corelabs-research/open-source-tools/pass-hash-toolkit, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 0.0.wce.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: iam_alt_iam_alt date = 2015-07-10, author = Florian Roth, description = Auto-generated rule - file iam-alt.exe, score = 2ea662ef58142d9e340553ce50d95c1b7a405672acdfd476403a565bdd0cfb90, reference = http://www.coresecurity.com/corelabs-research/open-source-tools/pass-hash-toolkit, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: classification engineClassification label: mal100.evad.winEXE@2/16@0/0
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_001647A0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,0_2_001647A0
Source: C:\Users\user\Desktop\wce.exeCode function: OpenSCManagerA,CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,0_2_00167410
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00163E30 _memset,__snprintf,CreateToolhelp32Snapshot,Process32First,CloseHandle,_memset,__snprintf,CloseHandle,Process32Next,CloseHandle,0_2_00163E30
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00164DC0 FindResourceA,LoadResource,CloseHandle,LockResource,CloseHandle,CloseHandle,SizeofResource,CreateFileA,CloseHandle,CloseHandle,CreateFileMappingA,CloseHandle,CloseHandle,CloseHandle,DeleteFileA,MapViewOfFile,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteFileA,_memmove,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,0_2_00164DC0
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00167890 StartServiceCtrlDispatcherA,0_2_00167890
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00167890 StartServiceCtrlDispatcherA,0_2_00167890
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1720:120:WilError_03
Source: C:\Users\user\Desktop\wce.exeFile created: C:\Users\user\AppData\Local\Temp\wceaux.dllJump to behavior
Source: wce.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\wce.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: wce.exeReversingLabs: Detection: 89%
Source: wce.exeVirustotal: Detection: 85%
Source: unknownProcess created: C:\Users\user\Desktop\wce.exe "C:\Users\user\Desktop\wce.exe"
Source: C:\Users\user\Desktop\wce.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\wce.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\wce.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\wce.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: wce.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: wce.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: wce.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: wce.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: wce.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: wce.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00163FA0 OpenProcess,_wprintf,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,_memset,_strncpy,_memset,_strncpy,VirtualAllocEx,_wprintf,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,CloseHandle,VirtualAllocEx,_wprintf,VirtualFreeEx,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,GetVersionExA,CreateRemoteThread,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,WaitForSingleObject,ReadProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,CloseHandle,VirtualFreeEx,VirtualFreeEx,CloseHandle,0_2_00163FA0
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016F6D5 push ecx; ret 0_2_0016F6E8

Persistence and Installation Behavior

barindex
Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Windows\System32\lsass.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\wce.exeFile created: C:\Users\user\AppData\Local\Temp\wceaux.dllJump to dropped file
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00167890 StartServiceCtrlDispatcherA,0_2_00167890
Source: C:\Windows\System32\lsass.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\wce.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wceaux.dllJump to dropped file
Source: C:\Users\user\Desktop\wce.exeEvaded block: after key decisiongraph_0-12346
Source: C:\Users\user\Desktop\wce.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-12479
Source: C:\Users\user\Desktop\wce.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-13599
Source: C:\Windows\System32\svchost.exe TID: 2648Thread sleep time: -90000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\svchost.exeThread delayed: delay time: 30000Jump to behavior
Source: lsass.exe, 00000002.00000002.3264526846.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
Source: svchost.exe, 00000005.00000002.3267309116.000001428A88A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: "@Hyper-V RAW%\system32\NgcRecovery.dll,-100
Source: lsass.exe, 00000002.00000002.3264526846.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
Source: svchost.exe, 00000005.00000002.3267725027.000001428B136000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: svchost.exe, 00000005.00000002.3267337195.000001428A8D6000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@q
Source: lsass.exe, 00000002.00000002.3264526846.00000140AD88B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
Source: lsass.exe, 00000002.00000002.3264414539.00000140AD813000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021052605.00000140AD813000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000000.2234737793.000001428A8D9000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\wce.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016F478 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0016F478
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00163FA0 OpenProcess,_wprintf,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,_memset,_strncpy,_memset,_strncpy,VirtualAllocEx,_wprintf,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,CloseHandle,VirtualAllocEx,_wprintf,VirtualFreeEx,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,GetVersionExA,CreateRemoteThread,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,WaitForSingleObject,ReadProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,CloseHandle,VirtualFreeEx,VirtualFreeEx,CloseHandle,0_2_00163FA0
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0017878B __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_0017878B
Source: C:\Users\user\Desktop\wce.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016F478 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0016F478
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00174E08 SetUnhandledExceptionFilter,0_2_00174E08
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_0016AB1A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0016AB1A

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\wce.exeMemory allocated: C:\Windows\System32\lsass.exe base: 730000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\wce.exeMemory allocated: C:\Windows\System32\lsass.exe base: 740000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00163FA0 OpenProcess,_wprintf,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,_memset,_strncpy,_memset,_strncpy,VirtualAllocEx,_wprintf,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,CloseHandle,VirtualAllocEx,_wprintf,VirtualFreeEx,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,WriteProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,GetVersionExA,CreateRemoteThread,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,WaitForSingleObject,ReadProcessMemory,_wprintf,VirtualFreeEx,VirtualFreeEx,CloseHandle,CloseHandle,VirtualFreeEx,VirtualFreeEx,CloseHandle,0_2_00163FA0
Source: C:\Users\user\Desktop\wce.exeMemory written: C:\Windows\System32\lsass.exe base: 730000Jump to behavior
Source: C:\Users\user\Desktop\wce.exeMemory written: C:\Windows\System32\lsass.exe base: 740000Jump to behavior
Source: C:\Users\user\Desktop\wce.exeMemory written: C:\Windows\System32\lsass.exe base: 740818Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCA0000Jump to behavior
Source: C:\Windows\System32\lsass.exeMemory written: C:\Windows\System32\svchost.exe base: 1428DCD0000Jump to behavior
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_001683F0 CreateNamedPipeA,_wprintf,ConnectNamedPipe,GetLastError,_wprintf,FlushFileBuffers,DisconnectNamedPipe,0_2_001683F0
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00175329 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00175329
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_00173C69 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,__malloc_crt,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_00173C69
Source: C:\Users\user\Desktop\wce.exeCode function: 0_2_001634D0 GetCurrentProcessId,ProcessIdToSessionId,ProcessIdToSessionId,_memset,GetVersionExA,0_2_001634D0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
Service Execution
14
Windows Service
1
Access Token Manipulation
1
Modify Registry
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts4
Native API
1
DLL Side-Loading
14
Windows Service
11
Virtualization/Sandbox Evasion
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)32
Process Injection
1
Access Token Manipulation
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
32
Process Injection
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Deobfuscate/Decode Files or Information
LSA Secrets3
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Install Root Certificate
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
File Deletion
/etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
wce.exe89%ReversingLabsWin32.Hacktool.WinCredEd
wce.exe86%VirustotalBrowse
wce.exe100%AviraTR/Gendal.6210125.5
wce.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\wceaux.dll100%AviraHEUR/AGEN.1302736
C:\Users\user\AppData\Local\Temp\wceaux.dll58%ReversingLabsWin32.Hacktool.WinCred
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://3csp.icrosof4m/ocp00%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
217.20.58.98
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://crl.ver)svchost.exe, 00000005.00000000.2234678531.000001428A88A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3267309116.000001428A88A000.00000004.00000001.00020000.00000000.sdmpfalse
        high
        http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000002.00000000.2021099209.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264462364.00000140AD850000.00000004.00000001.00020000.00000000.sdmpfalse
          high
          http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
              high
              http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000002.00000000.2021099209.00000140AD850000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264462364.00000140AD850000.00000004.00000001.00020000.00000000.sdmpfalse
                high
                http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                  high
                  http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                    high
                    http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000002.00000000.2021072712.00000140AD82F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        http://3csp.icrosof4m/ocp0lsass.exe, 00000002.00000000.2021518451.00000140AE074000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000002.00000002.3264841677.00000140AE074000.00000004.00000001.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/wsdl/lsass.exe, 00000002.00000002.3264438690.00000140AD82F000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          No contacted IP infos
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1581372
                          Start date and time:2024-12-27 14:13:10 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 33s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:2
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:wce.exe
                          Detection:MAL
                          Classification:mal100.evad.winEXE@2/16@0/0
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 100%
                          • Number of executed functions: 14
                          • Number of non-executed functions: 78
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded IPs from analysis (whitelisted): 217.20.58.98, 192.229.221.95, 20.109.210.53, 13.107.246.63
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                          • Not all processes where analyzed, report is missing behavior information
                          TimeTypeDescription
                          08:14:24API Interceptor6x Sleep call for process: svchost.exe modified
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          fp2e7a.wpc.phicdn.netatw3.dllGet hashmaliciousGozi, UrsnifBrowse
                          • 192.229.221.95
                          setup.msiGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          ERTL09tA59.exeGet hashmaliciousLummaCBrowse
                          • 192.229.221.95
                          vJPhYDClT5.exeGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          V2s8yjvIJw.exeGet hashmaliciousIris StealerBrowse
                          • 192.229.221.95
                          k6olCJyvIj.exeGet hashmaliciousLummaCBrowse
                          • 192.229.221.95
                          G6xnfES308.exeGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          XM6cn2uNux.exeGet hashmaliciousLummaCBrowse
                          • 192.229.221.95
                          bG89JAQXz2.exeGet hashmaliciousLummaCBrowse
                          • 192.229.221.95
                          q8b3OisMC4.dllGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comnXNMsYXFFc.exeGet hashmaliciousUnknownBrowse
                          • 217.20.58.100
                          5RaYXoKFn9.exeGet hashmaliciousPureCrypter, PureLog StealerBrowse
                          • 217.20.58.98
                          msgde.exeGet hashmaliciousQuasarBrowse
                          • 217.20.58.99
                          atw3.dllGet hashmaliciousGozi, UrsnifBrowse
                          • 217.20.58.100
                          WRD1792.docx.docGet hashmaliciousDynamerBrowse
                          • 217.20.58.99
                          GtEVo1eO2p.exeGet hashmaliciousLummaCBrowse
                          • 217.20.58.98
                          0442.pdf.exeGet hashmaliciousUnknownBrowse
                          • 217.20.58.100
                          #U5b89#U88c5#U7a0b#U5e8f_1.1.0.exeGet hashmaliciousUnknownBrowse
                          • 217.20.58.100
                          wUSt04rfJ0.exeGet hashmaliciousQuasarBrowse
                          • 217.20.58.101
                          #U5b89#U88c5#U52a9#U624b1.0.2.exeGet hashmaliciousUnknownBrowse
                          • 217.20.58.99
                          No context
                          No context
                          No context
                          Process:C:\Windows\System32\svchost.exe
                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                          Category:dropped
                          Size (bytes):71954
                          Entropy (8bit):7.996617769952133
                          Encrypted:true
                          SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                          MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                          SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                          SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                          SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):471
                          Entropy (8bit):7.156295391825961
                          Encrypted:false
                          SSDEEP:12:JuGnPXPG5qPGy+PXs9fZoQYvrlz1dB+rXs9378Tb:JZXPGINKXeoQARvAs94Tb
                          MD5:ACD61F639CCB415A09197FE086D2873C
                          SHA1:49049A623FEC36623BA104F8787E2EBC2879FB8D
                          SHA-256:549A945A63FA842CC86ABE6C5802705C583C58E53BA9D40B53885B6FEAAA9D9B
                          SHA-512:F5679C06958CAD73E60EBBF441F2729EF5B20BEB856312EE67FB4C3A560B9984AA5D98F203A343C61281A1E32796F55CEF11870FFD6210C1E887C042225F741B
                          Malicious:false
                          Reputation:low
                          Preview:0..........0.....+.....0......0...0......N"T ....n..........9..20241226190220Z0s0q0I0...+........9.q...._..(.#..Y\C...N"T ....n..........9....n.U_$t...]......20241226190220Z....20250102190220Z0...*.H...............4..QSvr,.hL.<.nZ..1.'{.N.(.f:...1"..F=.....`..(.QS..K.Y<..CT..:~z......[F...V.?.M.=..9...7.....J...0b.6z.[....I.....4;.L...d....i!._..A.uP..b.....r.BSA.....Ii..]90....p3.0!........Bpg7.mX..|..(....u..9...../m{....l..g=..`..uH..rtc.[.......
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):471
                          Entropy (8bit):7.268468978894918
                          Encrypted:false
                          SSDEEP:12:JuGe25qPGu0M09f4xVbK1ACOrnq87T92VmK0sRO33Zb:J/IKcxVb0ACO7q8760JF
                          MD5:5B893B223421743BCC9F6ECEF25EC015
                          SHA1:036F17B237CB2FDEA6B221FD5DE9E599AE8FEEE9
                          SHA-256:CDD88E3893A7CBF989C868D097A234D987E9302F7DBE67EE0647154DD80705E1
                          SHA-512:0DA7B6BEEC2D8C4251FF1DE5662D5B66C043E9AF20CC06FA4EFD7F7464E50CEB7A9B982DA23648245B6790DEF833A190747FE9A904442BD0F06D20FB9B06BFD6
                          Malicious:false
                          Reputation:low
                          Preview:0..........0.....+.....0......0...0......N"T ....n..........9..20241225190147Z0s0q0I0...+........9.q...._..(.#..Y\C...N"T ....n..........9....e&D.^=.8t.]......20241225190147Z....20250101190147Z0...*.H..............p.S.B}n.......}{4.....3.....Asv...2.~.8...P.:...d^.>f0.i..._3...*RHuB...]..:...Y=....w.>Z....;K..i.,....F..W......M..........o!...&....wg.X..I.....T.r.._..\.... ....Q..2...GaU.$.=X....Ld.........a.?.......O...I..)D...Bq.KY.........`....?
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):471
                          Entropy (8bit):7.243589743174413
                          Encrypted:false
                          SSDEEP:12:JuGnPY5qPGJpiPY67N0RVpqWN95Eqc8TylXbn:JZYIAuv7WjNjWlLn
                          MD5:A4B8E9C05A62131AAEA2E28B49AFEE69
                          SHA1:01D1B9B45300C75F644F80FA7D07B45A36C2C8C2
                          SHA-256:AAABDEE16F3D16840257D1DBFFB70E4C28B0E78DE1CFD6EF7992E8383A901408
                          SHA-512:45ED79A6C603792412A7DC6EE444A61AA2659D6E387976E90EB96354CE0A714CE57D542CEFD5947AAE322D500B7A0F50661EB7B94FB3925F1735AE0510643E33
                          Malicious:false
                          Reputation:low
                          Preview:0..........0.....+.....0......0...0......N"T ....n..........9..20241226190253Z0s0q0I0...+........9.q...._..(.#..Y\C...N"T ....n..........9...C.P..5/..y.r..P....20241226190253Z....20250102190253Z0...*.H.............G.Dv...Ya..)vT.=i..h.$....js...cg....$.^..(w....\.p..!F.I.-..m}|B.cn....t..s.....9.s&....D*..5...=t]...^...0>..h".M. .}...0...Jx.~..N.s.g7..C%w....}.R.F%dV...........m(.q.&.d.-.a.].u{..oN.+jE.'....nMf...........O.z..|+$.@....d..p..........o.a..m._.
                          Process:C:\Windows\System32\svchost.exe
                          File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 7796 bytes, 1 file, at 0x2c +A "pinrules.stl", number 1, 1 datablock, 0x1 compression
                          Category:dropped
                          Size (bytes):7796
                          Entropy (8bit):7.971943145771426
                          Encrypted:false
                          SSDEEP:192:CPTIWKvNnUBBBL05O/b0evl2G6AXK+KMlYX82:CbevNUBDLlz0eN2dAXlKH
                          MD5:FB60E1AFE48764E6BF78719C07813D32
                          SHA1:A1DC74EF8495C9A1489DD937659B5C2875027E16
                          SHA-256:EBF3E7290B8FD1E5509CAA69335251F22B61BAF3F9FF87B4E8544F3C1FEA279D
                          SHA-512:92BAA53445EC1A6EC049AF875783619D255AB4A46241B456BD87AE0043C117740BD117406E2CF5440840C68D0C573CBA7B40F58587CE7796D254D0B06E9B7973
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:MSCF....t.......,...................I........E.........J.R .pinrules.stl..>N.#..ECK.[.T...O......l.$.)V.a...v.d.H...&.D.YA,(+Y...A.......c]."ka-.XW..I.....w..|..9.........{...|d..v.T..w.TMZ.|...).F.rtAm.....f......T.*.......n.z.:.t&.} EH.S.)2...SP.../~.Q..d..".@.5..r(..M.Zs..~{...>...p.p.^....[/p..~.....@......f..E0....9.i...Ds..^.d...N.R@..P%..9... .4Z)...z..h...@.......C<.]6....([.c=.9..l.....@..4......f.......z.!..0.`Jp.."$I..?`......H...].2...$....9v1./g.&.aIX.A..A.w*..p.*.`r.........'!e.. ..d...H.d.hu`.\!w.Z..E.$....$..|1..@.OC!c.......%.....p.uxC.~@....`...#.~ .P.!.Gb`)i...L..0.-.K.....xRx.e"..@.....5T..JP^.9.....#aH.E.@2..H..f.H..K...+x..$.WM..H}....=....`.PD:.qgn........I.....]uX..q...D...]n.4..0..b!.....m"a.Lz...d..S%P.I11,..^..".+At..To\@K.....c.h.C.....=...H.Xa...r.A.I..@!..0..eV...|.h..$."r..hL9TR..}.v%...4).H..[.....r..|]..+5..Y..I..hN...O=u..8.}U...#S...R..KQ..A..w....X|.....8b...GC.4..h....6gG.>..}.8....!ql..A..1..X.C.q.j....
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):328
                          Entropy (8bit):3.2218938275801796
                          Encrypted:false
                          SSDEEP:6:kKWsK81F9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:U0sDnLNkPlE99SNxAhUe/3
                          MD5:292DA2B0E9743162BB6229FDC919A459
                          SHA1:4B5DD24FABC462A09B81E1D8BE6F88D5EBB766DC
                          SHA-256:3A617DA4E6F2CD49B6F905F6EFB32691D72C5F59CA8912F8694E41BA1402F392
                          SHA-512:2B9B4670DA287760EA0C87F1D4506697D693C45AABA4D445805BCD7533FF58D211C0FC2083ADE194E993699B0B886EE25121F4BD8DF93D6D14E21D654DE37B13
                          Malicious:false
                          Preview:p...... ........S#..aX..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):412
                          Entropy (8bit):3.6711660697208983
                          Encrypted:false
                          SSDEEP:6:kK9tG4+EszyfXlRNfOAUMivhClroFFKIhipStaHAaloq09Slscqsn:ldIsmxMiv8sFFKbpgal7BlSs
                          MD5:05D3BCEC9F9E8F6362E25CE470A2619F
                          SHA1:9C7222CCFDEC895B6680F86A305A47C3FCC8916A
                          SHA-256:488A97B1CAA0A193EEA0B41A53115D683C8EF54C20DD9CBC02ECD9CF36D6EEAC
                          SHA-512:BC858A98FC5E034948A30F18B20B849425C256B81DF8BB47CCECFC30F02C3CE01A8BB6BE06AD7A69F54E9C57EA8A0B5B4012817898FD6D9DA36047C7AE6EC70E
                          Malicious:false
                          Preview:p...... ....(....D.@aX..(.................................................*.H].. ........d.(UX.. ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.n.5.b.s.K.V.V.V.8.k.d.J.6.v.H.l.3.O.1.J.0.%.3.D...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):412
                          Entropy (8bit):3.6754677651963403
                          Encrypted:false
                          SSDEEP:6:kKk5U+agk3skHXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsQ30P7v+eWAkrn:phvmxMiv8sFFKbpgal7BlD30PLRWAkr
                          MD5:223853D9FD05BC97744DC4312E42BC9B
                          SHA1:EAB15A0CD97FE2E970051D73CAD56D5C7007F112
                          SHA-256:5FE6C75520B93ED95E29F4537BD33144A26BF74C2BAB36E9822FEEE7FB1F6BCB
                          SHA-512:89C0B5CC949838777A9D4F80E3DD80AEE1D20319266B1D10AA211A85DAA8A35F69266054D35358578EC9D0F22B92B6B2EFF81FA76CBC76E8920A1F6B11544E81
                          Malicious:false
                          Preview:p...... ....(...B.KdaX..(....................................................\.. .........7.UX.. ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.U.Z.Z.S.Z.E.m.l.4.9.G.j.h.0.j.1.3.P.6.8.w.%.3.D...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):412
                          Entropy (8bit):3.672744077231722
                          Encrypted:false
                          SSDEEP:6:kKaV3sXvHXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsbhQ6Shlrn:83svhmxMiv8sFFKbpgal7BlwhZg
                          MD5:584EC63471BF09709C5D364D1E08ED0E
                          SHA1:C5CB1B10DFF8A8140977FCD1D4027666E0C26FAD
                          SHA-256:68F295B708E05176DF629122D3D334911B5EE0C9A30342918A717E9192807F08
                          SHA-512:0D9C85BB9621A0927EA2BEDD5D0A19D1124598F5F3C25CD0D16394CBD631F2CD3946889C32CF98482F740528B154CCAE8E86824EBD08E1EF7A554595A6395195
                          Malicious:false
                          Preview:p...... ....(....*9RaX..(................................................l..H].. ........@|~XX.. ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.p.D.q.V.C.b.A.T.U.v.i.Z.V.5.7.H.I.I.u.l.A.%.3.D...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):330
                          Entropy (8bit):3.2174781523358154
                          Encrypted:false
                          SSDEEP:6:kK0K81wNScN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:L0VkPlE99Si1QyIeek
                          MD5:AA3BEB54E9D4932BC592FBA6C29B979D
                          SHA1:85BC56F8052AE16006864FF064246B76E76C8970
                          SHA-256:11B5AD4689AB8DC7EA48E2C34CCAAC6BBCBA5C3A7E216FEBA5F277944B30B72F
                          SHA-512:B1BFC98E571DACF867DB7388FC97DF0D30C2C93736AF200536166F7FF627635B86F5D6D304ED41A11CAFB6501586F091663C063E2820D8B1D82814AD42957090
                          Malicious:false
                          Preview:p...... .........S)waX..(....................................................... ........B@!........(...........t...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.p.i.n.r.u.l.e.s.s.t.l...c.a.b...".8.0.4.2.4.0.2.1.c.7.d.b.d.2.1.:.0."...
                          Process:C:\Users\user\Desktop\wce.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):53248
                          Entropy (8bit):6.155087357851567
                          Encrypted:false
                          SSDEEP:768:TJUftYR1gkq7cbwcLrqFtAjlHTbLnXSiJUJchhvPkfmnhEDyURR2K0:GftYhq7Ew2qM9Tv/hvPjrFF
                          MD5:8B5D6BA099F8D2C44DB68B7FD47687C7
                          SHA1:C18BCCEB050BDB4E634B2441876D1BC0BABC6176
                          SHA-256:64725AFDC6209DB9A5639AE4EC6004BA40FB6EC80F8F1CA5A4759FB414DA8BA6
                          SHA-512:F08C14A216DE18FC203BECC7D260DE92A6DD6B9AD15352FA053C29B6C7B555E19A70FF76F264CC11B6D3233C3ACC6562124A66C4ED8016AD485EA7FAB379EE91
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          • Antivirus: ReversingLabs, Detection: 58%
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x.bM<O..<O..<O..S9..*O..S9..2O..57..9O..<O..pO..S9..kO..S9..=O..S9..=O..Rich<O..........PE..L......M...........!.........^......E6....................................................@....................................<...............................|.......................................@............................................text............................... ..`.rdata...#.......$..................@..@.data...l,..........................@....reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):338
                          Entropy (8bit):3.961493788271842
                          Encrypted:false
                          SSDEEP:6:kKi37S7e2cYJFN+SkQlPlEGYRMY9z+s3Ql2DUevat:uS7yzkPlE99SCQl2DUevat
                          MD5:8223DC28F1887BE62EC96D6ACC6FDD9A
                          SHA1:D2DA1391454E9B390D4E8E936098B0BE6D42CCC6
                          SHA-256:C28BEAD58A3F615C97C852870F128B169BF113D48239786474CDD39420C53101
                          SHA-512:3BC7341A0386F85CB8ABD18D684FE5E092855CC8FB2809B875AB04CC46D7D05BB3624A33AA53D6B26835F64C6113074656CDBEC5972F78B88FDDA8942458CC68
                          Malicious:false
                          Preview:p...... ........+.].....(...............S..>aX..Sn.[.X..S....X..........Sn.[.X.. .........p.........$...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.d.i.s.a.l.l.o.w.e.d.c.e.r.t.s.t.l...c.a.b...".7.4.6.7.8.7.a.3.f.0.d.9.1.:.0."...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):412
                          Entropy (8bit):3.9533807210408023
                          Encrypted:false
                          SSDEEP:6:kKftrO8sYe8kt2alXlRNfOAUMivhClroFFKIhipStaHAaloq09Sls8hW0XSW83n:Q1zmxMiv8sFFKbpgal7BlvTCN3
                          MD5:403FD57E5937F72267433567648E2A90
                          SHA1:FBB1A62A4D119F0510165726A98CBFA34E1762F2
                          SHA-256:A8F5ED766619476DA171E502C1460314F0B09084DAD854AA01113F89436A849A
                          SHA-512:A364021E0ABB42BF8C187284D8052910D446ADCC4BA2B2ABCF3B9FE0AA94708D68E0D35975F98DBAD852A55D6C21FF85B3F6629738F79760C2D84D03E0E036E3
                          Malicious:false
                          Preview:p...... ....(...lMNdaX..(.......2...........,............................... ..........O.... ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.q.v.p.s.X.K.Y.8.R.R.Q.e.o.7.4.f.f.H.U.x.c.%.3.D...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):412
                          Entropy (8bit):3.9077266318075377
                          Encrypted:false
                          SSDEEP:6:kKftsElvXJty4/lXlRNfOAUMivhClroFFKIhipStaHAaloq09SlsbhQ6Shlrn:WMjy4/zmxMiv8sFFKbpgal7BlwhZg
                          MD5:44F0B87844CBE1A7A1C74E90B8B97B50
                          SHA1:3A7EFD734AC2CE88C931C6FA8CE959B36DB37236
                          SHA-256:325C6189DC349B0FEEC71078289CBEA0B3FF83BF68C3EF1CAEA45E61CA2BE1F4
                          SHA-512:CDB7A547CB680F18D30A77641452120172434971BE8B15E509A0FFE2F257D7BCAADDA5540D704592FBEC24BC81D98E98313DFE753157E26884F8F0480B55952C
                          Malicious:false
                          Preview:p...... ....(...lMNdaX..(.......2..........+......b..'....................b..'.. ............... ...................h.t.t.p.:././.o.c.s.p...d.i.g.i.c.e.r.t...c.o.m./.M.F.E.w.T.z.B.N.M.E.s.w.S.T.A.J.B.g.U.r.D.g.M.C.G.g.U.A.B.B.Q.5.0.o.t.x.%.2.F.h.0.Z.t.l.%.2.B.z.8.S.i.P.I.7.w.E.W.V.x.D.l.Q.Q.U.T.i.J.U.I.B.i.V.5.u.N.u.5.g.%.2.F.6.%.2.B.r.k.S.7.Q.Y.X.j.z.k.C.E.A.p.D.q.V.C.b.A.T.U.v.i.Z.V.5.7.H.I.I.u.l.A.%.3.D...
                          Process:C:\Windows\System32\svchost.exe
                          File Type:data
                          Category:modified
                          Size (bytes):330
                          Entropy (8bit):3.427004540064023
                          Encrypted:false
                          SSDEEP:6:kKh7EtK8k38uScN+SkQlPlEGYRMY9z+4D1QuflIeyGIla1:VrukPlE99Si1QyIeek
                          MD5:06F08EC86263D3065CE8672C2F428D89
                          SHA1:5C033FFDD5872C35E0D6DC48B04FECEB39EB56BB
                          SHA-256:490C4FE9A4987662AC10123E82093DF526231334CAA97CAB0E72B7B57D940C6F
                          SHA-512:5C83A62FEC04F6A1DC5CFC148397E8C00E1CF2C20CA79E8328A5CD999364D648DEC0812F9493CD7EA45796E012887E61859B986DEC1F95C5AC5AD990A930157B
                          Malicious:false
                          Preview:p...... ........3z8.aX..(...............................................dK.L#... ........B@!........(...........t...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.p.i.n.r.u.l.e.s.s.t.l...c.a.b...".8.0.4.2.4.0.2.1.c.7.d.b.d.2.1.:.0."...
                          Process:C:\Users\user\Desktop\wce.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):195
                          Entropy (8bit):4.869421196460925
                          Encrypted:false
                          SSDEEP:6:suTkT53GPF8FiY1QX8FwFtoQf/NQErVHONXi:suT4GPF8bFwvoIR9D
                          MD5:385377B4C9661E7BFE2517F3F6C8D4F4
                          SHA1:925B48A8F81A1E46089A847873E6CE8318806389
                          SHA-256:62FAEFE221084BC17AAFC4DE728C3907DBBB8C3C3734F2F4ED6D15933D58EE34
                          SHA-512:B1AB11240C8E1E07019AAC8233B794DC7487AA5BF1C4D6AFD54D8680C59EE1A5B2444B7D45B5517216E9D2E2554A70040B455A313A703128A9022F26C3988657
                          Malicious:false
                          Preview:WCE v1.2 (Windows Credentials Editor) - (c) 2010,2011 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com)..Use -h for help.....CrossSessionCreateRemoteThread: Cannot create new thread..
                          File type:PE32 executable (console) Intel 80386, for MS Windows
                          Entropy (8bit):6.463466926901483
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:wce.exe
                          File size:199'680 bytes
                          MD5:4fb08ad6583c2d44a098e325699789cb
                          SHA1:76af4d288f66b71f7cd275d4e71d6010ac0feeea
                          SHA256:5884f3fc15c710fb754f31c368acaf37582ab1d63125233fd3cb91d50a9098af
                          SHA512:4175ca0866e8752afe71b3b3fd59c2dcfb5b1e6af288fbf17ce1b34b494e0b2426ef2f2b449e540c41f8b9b4d69e8047e09c49af244b22756f76e3a4ed16811c
                          SSDEEP:3072:ECtjouR0BeV8nI7Xgn1wimOFLnmJLJPq9vcqIw2qkNJF0c:ECK60kV97XSwi3DRsqk
                          TLSH:C9147B21B280C032E196007495A5C772AE397D335BB154C7BFD25EBA8E692F5E63831F
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&...G~..G~..G~.N....G~..1...G~..1...G~..?...G~..G..FG~..1..IG~..1...G~..1...G~.Rich.G~.........PE..L......M...................
                          Icon Hash:00928e8e8686b000
                          Entrypoint:0x40e73c
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows cui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x4DAC1CD4 [Mon Apr 18 11:13:24 2011 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:1
                          File Version Major:5
                          File Version Minor:1
                          Subsystem Version Major:5
                          Subsystem Version Minor:1
                          Import Hash:6bfe09efcb4ffde061ebdbafc4db84cf
                          Instruction
                          call 00007FCAD86D2D2Dh
                          jmp 00007FCAD86CBFDAh
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          push esi
                          mov esi, dword ptr [ebp+08h]
                          push esi
                          call 00007FCAD86CD703h
                          push eax
                          call 00007FCAD86D2DAEh
                          pop ecx
                          pop ecx
                          test eax, eax
                          je 00007FCAD86CC1BEh
                          call 00007FCAD86CAD05h
                          add eax, 20h
                          cmp esi, eax
                          jne 00007FCAD86CC146h
                          xor eax, eax
                          jmp 00007FCAD86CC151h
                          call 00007FCAD86CACF5h
                          add eax, 40h
                          cmp esi, eax
                          jne 00007FCAD86CC1A2h
                          xor eax, eax
                          inc eax
                          inc dword ptr [0042390Ch]
                          test dword ptr [esi+0Ch], 0000010Ch
                          jne 00007FCAD86CC190h
                          push ebx
                          push edi
                          lea edi, dword ptr [00423920h+eax*4]
                          cmp dword ptr [edi], 00000000h
                          mov ebx, 00001000h
                          jne 00007FCAD86CC162h
                          push ebx
                          call 00007FCAD86CF88Dh
                          pop ecx
                          mov dword ptr [edi], eax
                          test eax, eax
                          jne 00007FCAD86CC155h
                          lea eax, dword ptr [esi+14h]
                          push 00000002h
                          mov dword ptr [esi+08h], eax
                          mov dword ptr [esi], eax
                          pop eax
                          mov dword ptr [esi+18h], eax
                          mov dword ptr [esi+04h], eax
                          jmp 00007FCAD86CC14Fh
                          mov edi, dword ptr [edi]
                          mov dword ptr [esi+08h], edi
                          mov dword ptr [esi], edi
                          mov dword ptr [esi+18h], ebx
                          mov dword ptr [esi+04h], ebx
                          or dword ptr [esi+0Ch], 00001102h
                          xor eax, eax
                          pop edi
                          inc eax
                          pop ebx
                          jmp 00007FCAD86CC144h
                          xor eax, eax
                          pop esi
                          pop ebp
                          ret
                          mov edi, edi
                          push ebp
                          mov ebp, esp
                          cmp dword ptr [ebp+08h], 00000000h
                          je 00007FCAD86CC169h
                          push esi
                          mov esi, dword ptr [ebp+0Ch]
                          test dword ptr [esi+0Ch], 00001000h
                          je 00007FCAD86CC15Bh
                          push esi
                          call 00007FCAD86CD6AFh
                          and dword ptr [esi+0Ch], 000000FFh
                          Programming Language:
                          • [C++] VS2010 build 30319
                          • [ASM] VS2010 build 30319
                          • [IMP] VS2008 SP1 build 30729
                          • [ C ] VS2010 build 30319
                          • [RES] VS2010 build 30319
                          • [LNK] VS2010 build 30319
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x1e07c0x64.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x270000xd070.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x350000x15a0.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1db700x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x1c0000x25c.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x1a0f60x1a200739513d765a82a727a8611e8c4308d55False0.5308107805023924data6.550717743060654IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x1c0000x2e360x3000120f1771b9cf8cbc6d219e6c2a503561False0.3384602864583333data4.977139552757257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x1f0000x70780x480074b2ac3e4a9c8948e083a10cf9565897False0.3193901909722222data5.29215301201221IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x270000xd0700xd2004b4950aeddca7e89d55402368be39ba4False0.49125744047619047data6.119202783400186IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0x350000x1bca0x1c0038484abc43b956eff993de5d5095e7e7False0.6501116071428571data5.851907466520541IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          BINARY0x270700xd000PE32 executable (DLL) (GUI) Intel 80386, for MS WindowsEnglishUnited States0.4951171875
                          DLLImport
                          ADVAPI32.dllAdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, GetTokenInformation, NotifyChangeEventLog, OpenEventLogA, GetNumberOfEventLogRecords, GetOldestEventLogRecord, ReadEventLogA, CryptGetHashParam, CryptDestroyHash, CryptHashData, CryptReleaseContext, CryptCreateHash, CryptAcquireContextA, CloseServiceHandle, CreateServiceA, OpenSCManagerA, DeleteService, QueryServiceStatus, OpenServiceA, StartServiceA, ControlService, SetServiceStatus, RegisterServiceCtrlHandlerA, StartServiceCtrlDispatcherA, RegCloseKey, RegSetValueExA, RegOpenKeyExA, RegDeleteValueA, RegQueryValueExA, OpenThreadToken
                          Secur32.dllLsaFreeReturnBuffer, LsaGetLogonSessionData, LsaEnumerateLogonSessions
                          WS2_32.dllntohl, ntohs, htonl
                          KERNEL32.dllCreateFileW, GetProcessHeap, SetEndOfFile, WriteConsoleW, SetEnvironmentVariableA, CompareStringW, DeleteFileA, GetModuleHandleA, OpenProcess, Sleep, SetConsoleCtrlHandler, GetCurrentDirectoryA, GetTempPathA, GetVersionExA, ProcessIdToSessionId, GetCurrentProcessId, GetModuleFileNameA, Process32Next, CloseHandle, Process32First, CreateToolhelp32Snapshot, ReadProcessMemory, WaitForSingleObject, CreateRemoteThread, VirtualFreeEx, WriteProcessMemory, VirtualAllocEx, GetProcAddress, LoadLibraryA, GetCurrentProcess, TerminateProcess, MultiByteToWideChar, UnmapViewOfFile, MapViewOfFile, CreateFileMappingA, CreateFileA, SizeofResource, LockResource, LoadResource, FindResourceA, FreeResource, ResetEvent, GetLastError, CreateEventA, ReadFile, FreeLibrary, GetSystemWindowsDirectoryA, SetEvent, CreateThread, WriteFile, WaitNamedPipeA, DisconnectNamedPipe, FlushFileBuffers, ConnectNamedPipe, CreateNamedPipeA, WideCharToMultiByte, FileTimeToSystemTime, FileTimeToLocalFileTime, GetCurrentThread, GetModuleHandleW, ExitProcess, DecodePointer, HeapFree, HeapAlloc, EncodePointer, EnterCriticalSection, LeaveCriticalSection, HeapReAlloc, GetCommandLineA, HeapSetInformation, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, IsProcessorFeaturePresent, SetHandleCount, GetStdHandle, InitializeCriticalSectionAndSpinCount, GetFileType, GetStartupInfoW, DeleteCriticalSection, RtlUnwind, LoadLibraryW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, GetModuleFileNameW, HeapCreate, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetConsoleCP, GetConsoleMode, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, SetFilePointer, SetStdHandle, LCMapStringW, GetStringTypeW
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Dec 27, 2024 14:14:21.504282951 CET1.1.1.1192.168.2.50x6ab7No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                          Dec 27, 2024 14:14:21.504282951 CET1.1.1.1192.168.2.50x6ab7No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.98A (IP address)IN (0x0001)false
                          Dec 27, 2024 14:14:21.504282951 CET1.1.1.1192.168.2.50x6ab7No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.101A (IP address)IN (0x0001)false
                          Dec 27, 2024 14:14:21.504282951 CET1.1.1.1192.168.2.50x6ab7No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.99A (IP address)IN (0x0001)false
                          Dec 27, 2024 14:14:21.504282951 CET1.1.1.1192.168.2.50x6ab7No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.100A (IP address)IN (0x0001)false
                          Dec 27, 2024 14:14:23.638422966 CET1.1.1.1192.168.2.50x2625No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                          Dec 27, 2024 14:14:23.638422966 CET1.1.1.1192.168.2.50x2625No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                          Dec 27, 2024 14:14:36.600439072 CET1.1.1.1192.168.2.50x89c0No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                          Dec 27, 2024 14:14:36.600439072 CET1.1.1.1192.168.2.50x89c0No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:08:14:01
                          Start date:27/12/2024
                          Path:C:\Users\user\Desktop\wce.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\wce.exe"
                          Imagebase:0x160000
                          File size:199'680 bytes
                          MD5 hash:4FB08AD6583C2D44A098E325699789CB
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Target ID:1
                          Start time:08:14:01
                          Start date:27/12/2024
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6d64d0000
                          File size:862'208 bytes
                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Target ID:2
                          Start time:08:14:01
                          Start date:27/12/2024
                          Path:C:\Windows\System32\lsass.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\lsass.exe
                          Imagebase:0x7ff654c90000
                          File size:59'456 bytes
                          MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:false

                          Target ID:5
                          Start time:08:14:22
                          Start date:27/12/2024
                          Path:C:\Windows\System32\svchost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                          Imagebase:0x7ff7e52b0000
                          File size:55'320 bytes
                          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                          Has elevated privileges:true
                          Has administrator privileges:false
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:6%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:2.1%
                            Total number of Nodes:2000
                            Total number of Limit Nodes:102
                            execution_graph 16736 1622dd 16737 1622ec 16736->16737 16738 1624a2 16737->16738 16739 1622fe 16737->16739 16740 16b604 _free 66 API calls 16738->16740 16741 161880 8 API calls 16739->16741 16742 1624ae LsaFreeReturnBuffer 16740->16742 16743 16231a 16741->16743 16744 16ab1a ___crtMessageBoxW 5 API calls 16742->16744 16746 16235f 16743->16746 16748 16a932 _wprintf 104 API calls 16743->16748 16756 1623ad 16743->16756 16745 1624c7 16744->16745 16747 163fa0 141 API calls 16746->16747 16749 16239c 16747->16749 16750 16234e 16748->16750 16752 1623a3 16749->16752 16754 1623b5 _memset _strncpy _memmove 16749->16754 16751 16a932 _wprintf 104 API calls 16750->16751 16751->16746 16753 16a932 _wprintf 104 API calls 16752->16753 16753->16756 16755 1615f0 104 API calls 16754->16755 16754->16756 16755->16756 16757 16d3dd 16764 16fef4 16757->16764 16760 16d3f0 16762 16b604 _free 66 API calls 16760->16762 16763 16d3fb 16762->16763 16777 16fe1a 16764->16777 16766 16d3e2 16766->16760 16767 172055 16766->16767 16768 172061 _doexit 16767->16768 16769 1707dc __lock 66 API calls 16768->16769 16771 17206d 16769->16771 16770 1720d3 16794 1720e8 16770->16794 16771->16770 16774 16ab96 __fcloseall 102 API calls 16771->16774 16775 1720a8 DeleteCriticalSection 16771->16775 16773 1720df _doexit 16773->16760 16774->16771 16776 16b604 _free 66 API calls 16775->16776 16776->16771 16778 16fe26 _doexit 16777->16778 16779 1707dc __lock 66 API calls 16778->16779 16783 16fe35 16779->16783 16780 16fecd 16790 16feeb 16780->16790 16782 16d43e _puts 67 API calls 16782->16783 16783->16780 16783->16782 16786 16fdd2 101 API calls __fflush_nolock 16783->16786 16787 16febc 16783->16787 16784 16fed9 _doexit 16784->16766 16786->16783 16788 16d4ac __getstream 2 API calls 16787->16788 16789 16feca 16788->16789 16789->16783 16793 170703 LeaveCriticalSection 16790->16793 16792 16fef2 16792->16784 16793->16792 16797 170703 LeaveCriticalSection 16794->16797 16796 1720ef 16796->16773 16797->16796 12124 16e5db 12125 16e5e7 _doexit 12124->12125 12126 16e5f1 HeapSetInformation 12125->12126 12128 16e5fc 12125->12128 12126->12128 12161 1713fd HeapCreate 12128->12161 12129 16e64a 12130 16e655 12129->12130 12436 16e5b2 12129->12436 12162 170dac GetModuleHandleW 12130->12162 12133 16e65b 12134 16e666 __RTC_Initialize 12133->12134 12135 16e5b2 _fast_error_exit 66 API calls 12133->12135 12187 16fefd GetStartupInfoW 12134->12187 12135->12134 12138 16e680 GetCommandLineA 12200 175292 GetEnvironmentStringsW 12138->12200 12145 16e6a5 12226 174f61 12145->12226 12146 16b0b6 __amsg_exit 66 API calls 12146->12145 12148 16e6ab 12149 16e6b6 12148->12149 12150 16b0b6 __amsg_exit 66 API calls 12148->12150 12246 16ae95 12149->12246 12150->12149 12152 16e6be 12153 16e6c9 12152->12153 12155 16b0b6 __amsg_exit 66 API calls 12152->12155 12252 162a50 12153->12252 12155->12153 12156 16e6e6 12157 16e6f7 12156->12157 12451 16b06c 12156->12451 12454 16b098 12157->12454 12160 16e6fc _doexit 12161->12129 12163 170dc0 12162->12163 12164 170dc9 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 12162->12164 12457 170af9 12163->12457 12168 170e13 TlsAlloc 12164->12168 12169 170f22 12168->12169 12170 170e61 TlsSetValue 12168->12170 12169->12133 12170->12169 12171 170e72 12170->12171 12462 16ae3e 12171->12462 12176 170f1d 12178 170af9 __mtterm 2 API calls 12176->12178 12177 170eba DecodePointer 12179 170ecf 12177->12179 12178->12169 12179->12176 12471 171f35 12179->12471 12182 170eed DecodePointer 12183 170efe 12182->12183 12183->12176 12184 170f02 12183->12184 12477 170b36 12184->12477 12186 170f0a GetCurrentThreadId 12186->12169 12188 171f35 __calloc_crt 66 API calls 12187->12188 12198 16ff1b 12188->12198 12189 1700c6 GetStdHandle 12195 170090 12189->12195 12190 171f35 __calloc_crt 66 API calls 12190->12198 12191 17012a SetHandleCount 12192 16e674 12191->12192 12192->12138 12444 16b0b6 12192->12444 12193 1700d8 GetFileType 12193->12195 12194 170010 12194->12195 12196 170047 InitializeCriticalSectionAndSpinCount 12194->12196 12197 17003c GetFileType 12194->12197 12195->12189 12195->12191 12195->12193 12199 1700fe InitializeCriticalSectionAndSpinCount 12195->12199 12196->12192 12196->12194 12197->12194 12197->12196 12198->12190 12198->12192 12198->12194 12198->12195 12199->12192 12199->12195 12201 1752ae WideCharToMultiByte 12200->12201 12202 16e690 12200->12202 12204 1752e3 12201->12204 12205 17531b FreeEnvironmentStringsW 12201->12205 12213 1751d7 12202->12213 12206 171ef0 __malloc_crt 66 API calls 12204->12206 12205->12202 12207 1752e9 12206->12207 12207->12205 12208 1752f1 WideCharToMultiByte 12207->12208 12209 175303 12208->12209 12210 17530f FreeEnvironmentStringsW 12208->12210 12211 16b604 _free 66 API calls 12209->12211 12210->12202 12212 17530b 12211->12212 12212->12210 12214 1751f1 GetModuleFileNameA 12213->12214 12215 1751ec 12213->12215 12217 175218 12214->12217 12725 171ae1 12215->12725 12719 17503d 12217->12719 12220 16e69a 12220->12145 12220->12146 12221 175254 12222 171ef0 __malloc_crt 66 API calls 12221->12222 12223 17525a 12222->12223 12223->12220 12224 17503d _parse_cmdline 76 API calls 12223->12224 12225 175274 12224->12225 12225->12220 12227 174f6a 12226->12227 12229 174f6f __output_l 12226->12229 12228 171ae1 ___initmbctable 94 API calls 12227->12228 12228->12229 12230 171f35 __calloc_crt 66 API calls 12229->12230 12233 174f7d 12229->12233 12235 174fa4 __output_l 12230->12235 12231 174ff3 12232 16b604 _free 66 API calls 12231->12232 12232->12233 12233->12148 12234 171f35 __calloc_crt 66 API calls 12234->12235 12235->12231 12235->12233 12235->12234 12236 175019 12235->12236 12239 175030 12235->12239 13166 172280 12235->13166 12237 16b604 _free 66 API calls 12236->12237 12237->12233 12240 16f5a1 __invoke_watson 10 API calls 12239->12240 12242 17503c 12240->12242 12241 178773 _parse_cmdline 76 API calls 12241->12242 12242->12241 12244 1750c9 12242->12244 12243 1751c7 12243->12148 12244->12243 12245 178773 76 API calls _parse_cmdline 12244->12245 12245->12244 12248 16aea3 __IsNonwritableInCurrentImage 12246->12248 13175 170f73 12248->13175 12249 16aec1 __initterm_e 12251 16aee2 __IsNonwritableInCurrentImage 12249->12251 13178 16d30f 12249->13178 12251->12152 12253 162a5d __write_nolock 12252->12253 13245 161c50 12253->13245 12255 162a6c _memset 12256 162ac7 GetTempPathA 12255->12256 12257 162ae5 GetCurrentDirectoryA 12256->12257 12258 162b08 12256->12258 12257->12258 13250 16a9ef 12258->13250 12261 16d30f __cinit 76 API calls 12262 162b45 _memset 12261->12262 12265 162be0 12262->12265 13572 163960 12262->13572 12264 162bce 12264->12265 12267 162be5 12264->12267 12268 16a932 _wprintf 104 API calls 12265->12268 12272 162edf 12265->12272 12271 162eb2 12267->12271 12276 162d52 12267->12276 12277 162c3f 12267->12277 12278 162c5d 12267->12278 12279 162e5d 12267->12279 12280 162ea6 12267->12280 12281 162cc4 12267->12281 12282 162e43 12267->12282 12283 162c21 12267->12283 12284 162e8e 12267->12284 12285 162cee 12267->12285 12286 162ca6 _memset _strncpy 12267->12286 12268->12272 12269 16a932 _wprintf 104 API calls 12273 162f05 12269->12273 12270 162f12 13282 1647a0 GetCurrentProcess OpenProcessToken 12270->13282 12275 161c80 104 API calls 12271->12275 12272->12269 12272->12273 13265 16a932 12273->13265 12296 162e9a 12275->12296 12276->12286 12304 16a932 _wprintf 104 API calls 12276->12304 12294 16a932 _wprintf 104 API calls 12277->12294 12297 162c7a 12278->12297 12305 16a932 _wprintf 104 API calls 12278->12305 12291 16cf6a __wcstoi64 79 API calls 12279->12291 13713 161c80 12280->13713 13635 1636c0 12281->13635 13683 16cf6a 12282->13683 12290 16a932 _wprintf 104 API calls 12283->12290 13687 161000 12284->13687 12292 162d0b 12285->12292 12301 16a932 _wprintf 104 API calls 12285->12301 12286->12156 12300 162c2b 12290->12300 12291->12286 13638 161db0 12292->13638 12303 162c49 12294->12303 12312 16ab1a ___crtMessageBoxW 5 API calls 12296->12312 13624 165b70 12297->13624 12298 162f32 12309 162f4b 12298->12309 13758 164940 GetCurrentProcess OpenProcessToken 12298->13758 13581 16a2a0 DeleteFileA DeleteFileA 12300->13581 12311 162d01 12301->12311 13594 16a520 12303->13594 12314 162d65 12304->12314 12315 162c70 12305->12315 12307 16a932 _wprintf 104 API calls 12317 162f28 12307->12317 12308 16b06c 66 API calls 12308->12286 12321 16325a 12309->12321 12322 162f5b 12309->12322 12320 16b06c 66 API calls 12311->12320 12323 16344d 12312->12323 12325 16b06c 66 API calls 12314->12325 12326 16b06c 66 API calls 12315->12326 12328 16b06c 66 API calls 12317->12328 12320->12292 12333 163267 12321->12333 12334 16334c 12321->12334 12331 163130 12322->12331 12427 162f68 12322->12427 12323->12156 12325->12286 12326->12297 12327 16a932 _wprintf 104 API calls 12335 162c9c 12327->12335 12328->12298 12330 16b06c 66 API calls 12338 162c3a 12330->12338 12336 163150 12331->12336 12344 163142 12331->12344 12345 16315b 12331->12345 12332 16b06c 66 API calls 12332->12338 12341 163284 12333->12341 12348 16a932 _wprintf 104 API calls 12333->12348 12339 163355 12334->12339 12340 16338f 12334->12340 12342 16b06c 66 API calls 12335->12342 12346 1631a3 12336->12346 12362 16a932 _wprintf 104 API calls 12336->12362 12337 16a932 _wprintf 104 API calls 12337->12309 12338->12286 13907 1611e0 12339->13907 12340->12296 12350 1633b9 12340->12350 12356 16a932 _wprintf 104 API calls 12340->12356 12343 1634d0 118 API calls 12341->12343 12342->12286 12351 163289 12343->12351 13290 165dd0 12344->13290 12345->12336 12361 165dd0 172 API calls 12345->12361 12354 163200 12346->12354 13503 1634d0 12346->13503 12349 16327a 12348->12349 12355 16b06c 66 API calls 12349->12355 12359 1634d0 118 API calls 12350->12359 12357 1632c0 12351->12357 12358 16328d GetModuleHandleA 12351->12358 12360 163230 12354->12360 12371 16a932 _wprintf 104 API calls 12354->12371 12355->12341 12366 1633af 12356->12366 12370 1632de 12357->12370 12384 164940 8 API calls 12357->12384 12368 164dc0 25 API calls 12358->12368 12369 1633be 12359->12369 13857 161540 12360->13857 12361->12336 12374 163199 12362->12374 12365 16a932 104 API calls _wprintf 12365->12427 12380 16b06c 66 API calls 12366->12380 12367 1634d0 118 API calls 12367->12427 12381 1632a5 12368->12381 12382 1633c2 GetModuleHandleA 12369->12382 12383 163418 12369->12383 12385 1632d8 12370->12385 12371->12360 12373 163109 Sleep 12373->12427 12387 16b06c 66 API calls 12374->12387 12376 165dd0 172 API calls 12376->12427 12378 1631b5 12389 1631be GetModuleHandleA 12378->12389 12390 1631f1 12378->12390 12379 163202 12393 16320b 12379->12393 12394 163215 12379->12394 12380->12350 12381->12357 12401 16a932 _wprintf 104 API calls 12381->12401 12392 164dc0 25 API calls 12382->12392 12396 163421 12383->12396 12397 16342b 12383->12397 12384->12385 12385->12370 13865 1626b0 12385->13865 12387->12346 12388 16337f DeleteFileA 12388->12296 12391 16b06c 66 API calls 12391->12427 12403 1633da 12392->12403 12407 16a932 _wprintf 104 API calls 12396->12407 13994 163870 12397->13994 12398 16a932 _wprintf 104 API calls 12410 163375 12398->12410 12400 163003 GetModuleHandleA 12413 164dc0 25 API calls 12400->12413 12414 1632b6 12401->12414 12415 1633f5 12403->12415 12421 16a932 _wprintf 104 API calls 12403->12421 12407->12397 12409 16324a DeleteFileA 12409->12296 12433 16301b 12413->12433 12420 16b06c 66 API calls 12414->12420 13961 162840 12415->13961 12416 162190 159 API calls 12416->12427 12420->12357 12425 1633eb 12421->12425 12430 16b06c 66 API calls 12425->12430 12427->12296 12427->12365 12427->12367 12427->12373 12427->12376 12427->12391 12427->12400 12427->12416 12427->12433 13791 161360 12427->13791 13818 16add2 12427->13818 13821 16ac0a 12427->13821 13844 16ab96 12427->13844 12429 16a932 104 API calls _wprintf 12429->12433 12430->12415 12433->12427 12433->12429 12434 16b06c 66 API calls 12433->12434 13763 1636e0 12433->13763 12434->12433 12437 16e5c5 12436->12437 12438 16e5c0 12436->12438 12440 171112 __NMSG_WRITE 66 API calls 12437->12440 12439 1712c1 __FF_MSGBANNER 66 API calls 12438->12439 12439->12437 12441 16e5cd 12440->12441 12442 16ae14 _doexit 3 API calls 12441->12442 12443 16e5d7 12442->12443 12443->12130 12445 1712c1 __FF_MSGBANNER 66 API calls 12444->12445 12446 16b0c0 12445->12446 12447 171112 __NMSG_WRITE 66 API calls 12446->12447 12448 16b0c8 12447->12448 16188 16b082 12448->16188 12452 16af2c _doexit 66 API calls 12451->12452 12453 16b07d 12452->12453 12453->12157 12455 16af2c _doexit 66 API calls 12454->12455 12456 16b0a3 12455->12456 12456->12160 12458 170b03 DecodePointer 12457->12458 12459 170b12 12457->12459 12458->12459 12460 170b23 TlsFree 12459->12460 12461 170b31 12459->12461 12460->12461 12461->12461 12490 170ab3 EncodePointer 12462->12490 12464 16ae46 __init_pointers __initp_misc_winsig 12491 170848 EncodePointer 12464->12491 12466 16ae6c EncodePointer EncodePointer EncodePointer EncodePointer 12467 170662 12466->12467 12468 17066d 12467->12468 12469 170677 InitializeCriticalSectionAndSpinCount 12468->12469 12470 17069a 12468->12470 12469->12468 12469->12470 12470->12176 12470->12177 12473 171f3e 12471->12473 12474 170ee5 12473->12474 12475 171f5c Sleep 12473->12475 12492 177790 12473->12492 12474->12176 12474->12182 12476 171f71 12475->12476 12476->12473 12476->12474 12529 16f690 12477->12529 12479 170b42 GetModuleHandleW 12530 1707dc 12479->12530 12481 170b80 InterlockedIncrement 12537 170bd8 12481->12537 12484 1707dc __lock 64 API calls 12485 170ba1 12484->12485 12540 171aff InterlockedIncrement 12485->12540 12487 170bbf 12552 170be1 12487->12552 12489 170bcc _doexit 12489->12186 12490->12464 12491->12466 12493 17779c 12492->12493 12497 1777b7 12492->12497 12494 1777a8 12493->12494 12493->12497 12501 16f645 12494->12501 12496 1777ca HeapAlloc 12496->12497 12500 1777f1 12496->12500 12497->12496 12497->12500 12504 170a8b DecodePointer 12497->12504 12500->12473 12506 170bea GetLastError 12501->12506 12503 16f64a 12503->12473 12505 170aa0 12504->12505 12505->12497 12520 170ac5 TlsGetValue 12506->12520 12508 170c57 SetLastError 12508->12503 12510 171f35 __calloc_crt 62 API calls 12511 170c15 12510->12511 12511->12508 12512 170c1d DecodePointer 12511->12512 12513 170c32 12512->12513 12514 170c36 12513->12514 12515 170c4e 12513->12515 12516 170b36 __initptd 62 API calls 12514->12516 12523 16b604 12515->12523 12518 170c3e GetCurrentThreadId 12516->12518 12518->12508 12519 170c54 12519->12508 12521 170af5 12520->12521 12522 170ada DecodePointer TlsSetValue 12520->12522 12521->12508 12521->12510 12522->12521 12524 16b60f HeapFree 12523->12524 12525 16b638 __dosmaperr 12523->12525 12524->12525 12526 16b624 12524->12526 12525->12519 12527 16f645 __mbsnbicmp_l 64 API calls 12526->12527 12528 16b62a GetLastError 12527->12528 12528->12525 12529->12479 12531 170804 EnterCriticalSection 12530->12531 12532 1707f1 12530->12532 12531->12481 12555 17071a 12532->12555 12534 1707f7 12534->12531 12535 16b0b6 __amsg_exit 65 API calls 12534->12535 12536 170803 12535->12536 12536->12531 12717 170703 LeaveCriticalSection 12537->12717 12539 170b9a 12539->12484 12541 171b20 12540->12541 12542 171b1d InterlockedIncrement 12540->12542 12543 171b2d 12541->12543 12544 171b2a InterlockedIncrement 12541->12544 12542->12541 12545 171b37 InterlockedIncrement 12543->12545 12546 171b3a 12543->12546 12544->12543 12545->12546 12547 171b44 InterlockedIncrement 12546->12547 12549 171b47 12546->12549 12547->12549 12548 171b60 InterlockedIncrement 12548->12549 12549->12548 12550 171b7b InterlockedIncrement 12549->12550 12551 171b70 InterlockedIncrement 12549->12551 12550->12487 12551->12549 12718 170703 LeaveCriticalSection 12552->12718 12554 170be8 12554->12489 12556 170726 _doexit 12555->12556 12557 17074c 12556->12557 12580 1712c1 12556->12580 12566 17075c _doexit 12557->12566 12616 171ef0 12557->12616 12564 17076e 12568 16f645 __mbsnbicmp_l 65 API calls 12564->12568 12565 17077d 12569 1707dc __lock 65 API calls 12565->12569 12566->12534 12568->12566 12570 170784 12569->12570 12571 1707b7 12570->12571 12572 17078c InitializeCriticalSectionAndSpinCount 12570->12572 12575 16b604 _free 65 API calls 12571->12575 12573 1707a8 12572->12573 12574 17079c 12572->12574 12621 1707d3 12573->12621 12576 16b604 _free 65 API calls 12574->12576 12575->12573 12577 1707a2 12576->12577 12579 16f645 __mbsnbicmp_l 65 API calls 12577->12579 12579->12573 12624 176da4 12580->12624 12582 1712c8 12583 1712d5 12582->12583 12584 176da4 __NMSG_WRITE 66 API calls 12582->12584 12585 171112 __NMSG_WRITE 66 API calls 12583->12585 12587 17073b 12583->12587 12584->12583 12586 1712ed 12585->12586 12588 171112 __NMSG_WRITE 66 API calls 12586->12588 12589 171112 12587->12589 12588->12587 12590 171133 __NMSG_WRITE 12589->12590 12592 176da4 __NMSG_WRITE 63 API calls 12590->12592 12612 17124f 12590->12612 12594 17114d 12592->12594 12593 170742 12613 16ae14 12593->12613 12595 17125e GetStdHandle 12594->12595 12596 176da4 __NMSG_WRITE 63 API calls 12594->12596 12599 17126c __output_l 12595->12599 12595->12612 12597 17115e 12596->12597 12597->12595 12598 171170 12597->12598 12598->12612 12649 176d41 12598->12649 12602 1712a2 WriteFile 12599->12602 12599->12612 12602->12612 12603 17119c GetModuleFileNameW 12604 1711bd 12603->12604 12607 1711c9 _wcslen 12603->12607 12605 176d41 __NMSG_WRITE 63 API calls 12604->12605 12605->12607 12606 16f5a1 __invoke_watson 10 API calls 12606->12607 12607->12606 12609 176be4 63 API calls __NMSG_WRITE 12607->12609 12610 17123f 12607->12610 12658 176c59 12607->12658 12609->12607 12667 176a78 12610->12667 12685 16ab1a 12612->12685 12695 16ade9 GetModuleHandleW 12613->12695 12619 171ef9 12616->12619 12618 170767 12618->12564 12618->12565 12619->12618 12620 171f10 Sleep 12619->12620 12698 16b63e 12619->12698 12620->12619 12716 170703 LeaveCriticalSection 12621->12716 12623 1707da 12623->12566 12625 176db0 12624->12625 12626 176dba 12625->12626 12627 16f645 __mbsnbicmp_l 66 API calls 12625->12627 12626->12582 12628 176dd3 12627->12628 12631 16f5f3 12628->12631 12634 16f5c6 DecodePointer 12631->12634 12635 16f5db 12634->12635 12640 16f5a1 12635->12640 12637 16f5f2 12638 16f5c6 __mbsnbicmp_l 10 API calls 12637->12638 12639 16f5ff 12638->12639 12639->12582 12643 16f478 12640->12643 12644 16f497 _memset __call_reportfault 12643->12644 12645 16f4b5 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 12644->12645 12647 16f583 __call_reportfault 12645->12647 12646 16ab1a ___crtMessageBoxW 5 API calls 12648 16f59f GetCurrentProcess TerminateProcess 12646->12648 12647->12646 12648->12637 12650 176d56 12649->12650 12651 176d4f 12649->12651 12652 16f645 __mbsnbicmp_l 66 API calls 12650->12652 12651->12650 12656 176d77 12651->12656 12653 176d5b 12652->12653 12654 16f5f3 __mbsnbicmp_l 11 API calls 12653->12654 12655 171191 12654->12655 12655->12603 12655->12607 12656->12655 12657 16f645 __mbsnbicmp_l 66 API calls 12656->12657 12657->12653 12659 176c6b 12658->12659 12662 176c6f 12659->12662 12664 176c74 12659->12664 12665 176cb2 12659->12665 12660 16f645 __mbsnbicmp_l 66 API calls 12661 176c8b 12660->12661 12663 16f5f3 __mbsnbicmp_l 11 API calls 12661->12663 12662->12660 12662->12664 12663->12664 12664->12607 12665->12664 12666 16f645 __mbsnbicmp_l 66 API calls 12665->12666 12666->12661 12693 170ab3 EncodePointer 12667->12693 12669 176a9e 12670 176aae LoadLibraryW 12669->12670 12671 176b2b 12669->12671 12672 176ac3 GetProcAddress 12670->12672 12679 176bc3 12670->12679 12676 176b45 DecodePointer DecodePointer 12671->12676 12683 176b58 12671->12683 12675 176ad9 7 API calls 12672->12675 12672->12679 12673 176bb7 DecodePointer 12673->12679 12674 176b8e DecodePointer 12674->12673 12681 176b95 12674->12681 12675->12671 12678 176b1b GetProcAddress EncodePointer 12675->12678 12676->12683 12677 16ab1a ___crtMessageBoxW 5 API calls 12680 176be2 12677->12680 12678->12671 12679->12677 12680->12612 12681->12673 12682 176ba8 DecodePointer 12681->12682 12682->12673 12684 176b7b 12682->12684 12683->12673 12683->12674 12683->12684 12684->12673 12686 16ab24 IsDebuggerPresent 12685->12686 12687 16ab22 12685->12687 12694 175625 12686->12694 12687->12593 12690 16fb7a SetUnhandledExceptionFilter UnhandledExceptionFilter 12691 16fb97 __call_reportfault 12690->12691 12692 16fb9f GetCurrentProcess TerminateProcess 12690->12692 12691->12692 12692->12593 12693->12669 12694->12690 12696 16adfd GetProcAddress 12695->12696 12697 16ae0d ExitProcess 12695->12697 12696->12697 12699 16b64c 12698->12699 12700 16b6bb 12698->12700 12705 16b657 12699->12705 12701 170a8b _malloc DecodePointer 12700->12701 12702 16b6c1 12701->12702 12704 16f645 __mbsnbicmp_l 65 API calls 12702->12704 12703 1712c1 __FF_MSGBANNER 65 API calls 12703->12705 12707 16b6c7 12704->12707 12705->12699 12705->12703 12706 16b67a HeapAlloc 12705->12706 12708 171112 __NMSG_WRITE 65 API calls 12705->12708 12710 16b6a7 12705->12710 12711 170a8b _malloc DecodePointer 12705->12711 12713 16ae14 _doexit 3 API calls 12705->12713 12714 16b6a5 12705->12714 12706->12705 12709 16b6b3 12706->12709 12707->12619 12708->12705 12709->12707 12712 16f645 __mbsnbicmp_l 65 API calls 12710->12712 12711->12705 12712->12714 12713->12705 12715 16f645 __mbsnbicmp_l 65 API calls 12714->12715 12715->12709 12716->12623 12717->12539 12718->12554 12721 17505c 12719->12721 12723 1750c9 12721->12723 12729 178773 12721->12729 12722 1751c7 12722->12220 12722->12221 12723->12722 12724 178773 76 API calls _parse_cmdline 12723->12724 12724->12723 12726 171af1 12725->12726 12727 171aea 12725->12727 12726->12214 13053 171947 12727->13053 12732 178720 12729->12732 12735 16ccb8 12732->12735 12734 178733 12734->12721 12736 16cccb 12735->12736 12742 16cd18 12735->12742 12743 170c63 12736->12743 12739 16ccf8 12739->12742 12763 17163e 12739->12763 12742->12734 12744 170bea __getptd_noexit 66 API calls 12743->12744 12745 170c6b 12744->12745 12746 16ccd0 12745->12746 12747 16b0b6 __amsg_exit 66 API calls 12745->12747 12746->12739 12748 171dbf 12746->12748 12747->12746 12749 171dcb _doexit 12748->12749 12750 170c63 __getptd 66 API calls 12749->12750 12751 171dd0 12750->12751 12752 171dfe 12751->12752 12754 171de2 12751->12754 12753 1707dc __lock 66 API calls 12752->12753 12755 171e05 12753->12755 12756 170c63 __getptd 66 API calls 12754->12756 12779 171d72 12755->12779 12758 171de7 12756->12758 12760 171df5 _doexit 12758->12760 12762 16b0b6 __amsg_exit 66 API calls 12758->12762 12760->12739 12762->12760 12764 17164a _doexit 12763->12764 12765 170c63 __getptd 66 API calls 12764->12765 12766 17164f 12765->12766 12767 171661 12766->12767 12768 1707dc __lock 66 API calls 12766->12768 12771 17166f _doexit 12767->12771 12775 16b0b6 __amsg_exit 66 API calls 12767->12775 12769 17167f 12768->12769 12770 1716c8 12769->12770 12772 171696 InterlockedDecrement 12769->12772 12773 1716b0 InterlockedIncrement 12769->12773 13049 1716d9 12770->13049 12771->12742 12772->12773 12776 1716a1 12772->12776 12773->12770 12775->12771 12776->12773 12777 16b604 _free 66 API calls 12776->12777 12778 1716af 12777->12778 12778->12773 12780 171db4 12779->12780 12781 171d7f 12779->12781 12787 171e2c 12780->12787 12781->12780 12782 171aff ___addlocaleref 8 API calls 12781->12782 12783 171d95 12782->12783 12783->12780 12790 171b8e 12783->12790 13048 170703 LeaveCriticalSection 12787->13048 12789 171e33 12789->12758 12791 171c22 12790->12791 12792 171b9f InterlockedDecrement 12790->12792 12791->12780 12804 171c27 12791->12804 12793 171bb7 12792->12793 12794 171bb4 InterlockedDecrement 12792->12794 12795 171bc4 12793->12795 12796 171bc1 InterlockedDecrement 12793->12796 12794->12793 12797 171bd1 12795->12797 12798 171bce InterlockedDecrement 12795->12798 12796->12795 12799 171bdb InterlockedDecrement 12797->12799 12800 171bde 12797->12800 12798->12797 12799->12800 12801 171bf7 InterlockedDecrement 12800->12801 12802 171c07 InterlockedDecrement 12800->12802 12803 171c12 InterlockedDecrement 12800->12803 12801->12800 12802->12800 12803->12791 12805 171cab 12804->12805 12808 171c3e 12804->12808 12806 171cf8 12805->12806 12807 16b604 _free 66 API calls 12805->12807 12824 171d21 12806->12824 12874 177137 12806->12874 12811 171ccc 12807->12811 12808->12805 12810 171c72 12808->12810 12816 16b604 _free 66 API calls 12808->12816 12813 171c93 12810->12813 12822 16b604 _free 66 API calls 12810->12822 12814 16b604 _free 66 API calls 12811->12814 12819 16b604 _free 66 API calls 12813->12819 12818 171cdf 12814->12818 12815 16b604 _free 66 API calls 12815->12824 12820 171c67 12816->12820 12817 171d66 12821 16b604 _free 66 API calls 12817->12821 12823 16b604 _free 66 API calls 12818->12823 12825 171ca0 12819->12825 12834 177517 12820->12834 12828 171d6c 12821->12828 12829 171c88 12822->12829 12830 171ced 12823->12830 12824->12817 12831 16b604 66 API calls _free 12824->12831 12826 16b604 _free 66 API calls 12825->12826 12826->12805 12828->12780 12862 1774ae 12829->12862 12833 16b604 _free 66 API calls 12830->12833 12831->12824 12833->12806 12835 177528 12834->12835 12861 177611 12834->12861 12836 177539 12835->12836 12837 16b604 _free 66 API calls 12835->12837 12838 17754b 12836->12838 12839 16b604 _free 66 API calls 12836->12839 12837->12836 12840 17755d 12838->12840 12841 16b604 _free 66 API calls 12838->12841 12839->12838 12842 17756f 12840->12842 12843 16b604 _free 66 API calls 12840->12843 12841->12840 12844 177581 12842->12844 12845 16b604 _free 66 API calls 12842->12845 12843->12842 12846 177593 12844->12846 12847 16b604 _free 66 API calls 12844->12847 12845->12844 12848 1775a5 12846->12848 12849 16b604 _free 66 API calls 12846->12849 12847->12846 12850 1775b7 12848->12850 12851 16b604 _free 66 API calls 12848->12851 12849->12848 12852 1775c9 12850->12852 12853 16b604 _free 66 API calls 12850->12853 12851->12850 12854 1775db 12852->12854 12855 16b604 _free 66 API calls 12852->12855 12853->12852 12856 1775ed 12854->12856 12857 16b604 _free 66 API calls 12854->12857 12855->12854 12858 1775ff 12856->12858 12859 16b604 _free 66 API calls 12856->12859 12857->12856 12860 16b604 _free 66 API calls 12858->12860 12858->12861 12859->12858 12860->12861 12861->12810 12863 177513 12862->12863 12864 1774bb 12862->12864 12863->12813 12865 1774cb 12864->12865 12866 16b604 _free 66 API calls 12864->12866 12867 1774dd 12865->12867 12868 16b604 _free 66 API calls 12865->12868 12866->12865 12869 1774ef 12867->12869 12871 16b604 _free 66 API calls 12867->12871 12868->12867 12870 177501 12869->12870 12872 16b604 _free 66 API calls 12869->12872 12870->12863 12873 16b604 _free 66 API calls 12870->12873 12871->12869 12872->12870 12873->12863 12875 171d16 12874->12875 12876 177148 12874->12876 12875->12815 12877 16b604 _free 66 API calls 12876->12877 12878 177150 12877->12878 12879 16b604 _free 66 API calls 12878->12879 12880 177158 12879->12880 12881 16b604 _free 66 API calls 12880->12881 12882 177160 12881->12882 12883 16b604 _free 66 API calls 12882->12883 12884 177168 12883->12884 12885 16b604 _free 66 API calls 12884->12885 12886 177170 12885->12886 12887 16b604 _free 66 API calls 12886->12887 12888 177178 12887->12888 12889 16b604 _free 66 API calls 12888->12889 12890 17717f 12889->12890 12891 16b604 _free 66 API calls 12890->12891 12892 177187 12891->12892 12893 16b604 _free 66 API calls 12892->12893 12894 17718f 12893->12894 12895 16b604 _free 66 API calls 12894->12895 12896 177197 12895->12896 12897 16b604 _free 66 API calls 12896->12897 12898 17719f 12897->12898 12899 16b604 _free 66 API calls 12898->12899 12900 1771a7 12899->12900 12901 16b604 _free 66 API calls 12900->12901 12902 1771af 12901->12902 12903 16b604 _free 66 API calls 12902->12903 12904 1771b7 12903->12904 12905 16b604 _free 66 API calls 12904->12905 12906 1771bf 12905->12906 12907 16b604 _free 66 API calls 12906->12907 12908 1771c7 12907->12908 12909 16b604 _free 66 API calls 12908->12909 12910 1771d2 12909->12910 12911 16b604 _free 66 API calls 12910->12911 12912 1771da 12911->12912 12913 16b604 _free 66 API calls 12912->12913 12914 1771e2 12913->12914 12915 16b604 _free 66 API calls 12914->12915 12916 1771ea 12915->12916 12917 16b604 _free 66 API calls 12916->12917 12918 1771f2 12917->12918 13048->12789 13052 170703 LeaveCriticalSection 13049->13052 13051 1716e0 13051->12767 13052->13051 13054 171953 _doexit 13053->13054 13055 170c63 __getptd 66 API calls 13054->13055 13056 17195c 13055->13056 13057 17163e __setmbcp 68 API calls 13056->13057 13058 171966 13057->13058 13084 1716e2 13058->13084 13061 171ef0 __malloc_crt 66 API calls 13063 171987 13061->13063 13062 171aa6 _doexit 13062->12726 13063->13062 13091 17175e 13063->13091 13066 1719b7 InterlockedDecrement 13068 1719c7 13066->13068 13069 1719d8 InterlockedIncrement 13066->13069 13067 171ab3 13067->13062 13071 171ac6 13067->13071 13072 16b604 _free 66 API calls 13067->13072 13068->13069 13074 16b604 _free 66 API calls 13068->13074 13069->13062 13070 1719ee 13069->13070 13070->13062 13075 1707dc __lock 66 API calls 13070->13075 13073 16f645 __mbsnbicmp_l 66 API calls 13071->13073 13072->13071 13073->13062 13076 1719d7 13074->13076 13078 171a02 InterlockedDecrement 13075->13078 13076->13069 13079 171a91 InterlockedIncrement 13078->13079 13080 171a7e 13078->13080 13101 171aa8 13079->13101 13080->13079 13082 16b604 _free 66 API calls 13080->13082 13083 171a90 13082->13083 13083->13079 13085 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 13084->13085 13086 1716f6 13085->13086 13087 171701 GetOEMCP 13086->13087 13088 17171f 13086->13088 13090 171711 13087->13090 13089 171724 GetACP 13088->13089 13088->13090 13089->13090 13090->13061 13090->13062 13092 1716e2 getSystemCP 78 API calls 13091->13092 13094 17177e 13092->13094 13093 171789 setSBCS 13095 16ab1a ___crtMessageBoxW 5 API calls 13093->13095 13094->13093 13097 1717cd IsValidCodePage 13094->13097 13100 1717f2 _memset __setmbcp_nolock 13094->13100 13096 171945 13095->13096 13096->13066 13096->13067 13097->13093 13098 1717df GetCPInfo 13097->13098 13098->13093 13098->13100 13104 1714ae GetCPInfo 13100->13104 13165 170703 LeaveCriticalSection 13101->13165 13103 171aaf 13103->13062 13105 171596 13104->13105 13106 1714e2 _memset 13104->13106 13109 16ab1a ___crtMessageBoxW 5 API calls 13105->13109 13114 1770f7 13106->13114 13111 17163c 13109->13111 13111->13100 13113 176fca ___crtLCMapStringA 82 API calls 13113->13105 13115 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 13114->13115 13116 17710a 13115->13116 13124 177010 13116->13124 13119 176fca 13120 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 13119->13120 13121 176fdd 13120->13121 13141 176de3 13121->13141 13125 17702e 13124->13125 13126 177039 MultiByteToWideChar 13124->13126 13125->13126 13127 177062 13126->13127 13128 177066 13126->13128 13129 16ab1a ___crtMessageBoxW 5 API calls 13127->13129 13131 16b63e _malloc 66 API calls 13128->13131 13136 17707b _memset __crtCompareStringA_stat 13128->13136 13130 171551 13129->13130 13130->13119 13131->13136 13132 1770b4 MultiByteToWideChar 13133 1770db 13132->13133 13134 1770ca GetStringTypeW 13132->13134 13137 176a4f 13133->13137 13134->13133 13136->13127 13136->13132 13138 176a6c 13137->13138 13139 176a5b 13137->13139 13138->13127 13139->13138 13140 16b604 _free 66 API calls 13139->13140 13140->13138 13143 176e01 MultiByteToWideChar 13141->13143 13144 176e5f 13143->13144 13148 176e66 13143->13148 13145 16ab1a ___crtMessageBoxW 5 API calls 13144->13145 13147 171571 13145->13147 13146 176eb3 MultiByteToWideChar 13149 176fab 13146->13149 13150 176ecc LCMapStringW 13146->13150 13147->13113 13151 16b63e _malloc 66 API calls 13148->13151 13155 176e7f __crtCompareStringA_stat 13148->13155 13153 176a4f __freea 66 API calls 13149->13153 13150->13149 13152 176eeb 13150->13152 13151->13155 13154 176ef5 13152->13154 13158 176f1e 13152->13158 13153->13144 13154->13149 13156 176f09 LCMapStringW 13154->13156 13155->13144 13155->13146 13156->13149 13157 176f6d LCMapStringW 13159 176fa5 13157->13159 13160 176f83 WideCharToMultiByte 13157->13160 13161 176f39 __crtCompareStringA_stat 13158->13161 13162 16b63e _malloc 66 API calls 13158->13162 13163 176a4f __freea 66 API calls 13159->13163 13160->13159 13161->13149 13161->13157 13162->13161 13163->13149 13165->13103 13167 172295 13166->13167 13168 17228e 13166->13168 13169 16f645 __mbsnbicmp_l 66 API calls 13167->13169 13168->13167 13173 1722b3 13168->13173 13170 17229a 13169->13170 13171 16f5f3 __mbsnbicmp_l 11 API calls 13170->13171 13172 1722a4 13171->13172 13172->12235 13173->13172 13174 16f645 __mbsnbicmp_l 66 API calls 13173->13174 13174->13170 13176 170f79 EncodePointer 13175->13176 13176->13176 13177 170f93 13176->13177 13177->12249 13181 16d2d3 13178->13181 13180 16d31c 13180->12251 13182 16d2df _doexit 13181->13182 13189 16ae2c 13182->13189 13188 16d300 _doexit 13188->13180 13190 1707dc __lock 66 API calls 13189->13190 13191 16ae33 13190->13191 13192 16d1ec DecodePointer DecodePointer 13191->13192 13193 16d21a 13192->13193 13194 16d29b 13192->13194 13193->13194 13208 172022 13193->13208 13205 16d309 13194->13205 13196 16d22c 13197 16d27e EncodePointer EncodePointer 13196->13197 13198 16d256 13196->13198 13199 16d247 13196->13199 13197->13194 13198->13194 13201 16d250 13198->13201 13215 171f81 13199->13215 13201->13198 13202 171f81 __realloc_crt 70 API calls 13201->13202 13204 16d26c EncodePointer 13201->13204 13203 16d266 13202->13203 13203->13194 13203->13204 13204->13197 13241 16ae35 13205->13241 13209 172042 HeapSize 13208->13209 13210 17202d 13208->13210 13209->13196 13211 16f645 __mbsnbicmp_l 66 API calls 13210->13211 13212 172032 13211->13212 13213 16f5f3 __mbsnbicmp_l 11 API calls 13212->13213 13214 17203d 13213->13214 13214->13196 13219 171f8a 13215->13219 13217 171fc9 13217->13201 13218 171faa Sleep 13218->13219 13219->13217 13219->13218 13220 16d9d6 13219->13220 13221 16d9e1 13220->13221 13222 16d9ec 13220->13222 13223 16b63e _malloc 66 API calls 13221->13223 13224 16d9f4 13222->13224 13232 16da01 13222->13232 13226 16d9e9 13223->13226 13225 16b604 _free 66 API calls 13224->13225 13238 16d9fc __dosmaperr 13225->13238 13226->13219 13227 16da39 13229 170a8b _malloc DecodePointer 13227->13229 13228 16da09 HeapReAlloc 13228->13232 13228->13238 13230 16da3f 13229->13230 13233 16f645 __mbsnbicmp_l 66 API calls 13230->13233 13231 16da69 13235 16f645 __mbsnbicmp_l 66 API calls 13231->13235 13232->13227 13232->13228 13232->13231 13234 170a8b _malloc DecodePointer 13232->13234 13237 16da51 13232->13237 13233->13238 13234->13232 13236 16da6e GetLastError 13235->13236 13236->13238 13239 16f645 __mbsnbicmp_l 66 API calls 13237->13239 13238->13219 13240 16da56 GetLastError 13239->13240 13240->13238 13244 170703 LeaveCriticalSection 13241->13244 13243 16ae3c 13243->13188 13244->13243 13246 16a932 _wprintf 104 API calls 13245->13246 13247 161c63 13246->13247 13248 16a932 _wprintf 104 API calls 13247->13248 13249 161c70 13248->13249 13249->12255 13251 16aa22 13250->13251 13252 16aa0d 13250->13252 13254 16aa46 13251->13254 13255 16aa31 13251->13255 13253 16f645 __mbsnbicmp_l 66 API calls 13252->13253 13256 16aa12 13253->13256 14011 16e8bd 13254->14011 13257 16f645 __mbsnbicmp_l 66 API calls 13255->13257 13259 16f5f3 __mbsnbicmp_l 11 API calls 13256->13259 13260 16aa36 13257->13260 13263 162b2b SetConsoleCtrlHandler 13259->13263 13262 16f5f3 __mbsnbicmp_l 11 API calls 13260->13262 13262->13263 13263->12261 13266 16a93e _doexit 13265->13266 13267 16a961 _puts 13266->13267 13268 16a94c 13266->13268 14247 16d43e 13267->14247 13269 16f645 __mbsnbicmp_l 66 API calls 13268->13269 13270 16a951 13269->13270 13272 16f5f3 __mbsnbicmp_l 11 API calls 13270->13272 13274 16a95c _doexit 13272->13274 13273 16a973 _puts 14252 16e746 13273->14252 13274->12270 13276 16a985 _puts 13277 16e8bd __output_l 102 API calls 13276->13277 13278 16a99d _puts 13277->13278 14261 16e7e2 13278->14261 13283 1647d7 LookupPrivilegeValueA 13282->13283 13285 1647d5 13282->13285 13284 1647ee AdjustTokenPrivileges 13283->13284 13283->13285 13284->13285 13286 164825 CloseHandle 13285->13286 13287 16482f 13285->13287 13286->13287 13288 16ab1a ___crtMessageBoxW 5 API calls 13287->13288 13289 162f1a 13288->13289 13289->12298 13289->12307 13291 165ddd _memset __write_nolock 13290->13291 13292 16a932 _wprintf 104 API calls 13291->13292 13293 165e40 13291->13293 13292->13293 13304 165ea3 _memmove 13293->13304 14281 165a60 GetSystemWindowsDirectoryA 13293->14281 13294 165f4d 13299 1647a0 10 API calls 13294->13299 13295 165ec9 LoadLibraryA 13297 165ef7 13295->13297 13298 165ee3 13295->13298 13297->13294 13301 16a932 _wprintf 104 API calls 13298->13301 13302 165f52 13299->13302 13473 165eed 13301->13473 13305 165f56 13302->13305 13306 165f6a _memset 13302->13306 13303 165e86 13307 165e99 13303->13307 13309 16a932 _wprintf 104 API calls 13303->13309 13304->13294 13304->13295 13308 16a932 _wprintf 104 API calls 13305->13308 14289 163e30 13306->14289 13310 16ab1a ___crtMessageBoxW 5 API calls 13307->13310 13308->13307 13309->13307 13311 166e64 13310->13311 13311->12336 13473->13307 13504 163e30 114 API calls 13503->13504 13505 1634ed GetCurrentProcessId ProcessIdToSessionId ProcessIdToSessionId 13504->13505 14520 16aaa0 13505->14520 13508 16354f 13509 16ab1a ___crtMessageBoxW 5 API calls 13508->13509 13510 1631b1 13509->13510 13510->12378 13510->12379 13574 163977 __tzset_nolock 13572->13574 13575 163ad9 __mbschr_l 13574->13575 13576 163a18 13574->13576 14629 16d562 13574->14629 13577 163b44 _puts 13575->13577 13579 163b87 _puts 13575->13579 13576->12264 13577->13576 13578 16ac0a _fprintf 104 API calls 13577->13578 13578->13576 13579->13576 13580 16ac0a _fprintf 104 API calls 13579->13580 13580->13576 14835 169550 RegOpenKeyExA 13581->14835 13584 16a2e9 14843 16a320 13584->14843 13589 16a308 13591 16a932 _wprintf 104 API calls 13589->13591 13593 162c33 13591->13593 13592 16a932 _wprintf 104 API calls 13592->13584 13593->12330 13595 16a932 _wprintf 104 API calls 13594->13595 13596 16a547 13595->13596 13597 16add2 143 API calls 13596->13597 13598 16a559 13597->13598 13599 16a579 12 API calls 13598->13599 13600 16a932 _wprintf 104 API calls 13598->13600 13601 16a65e 13599->13601 13602 16a56f 13600->13602 13603 16a667 13601->13603 13607 16a679 _memset 13601->13607 13604 16b06c 66 API calls 13602->13604 13605 16a932 _wprintf 104 API calls 13603->13605 13604->13599 13619 16a671 13605->13619 13606 16ab1a ___crtMessageBoxW 5 API calls 13608 162c51 13606->13608 13609 16a932 _wprintf 104 API calls 13607->13609 13613 16a6c3 _memmove 13607->13613 13608->12332 13609->13613 13610 16a704 13612 16ab96 __fcloseall 102 API calls 13610->13612 13611 16e595 81 API calls __fread_nolock 13611->13613 13614 16a8d4 13612->13614 13613->13610 13613->13611 13618 16ab96 102 API calls __fcloseall 13613->13618 13620 16a932 104 API calls _wprintf 13613->13620 13621 16b63e 66 API calls _malloc 13613->13621 13622 16b06c 66 API calls 13613->13622 13623 16b604 66 API calls _free 13613->13623 13615 16a932 _wprintf 104 API calls 13614->13615 13616 16a8ef 13615->13616 13617 16a932 _wprintf 104 API calls 13616->13617 13617->13619 13618->13613 13619->13606 13620->13613 13621->13613 13622->13613 13623->13613 13627 165b90 _memset __output_l _strncpy 13624->13627 13632 165b89 13624->13632 13625 16ab1a ___crtMessageBoxW 5 API calls 13626 162c8b 13625->13626 13626->12286 13626->12327 13627->13632 15370 16dc0f 13627->15370 13630 16cf6a __wcstoi64 79 API calls 13634 165c3a 13630->13634 13631 16dc0f _strtok 66 API calls 13631->13634 13632->13625 13633 16cf6a __wcstoi64 79 API calls 13633->13634 13634->13631 13634->13632 13634->13633 15375 167890 StartServiceCtrlDispatcherA 13635->15375 13637 162cd3 13637->12308 13639 161dd3 13638->13639 13640 16a932 _wprintf 104 API calls 13639->13640 13648 161e0b __mbschr_l 13639->13648 13641 161e01 13640->13641 13642 16b06c 66 API calls 13641->13642 13642->13648 13643 161e5d 13644 16a932 _wprintf 104 API calls 13643->13644 13650 161e77 13643->13650 13646 161e6d 13644->13646 13645 16a932 _wprintf 104 API calls 13645->13648 13649 16b06c 66 API calls 13646->13649 13647 161ecc 13653 16a932 _wprintf 104 API calls 13647->13653 13660 161ee6 _strcat 13647->13660 13648->13643 13648->13645 13651 16b06c 66 API calls 13648->13651 13649->13650 13650->13647 13652 16a932 _wprintf 104 API calls 13650->13652 13655 16b06c 66 API calls 13650->13655 13651->13648 13652->13650 13654 161edc 13653->13654 13656 16b06c 66 API calls 13654->13656 13655->13650 13656->13660 13657 161f5d 13659 16a932 _wprintf 104 API calls 13657->13659 13667 161f77 _strcat 13657->13667 13658 16a932 _wprintf 104 API calls 13658->13660 13661 161f6d 13659->13661 13660->13657 13660->13658 13662 16b06c 66 API calls 13660->13662 13663 16b06c 66 API calls 13661->13663 13662->13660 13663->13667 13664 161feb 13666 16a932 _wprintf 104 API calls 13664->13666 13673 162005 _memmove 13664->13673 13665 16a932 _wprintf 104 API calls 13665->13667 13668 161ffb 13666->13668 13667->13664 13667->13665 13669 16b06c 66 API calls 13667->13669 13670 16b06c 66 API calls 13668->13670 13669->13667 13670->13673 13671 162080 13674 16a932 _wprintf 104 API calls 13671->13674 13682 16209a _memset _memmove 13671->13682 13672 16a932 _wprintf 104 API calls 13672->13673 13673->13671 13673->13672 13675 16b06c 66 API calls 13673->13675 13676 162090 13674->13676 13675->13673 13677 16b06c 66 API calls 13676->13677 13677->13682 13678 16217d 13679 16ab1a ___crtMessageBoxW 5 API calls 13678->13679 13680 162187 13679->13680 13680->12286 13681 16cf95 79 API calls __wcstoui64 13681->13682 13682->13678 13682->13681 13684 16cf83 13683->13684 15376 16cd3f 13684->15376 13688 16101e _memset 13687->13688 13712 161019 13687->13712 13691 16a9ef __snprintf 102 API calls 13688->13691 13689 16ab1a ___crtMessageBoxW 5 API calls 13690 1611c8 13689->13690 13690->12296 13692 16104e 13691->13692 13693 16a932 _wprintf 104 API calls 13692->13693 13694 161062 13693->13694 15395 165870 13694->15395 13697 16108e 15410 165960 13697->15410 13698 16107c 13699 16a932 _wprintf 104 API calls 13698->13699 13699->13712 13702 1610ba 13705 16a932 _wprintf 104 API calls 13702->13705 13703 1610a8 13704 16a932 _wprintf 104 API calls 13703->13704 13704->13712 13706 1610c4 13705->13706 13707 16a932 _wprintf 104 API calls 13706->13707 13708 161121 13707->13708 13709 16a932 _wprintf 104 API calls 13708->13709 13710 16112e 13709->13710 13711 16a932 _wprintf 104 API calls 13710->13711 13711->13712 13712->13689 13714 16a932 _wprintf 104 API calls 13713->13714 13715 161c8d 13714->13715 13716 16a932 _wprintf 104 API calls 13715->13716 13717 161c9a 13716->13717 13718 16a932 _wprintf 104 API calls 13717->13718 13719 161ca7 13718->13719 13720 16a932 _wprintf 104 API calls 13719->13720 13721 161cb4 13720->13721 13722 16a932 _wprintf 104 API calls 13721->13722 13723 161cc1 13722->13723 13724 16a932 _wprintf 104 API calls 13723->13724 13725 161cce 13724->13725 13726 16a932 _wprintf 104 API calls 13725->13726 13727 161cdb 13726->13727 13728 16a932 _wprintf 104 API calls 13727->13728 13729 161ce8 13728->13729 13730 16a932 _wprintf 104 API calls 13729->13730 13731 161cf5 13730->13731 13732 16a932 _wprintf 104 API calls 13731->13732 13733 161d02 13732->13733 13734 16a932 _wprintf 104 API calls 13733->13734 13735 161d0f 13734->13735 13736 16a932 _wprintf 104 API calls 13735->13736 13737 161d1c 13736->13737 13738 16a932 _wprintf 104 API calls 13737->13738 13759 164998 13758->13759 13760 164979 GetTokenInformation 13758->13760 13761 16ab1a ___crtMessageBoxW 5 API calls 13759->13761 13760->13759 13762 162f40 13761->13762 13762->12337 13764 1636ef 13763->13764 13765 1636f9 13763->13765 13766 16a932 _wprintf 104 API calls 13764->13766 15449 163590 13765->15449 13766->13765 13769 163719 Sleep 15462 1678d0 WaitNamedPipeA 13769->15462 13770 16a932 _wprintf 104 API calls 13772 16370f 13770->13772 13774 16b06c 66 API calls 13772->13774 13774->13769 13792 161373 __output_l 13791->13792 13807 16136c 13791->13807 13793 161481 13792->13793 13797 161396 13792->13797 13794 16149e 13793->13794 13795 16a932 _wprintf 104 API calls 13793->13795 13796 16a932 _wprintf 104 API calls 13794->13796 13795->13794 13798 1614b8 13796->13798 13799 16add2 143 API calls 13797->13799 13800 1614f0 13798->13800 13802 16a932 _wprintf 104 API calls 13798->13802 13801 1613a5 13799->13801 13803 16a932 _wprintf 104 API calls 13800->13803 13804 16ac0a _fprintf 104 API calls 13801->13804 13806 1613cc 13801->13806 13802->13798 13811 1614fa 13803->13811 13804->13806 13805 16ac0a _fprintf 104 API calls 13813 1613ea 13805->13813 13806->13805 13807->12427 13808 161426 13812 16ac0a _fprintf 104 API calls 13808->13812 13809 16a932 _wprintf 104 API calls 13809->13811 13810 16ac0a _fprintf 104 API calls 13810->13813 13811->13807 13811->13809 13817 161434 13812->13817 13813->13808 13813->13810 13814 161470 13815 16ac0a _fprintf 104 API calls 13815->13817 13817->13814 13817->13815 15526 16ad16 13818->15526 13820 16ade4 13820->12427 13822 16ac16 _doexit 13821->13822 13823 16ac29 13822->13823 13824 16ac4d 13822->13824 13825 16f645 __mbsnbicmp_l 66 API calls 13823->13825 13826 16d3fd __lock_file 67 API calls 13824->13826 13827 16ac2e 13825->13827 13828 16ac56 13826->13828 13829 16f5f3 __mbsnbicmp_l 11 API calls 13827->13829 13830 16accb 13828->13830 13831 16fd13 __fclose_nolock 66 API calls 13828->13831 13835 16ac39 _doexit 13829->13835 13832 16acf4 13830->13832 13833 16e746 __stbuf 66 API calls 13830->13833 13839 16ac66 13831->13839 15925 16ad0c 13832->15925 13836 16acda 13833->13836 13835->12427 13837 16e8bd __output_l 102 API calls 13836->13837 13838 16acea 13837->13838 13841 16e7e2 __ftbuf 97 API calls 13838->13841 13839->13830 13840 16f645 __mbsnbicmp_l 66 API calls 13839->13840 13842 16acc0 13840->13842 13841->13832 13843 16f5f3 __mbsnbicmp_l 11 API calls 13842->13843 13843->13830 13845 16aba2 _doexit 13844->13845 13846 16abb4 13845->13846 13847 16abc9 13845->13847 13848 16f645 __mbsnbicmp_l 66 API calls 13846->13848 13849 16d3fd __lock_file 67 API calls 13847->13849 13853 16abc4 _doexit 13847->13853 13850 16abb9 13848->13850 13851 16abe2 13849->13851 13852 16f5f3 __mbsnbicmp_l 11 API calls 13850->13852 15928 16ab29 13851->15928 13852->13853 13853->12427 13862 16154f __output_l 13857->13862 13858 1615eb 13858->12296 13858->12409 13859 161360 149 API calls 13859->13862 13860 16a932 _wprintf 104 API calls 13860->13862 13861 16add2 143 API calls 13861->13862 13862->13858 13862->13859 13862->13860 13862->13861 13863 16ac0a _fprintf 104 API calls 13862->13863 13864 16ab96 __fcloseall 102 API calls 13862->13864 13863->13862 13864->13862 13866 1626c3 13865->13866 13905 162738 13865->13905 13867 164940 8 API calls 13866->13867 13868 1626c8 13867->13868 13871 1626e0 13868->13871 13872 1626cd 13868->13872 13870 1634d0 118 API calls 13874 1627cf 13870->13874 13877 16a932 _wprintf 104 API calls 13871->13877 13875 16a932 _wprintf 104 API calls 13872->13875 13878 1627d3 13874->13878 13879 1627fd 13874->13879 13906 1627c7 13905->13906 15978 1649c0 13905->15978 13906->13870 13908 161204 13907->13908 13909 1611ef 13907->13909 13911 1611fc 13908->13911 13912 165dd0 172 API calls 13908->13912 13910 165dd0 172 API calls 13909->13910 13910->13911 13913 1612b4 13911->13913 13915 16124b 13911->13915 13917 16a932 _wprintf 104 API calls 13911->13917 13912->13911 13914 16134f 13913->13914 13923 161360 149 API calls 13913->13923 13930 16a932 _wprintf 104 API calls 13913->13930 13931 16add2 143 API calls 13913->13931 13934 16ac0a _fprintf 104 API calls 13913->13934 13938 16ab96 __fcloseall 102 API calls 13913->13938 13939 165140 CreateEventA 13914->13939 13916 1634d0 118 API calls 13915->13916 13918 161250 13916->13918 13919 161241 13917->13919 13921 161254 GetModuleHandleA 13918->13921 13922 161299 13918->13922 13920 16b06c 66 API calls 13919->13920 13920->13915 13924 164dc0 25 API calls 13921->13924 13925 1612ac 13922->13925 13926 16a932 _wprintf 104 API calls 13922->13926 13923->13913 13928 16126c 13924->13928 13927 1636e0 143 API calls 13925->13927 13926->13925 13927->13913 13929 161287 13928->13929 13932 16a932 _wprintf 104 API calls 13928->13932 13933 162190 159 API calls 13929->13933 13930->13913 13931->13913 13935 16127d 13932->13935 13934->13913 13938->13913 13940 165171 OpenEventLogA 13939->13940 13941 16515d 13939->13941 13943 165187 13940->13943 13944 1651a5 13940->13944 13942 16a932 _wprintf 104 API calls 13941->13942 13947 163364 13942->13947 13945 16a932 _wprintf 104 API calls 13943->13945 16121 165260 13944->16121 13948 165191 CloseHandle 13945->13948 13947->12388 13947->12398 13948->13947 13962 16284d __write_nolock 13961->13962 13963 163e30 114 API calls 13962->13963 13964 162861 13963->13964 13995 163590 114 API calls 13994->13995 13997 163879 13995->13997 13996 163891 Sleep 16174 167c90 WaitNamedPipeA 13996->16174 13997->13996 13998 16a932 _wprintf 104 API calls 13997->13998 14000 163887 13998->14000 14003 16b06c 66 API calls 14000->14003 14003->13996 14012 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14011->14012 14013 16e924 14012->14013 14014 16e928 14013->14014 14031 16e95f __output_l __aulldvrm 14013->14031 14054 16fd13 14013->14054 14015 16f645 __mbsnbicmp_l 66 API calls 14014->14015 14017 16e92d 14015->14017 14018 16f5f3 __mbsnbicmp_l 11 API calls 14017->14018 14019 16e938 14018->14019 14020 16ab1a ___crtMessageBoxW 5 API calls 14019->14020 14021 16aa73 14020->14021 14021->13263 14033 16f87f 14021->14033 14023 16efb4 DecodePointer 14023->14031 14024 16b604 _free 66 API calls 14024->14031 14025 16e816 97 API calls __output_l 14025->14031 14026 171ef0 __malloc_crt 66 API calls 14030 16ef77 14026->14030 14027 16f01d DecodePointer 14027->14031 14028 16f03e DecodePointer 14028->14031 14029 16e849 97 API calls _write_string 14029->14031 14030->14023 14030->14026 14031->14014 14031->14019 14031->14023 14031->14024 14031->14025 14031->14027 14031->14028 14031->14029 14031->14030 14032 17556f 78 API calls __cftof 14031->14032 14061 1722fc 14031->14061 14032->14031 14034 16fd13 __fclose_nolock 66 API calls 14033->14034 14035 16f88f 14034->14035 14036 16f8b1 14035->14036 14037 16f89a 14035->14037 14039 16f8b5 14036->14039 14047 16f8c2 _puts 14036->14047 14038 16f645 __mbsnbicmp_l 66 API calls 14037->14038 14049 16f89f 14038->14049 14040 16f645 __mbsnbicmp_l 66 API calls 14039->14040 14040->14049 14041 16f923 14042 16f9b2 14041->14042 14043 16f932 14041->14043 14044 173635 __write 97 API calls 14042->14044 14045 16f949 14043->14045 14050 16f966 14043->14050 14044->14049 14076 173635 14045->14076 14047->14041 14047->14049 14051 16f918 14047->14051 14064 1753c4 14047->14064 14049->13263 14050->14049 14101 1756b2 14050->14101 14051->14041 14073 17579c 14051->14073 14055 16fd34 14054->14055 14056 16fd1f 14054->14056 14055->14031 14057 16f645 __mbsnbicmp_l 66 API calls 14056->14057 14058 16fd24 14057->14058 14059 16f5f3 __mbsnbicmp_l 11 API calls 14058->14059 14060 16fd2f 14059->14060 14060->14031 14062 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14061->14062 14063 17230f 14062->14063 14063->14031 14065 1753d1 14064->14065 14066 1753e0 14064->14066 14067 16f645 __mbsnbicmp_l 66 API calls 14065->14067 14069 1753fe 14066->14069 14070 16f645 __mbsnbicmp_l 66 API calls 14066->14070 14068 1753d6 14067->14068 14068->14051 14069->14051 14071 1753f1 14070->14071 14072 16f5f3 __mbsnbicmp_l 11 API calls 14071->14072 14072->14068 14074 171ef0 __malloc_crt 66 API calls 14073->14074 14075 1757b1 14074->14075 14075->14041 14077 173641 _doexit 14076->14077 14078 173664 14077->14078 14079 173649 14077->14079 14081 173670 14078->14081 14084 1736aa 14078->14084 14201 16f658 14079->14201 14083 16f658 __free_osfhnd 66 API calls 14081->14083 14086 173675 14083->14086 14126 175955 14084->14126 14085 16f645 __mbsnbicmp_l 66 API calls 14094 173656 _doexit 14085->14094 14088 16f645 __mbsnbicmp_l 66 API calls 14086->14088 14090 17367d 14088->14090 14089 1736b0 14091 1736d2 14089->14091 14092 1736be 14089->14092 14093 16f5f3 __mbsnbicmp_l 11 API calls 14090->14093 14096 16f645 __mbsnbicmp_l 66 API calls 14091->14096 14136 172f38 14092->14136 14093->14094 14094->14049 14098 1736d7 14096->14098 14097 1736ca 14204 173701 14097->14204 14099 16f658 __free_osfhnd 66 API calls 14098->14099 14099->14097 14102 1756be _doexit 14101->14102 14103 1756cf 14102->14103 14104 1756eb 14102->14104 14105 16f658 __free_osfhnd 66 API calls 14103->14105 14106 1756f7 14104->14106 14109 175731 14104->14109 14107 1756d4 14105->14107 14108 16f658 __free_osfhnd 66 API calls 14106->14108 14110 16f645 __mbsnbicmp_l 66 API calls 14107->14110 14111 1756fc 14108->14111 14112 175955 ___lock_fhandle 68 API calls 14109->14112 14119 1756dc _doexit 14110->14119 14113 16f645 __mbsnbicmp_l 66 API calls 14111->14113 14114 175737 14112->14114 14115 175704 14113->14115 14116 175745 14114->14116 14117 175761 14114->14117 14118 16f5f3 __mbsnbicmp_l 11 API calls 14115->14118 14120 17562d __lseeki64_nolock 68 API calls 14116->14120 14121 16f645 __mbsnbicmp_l 66 API calls 14117->14121 14118->14119 14119->14049 14122 175756 14120->14122 14123 175766 14121->14123 14243 175792 14122->14243 14124 16f658 __free_osfhnd 66 API calls 14123->14124 14124->14122 14127 175961 _doexit 14126->14127 14128 1759bb 14127->14128 14131 1707dc __lock 66 API calls 14127->14131 14129 1759c0 EnterCriticalSection 14128->14129 14130 1759dd _doexit 14128->14130 14129->14130 14130->14089 14132 17598d 14131->14132 14133 175996 InitializeCriticalSectionAndSpinCount 14132->14133 14135 1759a9 14132->14135 14133->14135 14207 1759eb 14135->14207 14137 172f47 __write_nolock 14136->14137 14138 172f7d 14137->14138 14139 172f9c 14137->14139 14171 172f72 14137->14171 14141 16f658 __free_osfhnd 66 API calls 14138->14141 14143 172ff8 14139->14143 14144 172fdb 14139->14144 14140 16ab1a ___crtMessageBoxW 5 API calls 14142 173633 14140->14142 14145 172f82 14141->14145 14142->14097 14147 172fff 14143->14147 14148 17300e 14143->14148 14146 16f658 __free_osfhnd 66 API calls 14144->14146 14149 16f645 __mbsnbicmp_l 66 API calls 14145->14149 14152 172fe0 14146->14152 14211 17562d 14147->14211 14151 1753c4 __flsbuf 66 API calls 14148->14151 14150 172f89 14149->14150 14155 16f5f3 __mbsnbicmp_l 11 API calls 14150->14155 14156 173014 14151->14156 14157 16f645 __mbsnbicmp_l 66 API calls 14152->14157 14155->14171 14158 1732b6 14156->14158 14163 170c63 __getptd 66 API calls 14156->14163 14159 172fe8 14157->14159 14161 173566 WriteFile 14158->14161 14162 1732c5 14158->14162 14160 16f5f3 __mbsnbicmp_l 11 API calls 14159->14160 14160->14171 14166 173455 14161->14166 14167 173599 GetLastError 14161->14167 14164 173380 14162->14164 14173 1732d8 14162->14173 14165 17302f GetConsoleMode 14163->14165 14177 17338d 14164->14177 14179 17345a 14164->14179 14165->14158 14169 173058 14165->14169 14195 173298 14166->14195 14167->14195 14168 1735e4 14168->14171 14174 16f645 __mbsnbicmp_l 66 API calls 14168->14174 14169->14158 14170 173068 GetConsoleCP 14169->14170 14193 17308b 14170->14193 14170->14195 14171->14140 14172 173322 WriteFile 14172->14167 14172->14173 14173->14168 14173->14172 14173->14195 14175 1735b7 14176 1733fc WriteFile 14176->14167 14177->14168 14177->14176 14179->14168 14180 1734cb WideCharToMultiByte 14179->14180 14180->14167 14193->14195 14195->14168 14195->14171 14195->14175 14202 170bea __getptd_noexit 66 API calls 14201->14202 14203 16f65d 14202->14203 14203->14085 14242 1759f4 LeaveCriticalSection 14204->14242 14206 173707 14206->14094 14210 170703 LeaveCriticalSection 14207->14210 14209 1759f2 14209->14128 14210->14209 14229 1758ec 14211->14229 14213 17564b 14214 175664 SetFilePointer 14213->14214 14215 175653 14213->14215 14217 17567c GetLastError 14214->14217 14218 17300b 14214->14218 14216 16f645 __mbsnbicmp_l 66 API calls 14215->14216 14216->14218 14217->14218 14218->14148 14230 175911 14229->14230 14231 1758f9 14229->14231 14234 16f658 __free_osfhnd 66 API calls 14230->14234 14235 175950 14230->14235 14232 16f658 __free_osfhnd 66 API calls 14231->14232 14233 1758fe 14232->14233 14236 16f645 __mbsnbicmp_l 66 API calls 14233->14236 14237 175922 14234->14237 14235->14213 14240 175906 14236->14240 14238 16f645 __mbsnbicmp_l 66 API calls 14237->14238 14239 17592a 14238->14239 14240->14213 14242->14206 14246 1759f4 LeaveCriticalSection 14243->14246 14245 17579a 14245->14119 14246->14245 14248 16d461 EnterCriticalSection 14247->14248 14249 16d44b 14247->14249 14248->13273 14250 1707dc __lock 66 API calls 14249->14250 14251 16d454 14250->14251 14251->13273 14253 16fd13 __fclose_nolock 66 API calls 14252->14253 14254 16e755 14253->14254 14255 1753c4 __flsbuf 66 API calls 14254->14255 14256 16e75b _puts 14255->14256 14257 16e7c2 14256->14257 14258 16e7a2 14256->14258 14257->13276 14259 171ef0 __malloc_crt 66 API calls 14258->14259 14260 16e7a8 14259->14260 14260->14257 14262 16e7ed 14261->14262 14264 16a9ae 14261->14264 14262->14264 14269 16fd6a 14262->14269 14265 16a9c6 14264->14265 14266 16a9cb _puts 14265->14266 14275 16d4ac 14266->14275 14268 16a9d6 14268->13274 14270 16fda5 14269->14270 14271 16fd83 14269->14271 14270->14264 14271->14270 14272 16fd13 __fclose_nolock 66 API calls 14271->14272 14273 16fd9e 14272->14273 14274 173635 __write 97 API calls 14273->14274 14274->14270 14276 16d4cf LeaveCriticalSection 14275->14276 14277 16d4bc 14275->14277 14276->14268 14280 170703 LeaveCriticalSection 14277->14280 14279 16d4cc 14279->14268 14280->14279 14282 165a94 _memcmp 14281->14282 14283 165a9b _memset 14281->14283 14284 16ab1a ___crtMessageBoxW 5 API calls 14282->14284 14286 16a9ef __snprintf 102 API calls 14283->14286 14285 165b68 14284->14285 14285->13303 14285->13304 14287 165ace 14286->14287 14376 165610 14287->14376 14290 163e50 _memset 14289->14290 14291 163e49 14289->14291 14293 16a9ef __snprintf 102 API calls 14290->14293 14292 16ab1a ___crtMessageBoxW 5 API calls 14291->14292 14377 16561d __write_nolock 14376->14377 14378 165633 14377->14378 14379 16563a CreateFileA 14377->14379 14381 16ab1a ___crtMessageBoxW 5 API calls 14378->14381 14379->14378 14380 165663 CryptAcquireContextA 14379->14380 14521 163531 GetVersionExA 14520->14521 14521->13508 14630 16d56e _doexit _strnlen 14629->14630 14631 16d57a 14630->14631 14635 16d5a6 14630->14635 14632 16f645 __mbsnbicmp_l 66 API calls 14631->14632 14633 16d57f 14632->14633 14634 16f5f3 __mbsnbicmp_l 11 API calls 14633->14634 14640 16d58a _doexit 14634->14640 14636 1707dc __lock 66 API calls 14635->14636 14637 16d5ad 14636->14637 14642 16d4db 14637->14642 14640->13574 14643 16d4f4 14642->14643 14644 16d4f0 14642->14644 14643->14644 14646 16d506 __output_l 14643->14646 14651 1721e9 14643->14651 14648 16d5d3 14644->14648 14646->14644 14661 1721cf 14646->14661 14834 170703 LeaveCriticalSection 14648->14834 14650 16d5da 14650->14640 14652 172204 14651->14652 14653 172269 14651->14653 14652->14653 14654 17220a WideCharToMultiByte 14652->14654 14655 171f35 __calloc_crt 66 API calls 14652->14655 14656 17222d WideCharToMultiByte 14652->14656 14660 16b604 _free 66 API calls 14652->14660 14664 177ccc 14652->14664 14653->14646 14654->14652 14654->14653 14655->14652 14656->14652 14657 172275 14656->14657 14658 16b604 _free 66 API calls 14657->14658 14658->14653 14660->14652 14753 1720f1 14661->14753 14665 177cf6 14664->14665 14666 177ce1 14664->14666 14668 177d54 14665->14668 14709 178d0e 14665->14709 14667 16f645 __mbsnbicmp_l 66 API calls 14666->14667 14669 177ce6 14667->14669 14670 16f645 __mbsnbicmp_l 66 API calls 14668->14670 14672 16f5f3 __mbsnbicmp_l 11 API calls 14669->14672 14697 177cf1 14670->14697 14672->14697 14674 177d35 14676 177d92 14674->14676 14677 177d67 14674->14677 14678 177d4b 14674->14678 14676->14697 14720 177c1a 14676->14720 14682 171ef0 __malloc_crt 66 API calls 14677->14682 14677->14697 14680 1721e9 ___wtomb_environ 98 API calls 14678->14680 14683 177d50 14680->14683 14684 177d77 14682->14684 14683->14668 14683->14676 14684->14676 14689 171ef0 __malloc_crt 66 API calls 14684->14689 14684->14697 14685 177ef9 14687 16b604 _free 66 API calls 14685->14687 14686 177dc1 14688 16b604 _free 66 API calls 14686->14688 14687->14697 14692 177dcb 14688->14692 14689->14676 14690 177e0f 14690->14685 14691 171fd0 __recalloc_crt 71 API calls 14690->14691 14690->14697 14694 177dd1 __output_l 14691->14694 14692->14694 14724 171fd0 14692->14724 14696 171f35 __calloc_crt 66 API calls 14694->14696 14694->14697 14708 177ed3 14694->14708 14695 16b604 _free 66 API calls 14695->14697 14698 177e7c __output_l 14696->14698 14697->14652 14699 172280 _strcpy_s 66 API calls 14698->14699 14698->14708 14700 177e96 14699->14700 14701 177eef 14700->14701 14702 177e9d SetEnvironmentVariableA 14700->14702 14708->14695 14708->14697 14729 178c5e 14709->14729 14711 177d09 14711->14668 14711->14674 14712 177c6c 14711->14712 14713 177c7d 14712->14713 14717 177cc2 14712->14717 14713->14713 14714 171f35 __calloc_crt 66 API calls 14713->14714 14715 177c94 14714->14715 14716 177ca6 14715->14716 14718 16b0b6 __amsg_exit 66 API calls 14715->14718 14716->14717 14736 178c0c 14716->14736 14717->14674 14718->14716 14721 177c28 14720->14721 14722 1721cf __fassign 91 API calls 14721->14722 14723 177c4f 14721->14723 14722->14721 14723->14686 14723->14690 14726 171fd9 14724->14726 14727 17201c 14726->14727 14728 171ffd Sleep 14726->14728 14744 177812 14726->14744 14727->14694 14728->14726 14730 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14729->14730 14731 178c72 14730->14731 14732 178c8b __mbschr_l 14731->14732 14733 16f645 __mbsnbicmp_l 66 API calls 14731->14733 14732->14711 14734 178c80 14733->14734 14735 16f5f3 __mbsnbicmp_l 11 API calls 14734->14735 14735->14732 14737 178c1d __output_l 14736->14737 14738 178c19 14736->14738 14739 16b63e _malloc 66 API calls 14737->14739 14738->14716 14740 178c30 14739->14740 14740->14738 14741 172280 _strcpy_s 66 API calls 14740->14741 14742 178c42 14741->14742 14742->14738 14743 16f5a1 __invoke_watson 10 API calls 14742->14743 14743->14738 14745 177821 14744->14745 14746 17783c 14744->14746 14745->14746 14747 17782d 14745->14747 14748 177851 14746->14748 14749 172022 __recalloc 67 API calls 14746->14749 14749->14748 14754 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14753->14754 14755 172105 14754->14755 14756 172126 14755->14756 14758 172151 14755->14758 14769 17210e 14755->14769 14757 16f645 __mbsnbicmp_l 66 API calls 14756->14757 14759 17212b 14757->14759 14760 17216d 14758->14760 14761 17215b 14758->14761 14764 16f5f3 __mbsnbicmp_l 11 API calls 14759->14764 14762 172175 14760->14762 14763 172189 14760->14763 14765 16f645 __mbsnbicmp_l 66 API calls 14761->14765 14771 177b30 14762->14771 14791 177aee 14763->14791 14764->14769 14768 172160 14765->14768 14770 16f5f3 __mbsnbicmp_l 11 API calls 14768->14770 14769->14646 14770->14769 14772 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14771->14772 14773 177b44 14772->14773 14774 177b65 14773->14774 14775 177b90 14773->14775 14789 177b4d 14773->14789 14776 16f645 __mbsnbicmp_l 66 API calls 14774->14776 14777 177bac 14775->14777 14778 177b9a 14775->14778 14779 177b6a 14776->14779 14781 177bb6 14777->14781 14782 177bcb 14777->14782 14780 16f645 __mbsnbicmp_l 66 API calls 14778->14780 14783 16f5f3 __mbsnbicmp_l 11 API calls 14779->14783 14784 177b9f 14780->14784 14796 178a9e 14781->14796 14786 177aee ___crtCompareStringA 82 API calls 14782->14786 14783->14789 14787 16f5f3 __mbsnbicmp_l 11 API calls 14784->14787 14788 177be5 14786->14788 14787->14789 14788->14789 14790 16f645 __mbsnbicmp_l 66 API calls 14788->14790 14789->14769 14790->14789 14792 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14791->14792 14793 177b01 14792->14793 14812 177880 14793->14812 14797 178ab3 14796->14797 14807 178ad5 ___ascii_strnicmp 14796->14807 14798 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 14797->14798 14799 178abe 14798->14799 14800 178ac5 14799->14800 14801 178af3 14799->14801 14802 16f645 __mbsnbicmp_l 66 API calls 14800->14802 14804 178afd 14801->14804 14811 178b1e 14801->14811 14803 178aca 14802->14803 14805 16f5f3 __mbsnbicmp_l 11 API calls 14803->14805 14806 16f645 __mbsnbicmp_l 66 API calls 14804->14806 14805->14807 14808 178b02 14806->14808 14807->14789 14810 16f5f3 __mbsnbicmp_l 11 API calls 14808->14810 14809 177fbc 85 API calls __tolower_l 14809->14811 14810->14807 14811->14807 14811->14809 14813 1778a7 14812->14813 14816 1779b1 MultiByteToWideChar 14813->14816 14817 177937 GetCPInfo 14813->14817 14821 1778eb 14813->14821 14814 16ab1a ___crtMessageBoxW 5 API calls 14815 177aec 14814->14815 14815->14769 14819 1779d3 14816->14819 14816->14821 14818 177948 14817->14818 14817->14821 14818->14816 14818->14821 14822 16b63e _malloc 66 API calls 14819->14822 14826 1779ee __crtCompareStringA_stat 14819->14826 14820 177a28 MultiByteToWideChar 14823 177a41 MultiByteToWideChar 14820->14823 14824 177acf 14820->14824 14821->14814 14822->14826 14823->14824 14827 177a58 14823->14827 14825 176a4f __freea 66 API calls 14824->14825 14825->14821 14826->14820 14826->14821 14829 16b63e _malloc 66 API calls 14827->14829 14833 177a6e __crtCompareStringA_stat 14827->14833 14828 177a9f MultiByteToWideChar 14830 177ab2 CompareStringW 14828->14830 14831 177ac9 14828->14831 14829->14833 14830->14831 14832 176a4f __freea 66 API calls 14831->14832 14832->14824 14833->14824 14833->14828 14834->14650 14836 16957b RegQueryValueExA RegCloseKey 14835->14836 14838 169577 14835->14838 14837 1695bd 14836->14837 14836->14838 14837->14838 14839 16a932 _wprintf 104 API calls 14837->14839 14838->13584 14840 169470 RegOpenKeyExA 14838->14840 14839->14838 14841 16949b RegSetValueExA RegCloseKey 14840->14841 14842 169497 14840->14842 14841->14842 14842->13584 14842->13592 14885 168550 LoadLibraryA LoadLibraryA 14843->14885 14846 16a350 14849 16a363 14846->14849 14855 16a37c _memset 14846->14855 14847 16a33c 14848 16a932 _wprintf 104 API calls 14847->14848 14868 16a346 14848->14868 14851 16a932 _wprintf 104 API calls 14849->14851 14850 16ab1a ___crtMessageBoxW 5 API calls 14852 16a2fa 14850->14852 14853 16a36d 14851->14853 14852->13589 14882 1694f0 RegOpenKeyExA 14852->14882 14890 168630 14853->14890 14856 16a3e2 14855->14856 14857 16a3bf 14855->14857 14860 16a46d 14856->14860 14861 16a44a 14856->14861 14858 16a932 _wprintf 104 API calls 14857->14858 14859 16a3c9 14858->14859 14864 168630 2 API calls 14859->14864 14863 16a932 _wprintf 104 API calls 14860->14863 14866 16a480 14860->14866 14862 16a932 _wprintf 104 API calls 14861->14862 14867 16a454 14862->14867 14863->14866 14864->14868 14865 16a4d2 14875 16a932 _wprintf 104 API calls 14865->14875 14866->14865 14869 16a49e 14866->14869 14895 1695f0 14866->14895 14872 168630 2 API calls 14867->14872 14868->14850 14871 16a932 _wprintf 104 API calls 14869->14871 14873 16a4ab 14871->14873 14872->14868 14967 1687c0 14873->14967 14877 16a4ff 14875->14877 15065 16a080 14877->15065 14879 16a932 _wprintf 104 API calls 14879->14865 14881 168630 2 API calls 14881->14868 14883 169517 14882->14883 14884 16951b RegDeleteValueA RegCloseKey 14882->14884 14883->13589 14884->14883 14886 168583 14885->14886 14887 16857c 14885->14887 14888 16859f 6 API calls 14886->14888 14889 16858c FreeLibrary 14886->14889 14887->14846 14887->14847 14888->14887 14889->14887 14891 16863c FreeLibrary 14890->14891 14892 168648 14890->14892 14891->14892 14893 168651 FreeLibrary 14892->14893 14894 16865e 14892->14894 14893->14894 14894->14868 14896 16960b 14895->14896 14966 169606 14895->14966 14897 16a932 _wprintf 104 API calls 14896->14897 14898 169615 14897->14898 14901 16a932 _wprintf 104 API calls 14898->14901 14899 16ab1a ___crtMessageBoxW 5 API calls 14900 1699e7 14899->14900 14900->14869 14902 169626 14901->14902 14903 16a932 _wprintf 104 API calls 14902->14903 14904 169633 14903->14904 14905 169649 14904->14905 15087 1692f0 14904->15087 14906 16a932 _wprintf 104 API calls 14905->14906 14908 169656 14906->14908 14909 16966e 14908->14909 14910 1692f0 106 API calls 14908->14910 14910->14909 14966->14899 14968 1687e0 14967->14968 15064 1687d9 14967->15064 14969 1687f7 14968->14969 14970 1689f5 14968->14970 14968->15064 14973 16add2 143 API calls 14969->14973 14972 16add2 143 API calls 14970->14972 14971 16ab1a ___crtMessageBoxW 5 API calls 14974 168fb8 14971->14974 14975 1689f0 14972->14975 14976 168805 14973->14976 14974->14865 14974->14879 14977 168a1c htonl htonl 14975->14977 14975->15064 14978 16881e htons 14976->14978 14976->15064 14979 16e010 99 API calls 14977->14979 15114 16e010 14978->15114 14981 168a44 14979->14981 14984 16e010 99 API calls 14981->14984 15064->14971 15066 16a0a8 15065->15066 15067 16a0c5 _memset 15066->15067 15068 16a0b1 15066->15068 15072 16a0ff 15067->15072 15074 16a11d 15067->15074 15069 16a932 _wprintf 104 API calls 15068->15069 15086 16a0bb 15069->15086 15070 16ab1a ___crtMessageBoxW 5 API calls 15071 16a296 15070->15071 15071->14881 15073 16a932 _wprintf 104 API calls 15072->15073 15073->15086 15081 16a184 15074->15081 15074->15086 15281 1699f0 15074->15281 15076 16a23e 15346 168670 15076->15346 15078 16a932 _wprintf 104 API calls 15078->15081 15081->15076 15081->15078 15328 169f10 15081->15328 15338 169dc0 15081->15338 15086->15070 15088 169309 15087->15088 15089 16a932 _wprintf 104 API calls 15088->15089 15090 169317 15089->15090 15115 16e01c _doexit 15114->15115 15116 16e034 15115->15116 15117 16e04c 15115->15117 15118 16e044 _doexit 15115->15118 15282 16a932 _wprintf 104 API calls 15281->15282 15283 169a16 15282->15283 15284 16a932 _wprintf 104 API calls 15283->15284 15285 169a2a 15284->15285 15329 169f23 15328->15329 15331 169f1c 15328->15331 15330 16b63e _malloc 66 API calls 15329->15330 15329->15331 15333 169f4c _memset _memmove 15330->15333 15331->15081 15333->15331 15339 169dd3 15338->15339 15342 169dcc 15338->15342 15340 16b63e _malloc 66 API calls 15339->15340 15339->15342 15341 169dfc _memset _memmove 15340->15341 15341->15342 15342->15081 15347 16868a 15346->15347 15355 168686 15346->15355 15348 16add2 143 API calls 15347->15348 15350 16ab1a ___crtMessageBoxW 5 API calls 15355->15350 15371 170c63 __getptd 66 API calls 15370->15371 15372 16dc32 15371->15372 15373 16ab1a ___crtMessageBoxW 5 API calls 15372->15373 15374 165c1a 15373->15374 15374->13630 15374->13632 15375->13637 15377 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 15376->15377 15380 16cd53 15377->15380 15378 16cd63 15379 16f645 __mbsnbicmp_l 66 API calls 15378->15379 15381 16cd68 15379->15381 15380->15378 15383 16cd99 15380->15383 15382 16f5f3 __mbsnbicmp_l 11 API calls 15381->15382 15387 16cd73 15382->15387 15385 16cde0 15383->15385 15388 171e38 15383->15388 15386 16f645 __mbsnbicmp_l 66 API calls 15385->15386 15385->15387 15386->15387 15387->12286 15389 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 15388->15389 15390 171e4c 15389->15390 15391 1722fc __isleadbyte_l 76 API calls 15390->15391 15394 171e59 15390->15394 15392 171e81 15391->15392 15393 1770f7 ___crtGetStringTypeA 79 API calls 15392->15393 15393->15394 15394->15383 15396 165890 15395->15396 15403 165889 15395->15403 15397 16589d LoadLibraryA 15396->15397 15396->15403 15398 1658b8 GetProcAddress 15397->15398 15397->15403 15400 1658d6 15398->15400 15401 1658ea _memset 15398->15401 15399 16ab1a ___crtMessageBoxW 5 API calls 15402 161075 15399->15402 15400->15403 15404 1658dc FreeLibrary 15400->15404 15405 16a9ef __snprintf 102 API calls 15401->15405 15402->13697 15402->13698 15403->15399 15404->15403 15406 16591a 15405->15406 15407 17b099 82 API calls 15406->15407 15408 165929 15407->15408 15408->15403 15409 165943 FreeLibrary 15408->15409 15409->15403 15411 165980 15410->15411 15422 165979 15410->15422 15412 16598d LoadLibraryA 15411->15412 15411->15422 15413 1659a8 GetProcAddress 15412->15413 15412->15422 15415 1659d4 _memset 15413->15415 15416 1659c0 15413->15416 15414 16ab1a ___crtMessageBoxW 5 API calls 15417 1610a1 15414->15417 15423 16dbe5 15415->15423 15418 1659c6 FreeLibrary 15416->15418 15416->15422 15417->13702 15417->13703 15418->15422 15420 1659ff __output_l 15421 165a36 FreeLibrary 15420->15421 15420->15422 15421->15422 15422->15414 15424 16dbf3 15423->15424 15427 16da83 15424->15427 15426 16dc0a 15426->15420 15428 16da96 15427->15428 15429 16dac6 15428->15429 15430 16dab1 15428->15430 15445 16da9b __output_l 15428->15445 15432 16ccb8 _LocaleUpdate::_LocaleUpdate 76 API calls 15429->15432 15431 16f645 __mbsnbicmp_l 66 API calls 15430->15431 15433 16dab6 15431->15433 15434 16dad1 15432->15434 15435 16f5f3 __mbsnbicmp_l 11 API calls 15433->15435 15436 16db93 15434->15436 15437 16dadc 15434->15437 15435->15445 15439 16dba1 MultiByteToWideChar 15436->15439 15436->15445 15438 16db0b MultiByteToWideChar 15437->15438 15437->15445 15440 16db27 GetLastError 15438->15440 15438->15445 15441 16dbb5 15439->15441 15439->15445 15445->15426 15450 1635b6 _memset 15449->15450 15451 1635cc GetModuleFileNameA 15450->15451 15452 16363c 15451->15452 15453 1635e7 15451->15453 15455 16ab1a ___crtMessageBoxW 5 API calls 15452->15455 15454 16a9ef __snprintf 102 API calls 15453->15454 15456 163604 15454->15456 15457 163661 15455->15457 15490 167410 15456->15490 15457->13769 15457->13770 15460 16362a Sleep 15463 1678f4 CreateFileA 15462->15463 15464 163731 15462->15464 15491 167423 15490->15491 15496 163618 15490->15496 15492 16742d OpenSCManagerA 15491->15492 15491->15496 15492->15496 15496->15452 15496->15460 15529 16ad22 _doexit 15526->15529 15527 16ad35 15528 16f645 __mbsnbicmp_l 66 API calls 15527->15528 15530 16ad3a 15528->15530 15529->15527 15531 16ad62 15529->15531 15532 16f5f3 __mbsnbicmp_l 11 API calls 15530->15532 15545 1703d9 15531->15545 15542 16ad45 _doexit @_EH4_CallFilterFunc@8 15532->15542 15542->13820 15546 1703e5 _doexit 15545->15546 15547 1707dc __lock 66 API calls 15546->15547 15560 1703f3 15547->15560 15548 170468 15587 170503 15548->15587 15549 17046f 15550 171ef0 __malloc_crt 66 API calls 15549->15550 15552 170476 15550->15552 15552->15548 15554 170484 InitializeCriticalSectionAndSpinCount 15552->15554 15557 17071a __mtinitlocknum 66 API calls 15557->15560 15558 16d43e _puts 67 API calls 15558->15560 15560->15548 15560->15549 15560->15557 15560->15558 15561 16d4ac __getstream 2 API calls 15560->15561 15561->15560 15590 170703 LeaveCriticalSection 15587->15590 15589 17050a 15590->15589 15926 16d470 __fsopen 2 API calls 15925->15926 15927 16ad14 15926->15927 15927->13835 15929 16ab4e 15928->15929 15930 16ab3a 15928->15930 15932 16ab4a 15929->15932 15933 16fd6a __flush 97 API calls 15929->15933 15931 16f645 __mbsnbicmp_l 66 API calls 15930->15931 15934 16ab3f 15931->15934 15944 16ac02 15932->15944 15935 16ab5a 15933->15935 15936 16f5f3 __mbsnbicmp_l 11 API calls 15934->15936 15947 16fd39 15935->15947 15936->15932 15939 16fd13 __fclose_nolock 66 API calls 15945 16d470 __fsopen 2 API calls 15944->15945 15946 16ac08 15945->15946 15946->13853 15948 16ab62 15947->15948 15949 16fd49 15947->15949 15948->15939 15949->15948 15950 16b604 _free 66 API calls 15949->15950 15950->15948 15979 1649e0 15978->15979 16053 1649f2 15978->16053 15981 1649f9 LoadLibraryA GetProcAddress 15979->15981 15979->16053 15980 16ab1a ___crtMessageBoxW 5 API calls 15982 16275a 15980->15982 15983 164a34 __output_l 15981->15983 15984 164a20 15981->15984 16053->15980 16152 165300 GetOldestEventLogRecord 16121->16152 16153 165326 GetLastError 16152->16153 16154 16533e GetNumberOfEventLogRecords 16152->16154 16175 167cbe CreateFileA 16174->16175 16183 167cb7 16174->16183 16191 16af2c 16188->16191 16190 16b093 16192 16af38 _doexit 16191->16192 16193 1707dc __lock 61 API calls 16192->16193 16194 16af3f 16193->16194 16195 16af6a DecodePointer 16194->16195 16201 16afe9 16194->16201 16197 16af81 DecodePointer 16195->16197 16195->16201 16210 16af94 16197->16210 16198 16b066 _doexit 16198->16190 16214 16b057 16201->16214 16202 16b04e 16204 16b057 16202->16204 16205 16ae14 _doexit 3 API calls 16202->16205 16206 16b064 16204->16206 16219 170703 LeaveCriticalSection 16204->16219 16205->16204 16206->16190 16208 16afab DecodePointer 16213 170ab3 EncodePointer 16208->16213 16210->16201 16210->16208 16211 16afba DecodePointer DecodePointer 16210->16211 16212 170ab3 EncodePointer 16210->16212 16211->16210 16212->16210 16213->16210 16215 16b05d 16214->16215 16217 16b037 16214->16217 16220 170703 LeaveCriticalSection 16215->16220 16217->16198 16218 170703 LeaveCriticalSection 16217->16218 16218->16202 16219->16206 16220->16217 16399 170833 16400 170836 16399->16400 16403 176967 16400->16403 16412 1708ae DecodePointer 16403->16412 16405 17696c 16406 176977 16405->16406 16413 1708bb 16405->16413 16408 16f478 __call_reportfault 8 API calls 16406->16408 16410 17698f 16406->16410 16408->16410 16409 16b082 _raise 66 API calls 16411 176999 16409->16411 16410->16409 16412->16405 16417 1708c7 _doexit 16413->16417 16414 170922 16415 170904 DecodePointer 16414->16415 16420 170931 16414->16420 16421 1708f3 _siglookup 16415->16421 16416 1708ee 16418 170bea __getptd_noexit 66 API calls 16416->16418 16417->16414 16417->16415 16417->16416 16423 1708ea 16417->16423 16418->16421 16422 16f645 __mbsnbicmp_l 66 API calls 16420->16422 16425 17098e 16421->16425 16427 16b082 _raise 66 API calls 16421->16427 16433 1708fc _doexit 16421->16433 16424 170936 16422->16424 16423->16416 16423->16420 16426 16f5f3 __mbsnbicmp_l 11 API calls 16424->16426 16428 1707dc __lock 66 API calls 16425->16428 16429 170999 16425->16429 16426->16433 16427->16425 16428->16429 16431 1709ce 16429->16431 16434 170ab3 EncodePointer 16429->16434 16435 170a22 16431->16435 16433->16406 16434->16431 16436 170a2f 16435->16436 16437 170a28 16435->16437 16436->16433 16439 170703 LeaveCriticalSection 16437->16439 16439->16436 16467 170c7d 16469 170c89 _doexit 16467->16469 16468 170ca1 16471 170caf 16468->16471 16473 16b604 _free 66 API calls 16468->16473 16469->16468 16470 16b604 _free 66 API calls 16469->16470 16472 170d8b _doexit 16469->16472 16470->16468 16474 170cbd 16471->16474 16476 16b604 _free 66 API calls 16471->16476 16473->16471 16475 170ccb 16474->16475 16477 16b604 _free 66 API calls 16474->16477 16478 16b604 _free 66 API calls 16475->16478 16479 170cd9 16475->16479 16476->16474 16477->16475 16478->16479 16480 170ce7 16479->16480 16481 16b604 _free 66 API calls 16479->16481 16482 170cf5 16480->16482 16484 16b604 _free 66 API calls 16480->16484 16481->16480 16483 170d06 16482->16483 16485 16b604 _free 66 API calls 16482->16485 16486 1707dc __lock 66 API calls 16483->16486 16484->16482 16485->16483 16487 170d0e 16486->16487 16488 170d33 16487->16488 16489 170d1a InterlockedDecrement 16487->16489 16503 170d97 16488->16503 16489->16488 16490 170d25 16489->16490 16490->16488 16493 16b604 _free 66 API calls 16490->16493 16493->16488 16494 1707dc __lock 66 API calls 16495 170d47 16494->16495 16496 170d78 16495->16496 16497 171b8e ___removelocaleref 8 API calls 16495->16497 16506 170da3 16496->16506 16501 170d5c 16497->16501 16500 16b604 _free 66 API calls 16500->16472 16501->16496 16502 171c27 ___freetlocinfo 66 API calls 16501->16502 16502->16496 16509 170703 LeaveCriticalSection 16503->16509 16505 170d40 16505->16494 16510 170703 LeaveCriticalSection 16506->16510 16508 170d85 16508->16500 16509->16505 16510->16508

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 646 163fa0-163fb7 647 163fe8-163fea 646->647 648 163fb9-163fd1 646->648 651 164708-164715 call 16ab1a 647->651 649 163fd3-163fda 648->649 650 163fdc-163fe0 648->650 649->647 649->650 650->647 653 163fe2-163fe6 650->653 653->647 655 163fef-163ff9 653->655 656 164007-164011 655->656 657 163ffb-164005 655->657 659 16401d-164045 OpenProcess 656->659 657->656 658 164013 657->658 658->659 660 164047-16405e call 16a932 659->660 661 164063-164137 LoadLibraryA GetProcAddress * 3 call 16aaa0 call 16b4e0 call 16aaa0 call 16b4e0 659->661 660->651 672 164152-16419a VirtualAllocEx 661->672 673 164139-16414d 661->673 675 1641c6-164203 WriteProcessMemory 672->675 676 16419c-1641b0 call 16a932 672->676 674 164264-1642b0 VirtualAllocEx 673->674 680 1642b2-1642c6 call 16a932 674->680 681 164300-164329 WriteProcessMemory 674->681 678 164216-16422a call 16a932 675->678 679 164205-164214 675->679 688 1641b2-1641b9 CloseHandle 676->688 689 1641bf-1641c1 676->689 698 164247-16424e 678->698 699 16422c-164241 VirtualFreeEx 678->699 679->674 679->678 693 1642e3-1642ea 680->693 694 1642c8-1642dd VirtualFreeEx 680->694 683 164337-16434b call 16a932 681->683 684 16432b-164335 681->684 704 16434d-164362 VirtualFreeEx 683->704 705 164368-16436f 683->705 684->683 690 1643a9-1643d7 WriteProcessMemory 684->690 688->689 689->651 695 1643e7-1643fb call 16a932 690->695 696 1643d9-1643e5 690->696 701 1642ec-1642f3 CloseHandle 693->701 702 1642f9-1642fb 693->702 694->693 713 1643fd-164412 VirtualFreeEx 695->713 714 164418-16441f 695->714 696->695 700 164459-164472 GetVersionExA 696->700 706 164250-164257 CloseHandle 698->706 707 16425d-16425f 698->707 699->698 709 164474-16447e 700->709 710 164480-164487 700->710 701->702 702->651 704->705 711 164371-164386 VirtualFreeEx 705->711 712 16438c-164393 705->712 706->707 707->651 715 164493-16449a 709->715 710->715 716 164489 710->716 711->712 717 164395-16439c CloseHandle 712->717 718 1643a2-1643a4 712->718 713->714 721 164421-164436 VirtualFreeEx 714->721 722 16443c-164443 714->722 719 1644d2-1644f9 call 164840 715->719 720 16449c-1644d0 CreateRemoteThread 715->720 716->715 717->718 718->651 727 1644fe-164501 719->727 723 164507-16450e 720->723 721->722 725 164445-16444c CloseHandle 722->725 726 164452-164454 722->726 728 164510-16452b call 16a932 723->728 729 164589-16459f WaitForSingleObject 723->729 725->726 726->651 727->723 740 16452d-164542 VirtualFreeEx 728->740 741 164548-16454f 728->741 731 1645a5-1645a9 729->731 732 16468f-164696 729->732 731->732 733 1645af-1645b9 731->733 735 1646a5-1646ac 732->735 736 164698-16469f CloseHandle 732->736 733->732 737 1645bf-1645c9 733->737 738 1646ae-1646c3 VirtualFreeEx 735->738 739 1646c9-1646d0 735->739 736->735 737->732 742 1645cf-1645d6 737->742 738->739 743 1646d2-1646e7 VirtualFreeEx 739->743 744 1646ed-1646f4 739->744 740->741 745 164551-164566 VirtualFreeEx 741->745 746 16456c-164573 741->746 742->732 747 1645dc-16460d ReadProcessMemory 742->747 743->744 748 1646f6-1646fd CloseHandle 744->748 749 164703 744->749 745->746 750 164575-16457c CloseHandle 746->750 751 164582-164584 746->751 752 164620-164634 call 16a932 747->752 753 16460f-16461e 747->753 748->749 749->651 750->751 751->651 756 164636-16464b VirtualFreeEx 752->756 757 164651-164658 752->757 753->732 753->752 756->757 758 164675-16467c 757->758 759 16465a-16466f VirtualFreeEx 757->759 760 16467e-164685 CloseHandle 758->760 761 16468b-16468d 758->761 759->758 760->761 761->651
                            APIs
                            • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00164032
                            • _wprintf.LIBCMT ref: 00164054
                            • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00164068
                            • GetProcAddress.KERNEL32(?,LoadLibraryA), ref: 00164080
                            • GetProcAddress.KERNEL32(?,GetProcAddress), ref: 00164098
                            • GetProcAddress.KERNEL32(?,FreeLibrary), ref: 001640B0
                            • _memset.LIBCMT ref: 001640CA
                            • _strncpy.LIBCMT ref: 001640E2
                            • _memset.LIBCMT ref: 001640FF
                            • _strncpy.LIBCMT ref: 00164117
                            • VirtualAllocEx.KERNELBASE(000000FF,00000000,?,00001000,00000040), ref: 00164187
                            • _wprintf.LIBCMT ref: 001641A1
                            • CloseHandle.KERNEL32(00000000), ref: 001641B9
                            • WriteProcessMemory.KERNELBASE(000000FF,00000000,?,?,?), ref: 001641FB
                            • _wprintf.LIBCMT ref: 0016421B
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164241
                            • CloseHandle.KERNEL32(00000000), ref: 00164257
                            • VirtualAllocEx.KERNELBASE(000000FF,00000000,?,00001000,00000040), ref: 0016429D
                            • _wprintf.LIBCMT ref: 001642B7
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 001642DD
                            • CloseHandle.KERNEL32(00000000), ref: 001642F3
                            • WriteProcessMemory.KERNELBASE(000000FF,00000000,?,00000814,?), ref: 00164321
                            • _wprintf.LIBCMT ref: 0016433C
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164362
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164386
                            • CloseHandle.KERNEL32(00000000), ref: 0016439C
                            • WriteProcessMemory.KERNELBASE(000000FF,-00000818,00164720,?,00000814), ref: 001643CF
                            • _wprintf.LIBCMT ref: 001643EC
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164412
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164436
                            • CloseHandle.KERNEL32(00000000), ref: 0016444C
                            • GetVersionExA.KERNEL32(0000009C), ref: 0016446A
                            • CreateRemoteThread.KERNEL32(000000FF,00000000,00000000,-00000818,00000000,00000000,?), ref: 001644C4
                            • _wprintf.LIBCMT ref: 0016451C
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164542
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 00164566
                            • CloseHandle.KERNEL32(00000000), ref: 0016457C
                              • Part of subcall function 00164840: _memset.LIBCMT ref: 0016484E
                              • Part of subcall function 00164840: GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00164869
                              • Part of subcall function 00164840: _wprintf.LIBCMT ref: 0016487D
                            • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00164592
                            • ReadProcessMemory.KERNEL32(000000FF,00000000,?,?,?), ref: 00164605
                            • _wprintf.LIBCMT ref: 00164625
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 0016464B
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 0016466F
                            • CloseHandle.KERNEL32(00000000), ref: 00164685
                            • CloseHandle.KERNEL32(00000000), ref: 0016469F
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 001646C3
                            • VirtualFreeEx.KERNEL32(000000FF,00000000,00000000,00008000), ref: 001646E7
                            • CloseHandle.KERNEL32(00000000), ref: 001646FD
                            Strings
                            • LoadLibraryA, xrefs: 00164074
                            • FreeLibrary, xrefs: 001640A4
                            • Cannot write data to remote process, xrefs: 00164216
                            • Cannot write loader to remote process!, xrefs: 001643E7
                            • Cannot write loader params to remote process!, xrefs: 00164337
                            • Cannot open process with PID %d (%xh), xrefs: 0016404F
                            • GetProcAddress, xrefs: 0016408C
                            • Cannot run code in remote process! (mode:%d), xrefs: 00164517
                            • Cannot allocate loader in remote process!, xrefs: 001642B2
                            • Cannot read result from loader!., xrefs: 00164620
                            • Cannot allocate RWX memory in remote process, xrefs: 0016419C
                            • kernel32.dll, xrefs: 00164063
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Virtual$Free$Handle$Close_wprintf$Process$Memory$AddressProcWrite_memset$Alloc_strncpy$CreateLibraryLoadModuleObjectOpenReadRemoteSingleThreadVersionWait
                            • String ID: Cannot allocate RWX memory in remote process$Cannot allocate loader in remote process!$Cannot open process with PID %d (%xh)$Cannot read result from loader!.$Cannot run code in remote process! (mode:%d)$Cannot write data to remote process$Cannot write loader params to remote process!$Cannot write loader to remote process!$FreeLibrary$GetProcAddress$LoadLibraryA$kernel32.dll
                            • API String ID: 1282970728-3127454624
                            • Opcode ID: 6d02af90730016591c6015120ae858cebc3e8e54acc27938c613f716445cfa88
                            • Instruction ID: 2b862b231a7869e76a5699a0af70c26f4220defc2f0cddb0ac95d6fdb0213359
                            • Opcode Fuzzy Hash: 6d02af90730016591c6015120ae858cebc3e8e54acc27938c613f716445cfa88
                            • Instruction Fuzzy Hash: 4E1229B5A40218EFEB24DB54CC59FAA73B5BB48705F1182D9F209A7280C7749ED4CFA1

                            Control-flow Graph

                            APIs
                            • FindResourceA.KERNEL32(0016126C,?,BINARY), ref: 00164DD4
                            • LoadResource.KERNEL32(0016126C,00000000), ref: 00164DF2
                            • CloseHandle.KERNEL32(00000000), ref: 00164E05
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Resource$CloseFindHandleLoad
                            • String ID: BINARY
                            • API String ID: 3150125948-907554435
                            • Opcode ID: f4eab8b04e26975b4af27a0429a457013037fc55276595dd6c072b57fc71b4da
                            • Instruction ID: 5720b0ee0b60d1efed8d1a29fac7cafd6c3ad24d168e2f33b8abf69799901c15
                            • Opcode Fuzzy Hash: f4eab8b04e26975b4af27a0429a457013037fc55276595dd6c072b57fc71b4da
                            • Instruction Fuzzy Hash: 7951DD79A00209EFDB14DFB4DC59BAEBB74BB48701F108958FA16A7690C7789580CBA0

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 853 165610-16562b call 16d1a0 856 165633-165635 853->856 857 16562d-165631 853->857 859 165853-165860 call 16ab1a 856->859 857->856 858 16563a-16565a CreateFileA 857->858 860 165663-16567f CryptAcquireContextA 858->860 861 16565c-16565e 858->861 864 165692-1656b0 CryptCreateHash 860->864 865 165681-16568d CloseHandle 860->865 861->859 866 1656d5-1656f4 ReadFile 864->866 867 1656b2-1656c0 CloseHandle 864->867 865->859 870 165766-16579b CloseHandle CryptGetHashParam 866->870 871 1656f6-165714 CryptHashData 866->871 868 1656c2-1656c8 CryptReleaseContext 867->868 869 1656ce-1656d0 867->869 868->869 869->859 872 1657a3-1657b8 call 16a932 870->872 873 16579d-1657a1 870->873 874 165756-16575d 871->874 875 165716-165727 call 16a932 871->875 890 1657c4-1657c8 872->890 891 1657ba-1657be CryptDestroyHash 872->891 873->872 878 1657da-1657f7 CryptGetHashParam 873->878 876 165761 874->876 877 16575f 874->877 885 165733-165737 875->885 886 165729-16572d CryptDestroyHash 875->886 876->866 877->870 882 16582c-165830 878->882 883 1657f9-16580a call 16a932 878->883 888 165832-165836 CryptDestroyHash 882->888 889 16583c-165840 882->889 899 165816-16581a 883->899 900 16580c-165810 CryptDestroyHash 883->900 892 165745-165751 CloseHandle 885->892 893 165739-16573f CryptReleaseContext 885->893 886->885 888->889 895 165842-165848 CryptReleaseContext 889->895 896 16584e 889->896 897 1657d6-1657d8 890->897 898 1657ca-1657d0 CryptReleaseContext 890->898 891->890 892->859 893->892 895->896 896->859 897->859 898->897 901 16581c-165822 CryptReleaseContext 899->901 902 165828-16582a 899->902 900->899 901->902 902->859
                            APIs
                            • CreateFileA.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0016564D
                            • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000), ref: 00165672
                            • CloseHandle.KERNEL32(000000FF), ref: 00165685
                            • CryptCreateHash.ADVAPI32(00000000,00008004,00000000,00000000,00000000), ref: 001656A3
                            • CloseHandle.KERNEL32(000000FF), ref: 001656B6
                            • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 001656C8
                            Strings
                            • Error: while hashing..., xrefs: 00165716
                            • Error: HASH SIZE error or mismtach. HashSize: %d.., xrefs: 001657A7
                            • Error: When obtaining hash value.., xrefs: 001657F9
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Crypt$CloseContextCreateHandle$AcquireFileHashRelease
                            • String ID: Error: HASH SIZE error or mismtach. HashSize: %d..$Error: When obtaining hash value..$Error: while hashing...
                            • API String ID: 2095714343-3643478213
                            • Opcode ID: 519c1dadf6f3cfcc040ef9d8555943ed5430f19723c748861d4eb5b473b35b32
                            • Instruction ID: 2f7a75b2bed424c8889bbd456a92bfd0c82f3e1226c1623b81f6c848e69cde8b
                            • Opcode Fuzzy Hash: 519c1dadf6f3cfcc040ef9d8555943ed5430f19723c748861d4eb5b473b35b32
                            • Instruction Fuzzy Hash: 7C713C75E00209EFDB14DFE4CC49BEEB7BAAB08705F508518F206A6590D7789AD4CFA1

                            Control-flow Graph

                            APIs
                            • _memset.LIBCMT ref: 00163E5E
                            • __snprintf.LIBCMT ref: 00163E7B
                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00163E96
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CreateSnapshotToolhelp32__snprintf_memset
                            • String ID:
                            • API String ID: 4273142971-0
                            • Opcode ID: 1fda9187506d3a943a7e49061153c951c62af225a1b5f76c9a754919c21f66eb
                            • Instruction ID: 512ae45169a155d737d3c4f662740c92a05d538928417012b58114920077dbaf
                            • Opcode Fuzzy Hash: 1fda9187506d3a943a7e49061153c951c62af225a1b5f76c9a754919c21f66eb
                            • Instruction Fuzzy Hash: 18316571D04218ABDB24EB70DC86BDAB37CAF58704F4045D8B61DA6181FB719B94CFA1

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1055 1647a0-1647d3 GetCurrentProcess OpenProcessToken 1056 1647d7-1647ea LookupPrivilegeValueA 1055->1056 1057 1647d5 1055->1057 1059 1647ee-164814 AdjustTokenPrivileges 1056->1059 1060 1647ec 1056->1060 1058 16481f-164823 1057->1058 1061 164825-164829 CloseHandle 1058->1061 1062 16482f-16483f call 16ab1a 1058->1062 1063 164816 1059->1063 1064 164818 1059->1064 1060->1058 1061->1062 1063->1058 1064->1058
                            APIs
                            • GetCurrentProcess.KERNEL32(00000020,00000000), ref: 001647C4
                            • OpenProcessToken.ADVAPI32(00000000), ref: 001647CB
                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 001647E2
                            • CloseHandle.KERNELBASE(00000000), ref: 00164829
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Process$CloseCurrentHandleLookupOpenPrivilegeTokenValue
                            • String ID: SeDebugPrivilege
                            • API String ID: 2654680240-2896544425
                            • Opcode ID: 31b15da33378c13dd088472ead95e20e80a912e788a190c2a1f7fe0987d2c45a
                            • Instruction ID: a2e822c97cd7b377f49fd948fca719d4221111ec48687ba2240544b244429c97
                            • Opcode Fuzzy Hash: 31b15da33378c13dd088472ead95e20e80a912e788a190c2a1f7fe0987d2c45a
                            • Instruction Fuzzy Hash: CE110C71E0020AEBEB14DFD0CC4ABAEBBB9EB14705F118159F605A7580D7B85A94CF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1067 1634d0-16354d call 163e30 GetCurrentProcessId ProcessIdToSessionId * 2 call 16aaa0 GetVersionExA 1072 163553-16355a 1067->1072 1073 16354f-163551 1067->1073 1075 163560-16356c 1072->1075 1076 16355c-16355e 1072->1076 1074 163577-163584 call 16ab1a 1073->1074 1077 163575 1075->1077 1078 16356e-163573 1075->1078 1076->1074 1077->1074 1078->1074
                            APIs
                            • GetCurrentProcessId.KERNEL32(?), ref: 001634FD
                            • ProcessIdToSessionId.KERNEL32(00000000), ref: 00163504
                            • ProcessIdToSessionId.KERNELBASE(?,?), ref: 00163518
                            • _memset.LIBCMT ref: 0016352C
                            • GetVersionExA.KERNEL32(0000009C), ref: 00163545
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Process$Session$CurrentVersion_memset
                            • String ID: lsass.exe
                            • API String ID: 946246566-3024872867
                            • Opcode ID: fca44992c675a3f2263d3350543a0a8a61eeb747e5ac83a911c056f0ec7837f7
                            • Instruction ID: 87d0b82af4697af2f2e83f2e438555c068ec33215ce4629391a53b7f517500a3
                            • Opcode Fuzzy Hash: fca44992c675a3f2263d3350543a0a8a61eeb747e5ac83a911c056f0ec7837f7
                            • Instruction Fuzzy Hash: EC115271E00318EFDB54DF60DC45BBA73B5AB04304F504599E50E97151EB30ABD48F92
                            APIs
                            Strings
                            • usersize: %.8xh, xrefs: 001666A1
                            • domainOff: %.8Xh, xrefs: 00166A9D
                            • unk1: %.8Xh, xrefs: 001668B9
                            • usernameLen: %.8Xh, xrefs: 00166A61
                            • Error: unknown target!., xrefs: 00165E8F
                            • Error: cannot read key!., xrefs: 00166201
                            • IV = , xrefs: 00166390
                            • nextEntry: %.8Xh, xrefs: 0016664F
                            • hashesRealLength: %.8Xh, xrefs: 00166938
                            • Error: cannot read IV from memory!., xrefs: 00166373
                            • userNamePtrUnicode: %.8xh, xrefs: 00166736
                            • Key = , xrefs: 001662DE
                            • domainLen: %.8Xh, xrefs: 00166A89
                            • Domain/Workgroup/Machine Name: , xrefs: 00166DDC
                            • usersize: %.8xh, xrefs: 0016671F
                            • primaryLength: %.8Xh, xrefs: 001668CD
                            • Error: Cannot read credentials!., xrefs: 00166802
                            • LSASRV.DLL, xrefs: 00165EC9
                            • h3DESKey = %.8Xh, xrefs: 00166225
                            • usernameOff: %.8Xh, xrefs: 00166A75
                            • Error: cannot read Logon session list address., xrefs: 0016643C
                            • Key Offset: %.8Xh, xrefs: 0016626A
                            • Username: , xrefs: 00166CA7
                            • %.2Xh , xrefs: 00166196
                            • nextEntry: %.8Xh, xrefs: 001665BB
                            • machinePtrUnicode: %.8Xh, xrefs: 001666E6
                            • Error: cannot List Session List Entry!., xrefs: 00166589
                            • Error: cannot List Session List Entry!., xrefs: 0016661D
                            • prevEntry: %.8Xh, xrefs: 0016668A
                            • PkgId: %.8Xh, xrefs: 00166838
                            • Cannot read key from memory!., xrefs: 001662C1
                            • Error: unknown windows familiy., xrefs: 001663ED
                            • Error: Cannot read machinePtrUnicode!., xrefs: 00166DBF
                            • machineSize: %.8Xh, xrefs: 0016674D
                            • primaryPtr: %.8Xh, xrefs: 001668E1
                            • prevEntry: %.8Xh, xrefs: 00166708
                            • Cannot read ptr to SK Table from LSASS!., xrefs: 001660E3
                            • lsass.exe, xrefs: 00165F80
                            • Error: cannot read Logon Session List Count!., xrefs: 001664B4
                            • %.2Xh , xrefs: 001663CF
                            • userNamePtrUnicode: %.8xh, xrefs: 001666B8
                            • Session List Count: %d, xrefs: 001664E4
                            • unk1: %.8Xh, xrefs: 00166824
                            • Error: Cannot read usernamePtrUnicode!., xrefs: 00166C8A
                            • Could not enable debug privileges. You must run WCE under an account with administrator privileges., xrefs: 00165F56
                            • Error: cannot calculate relative addresses., xrefs: 00165EE3
                            • Reading from memory (safe mode), xrefs: 00165E36
                            • Cannot read ptr to DESXTable from LSASS!., xrefs: 00166137
                            • %.2Xh , xrefs: 0016631D
                            • L, xrefs: 00166580
                            • Error: cannot discover key offset., xrefs: 00166246
                            • DESXTable= , xrefs: 00166154
                            • Cannot read IV from LSASS!., xrefs: 0016602F
                            • Error: Cannot read credentials hash struct!., xrefs: 00166895
                            • Cannot get LSASS.EXE PID!, xrefs: 00165F9C
                            • IV = , xrefs: 0016604C
                            • Error: Cannot open LSASS.EXE!., xrefs: 00165FD3
                            • %.2Xh , xrefs: 0016608B
                            • hashesLength: %.8Xh, xrefs: 001668F5
                            • Error: cannor read hashes ptr!., xrefs: 0016698B
                            • machinePtrUnicode: %.8Xh, xrefs: 00166764
                            • Session List Address: %.8Xh, xrefs: 0016646C
                            • hashesPtr: %.8Xh, xrefs: 00166909
                            • ptrToCreds: %.8Xh, xrefs: 0016684C
                            • NTLM_CREDS_BLOCK (decrypted):, xrefs: 00166A4D
                            • machineSize: %.8Xh, xrefs: 001666CF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$_memset$LibraryLoad_memmove
                            • String ID: domainLen: %.8Xh$domainOff: %.8Xh$usernameLen: %.8Xh$usernameOff: %.8Xh$PkgId: %.8Xh$Username: $hashesLength: %.8Xh$hashesPtr: %.8Xh$hashesRealLength: %.8Xh$machinePtrUnicode: %.8Xh$machinePtrUnicode: %.8Xh$machineSize: %.8Xh$machineSize: %.8Xh$primaryLength: %.8Xh$primaryPtr: %.8Xh$ptrToCreds: %.8Xh$unk1: %.8Xh$unk1: %.8Xh$userNamePtrUnicode: %.8xh$userNamePtrUnicode: %.8xh$usersize: %.8xh$usersize: %.8xh$NTLM_CREDS_BLOCK (decrypted):$Domain/Workgroup/Machine Name: $%.2Xh $%.2Xh $%.2Xh $%.2Xh $Cannot get LSASS.EXE PID!$Cannot read IV from LSASS!.$Cannot read key from memory!.$Cannot read ptr to DESXTable from LSASS!.$Cannot read ptr to SK Table from LSASS!.$Could not enable debug privileges. You must run WCE under an account with administrator privileges.$DESXTable= $Error: cannot read IV from memory!.$Error: Cannot open LSASS.EXE!.$Error: Cannot read credentials hash struct!.$Error: Cannot read credentials!.$Error: Cannot read machinePtrUnicode!.$Error: Cannot read usernamePtrUnicode!.$Error: cannor read hashes ptr!.$Error: cannot List Session List Entry!.$Error: cannot List Session List Entry!.$Error: cannot calculate relative addresses.$Error: cannot discover key offset.$Error: cannot read Logon Session List Count!.$Error: cannot read Logon session list address.$Error: cannot read key!.$Error: unknown target!.$Error: unknown windows familiy.$IV = $IV = $Key = $Key Offset: %.8Xh$L$LSASRV.DLL$Reading from memory (safe mode)$Session List Address: %.8Xh$Session List Count: %d$h3DESKey = %.8Xh$lsass.exe$nextEntry: %.8Xh$nextEntry: %.8Xh$prevEntry: %.8Xh$prevEntry: %.8Xh
                            • API String ID: 1815589828-1333691579
                            • Opcode ID: 4594b40ea75ecee2840fb15684eb6e5c9de6c9234837aa1d7c245839709c5170
                            • Instruction ID: 9408f7252d680d3b227ab2d76db99f37940e581c40a24d9cca86e185a4f0fba0
                            • Opcode Fuzzy Hash: 4594b40ea75ecee2840fb15684eb6e5c9de6c9234837aa1d7c245839709c5170
                            • Instruction Fuzzy Hash: D0927DB5D44268DBDB24DB54DC45BE973B4AF58304F0482E8E50AA7281E7709FD4CFA2
                            APIs
                              • Part of subcall function 00161C50: _wprintf.LIBCMT ref: 00161C5E
                              • Part of subcall function 00161C50: _wprintf.LIBCMT ref: 00161C6B
                            • _memset.LIBCMT ref: 00162AAC
                            • _memset.LIBCMT ref: 00162AC2
                            • GetTempPathA.KERNEL32(000003FF,?), ref: 00162AD6
                            • GetCurrentDirectoryA.KERNEL32(000003F6,?), ref: 00162AF1
                            • __snprintf.LIBCMT ref: 00162B26
                            • SetConsoleCtrlHandler.KERNEL32(Function_000029C0,00000001), ref: 00162B35
                            • _memset.LIBCMT ref: 00162B6E
                            • _memset.LIBCMT ref: 00162B81
                            • _memset.LIBCMT ref: 00162B94
                            • _memset.LIBCMT ref: 00162BA7
                            • _wprintf.LIBCMT ref: 00162C26
                            • _wprintf.LIBCMT ref: 00162C6B
                            • _wprintf.LIBCMT ref: 00162C97
                            • _wprintf.LIBCMT ref: 00162D60
                            • _memset.LIBCMT ref: 00162D7D
                            • _strncpy.LIBCMT ref: 00162D98
                            • _memset.LIBCMT ref: 00162E0F
                            • _strncpy.LIBCMT ref: 00162E28
                            • __wcstoi64.LIBCMT ref: 00162E4D
                            • __wcstoi64.LIBCMT ref: 00162E68
                            • _wprintf.LIBCMT ref: 00162EDA
                            • _wprintf.LIBCMT ref: 00162F00
                            • _wprintf.LIBCMT ref: 00162F0D
                            • _wprintf.LIBCMT ref: 00162F23
                            • _wprintf.LIBCMT ref: 00162F46
                            • _wprintf.LIBCMT ref: 00162FD9
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 0016300F
                            • _wprintf.LIBCMT ref: 00163027
                            • _wprintf.LIBCMT ref: 00163055
                            • _wprintf.LIBCMT ref: 001630BF
                            • _fprintf.LIBCMT ref: 001630ED
                            • Sleep.KERNEL32(?), ref: 00163120
                            • _wprintf.LIBCMT ref: 00163194
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001631CA
                            • _wprintf.LIBCMT ref: 001631E2
                            • _wprintf.LIBCMT ref: 00163210
                            • _wprintf.LIBCMT ref: 0016322B
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 0016324F
                            • _wprintf.LIBCMT ref: 00163275
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00163299
                            • _wprintf.LIBCMT ref: 001632B1
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00163341
                            • _wprintf.LIBCMT ref: 00163370
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00163384
                            • _wprintf.LIBCMT ref: 001633AA
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001633CE
                            • _wprintf.LIBCMT ref: 001633E6
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00163410
                            • _wprintf.LIBCMT ref: 00163426
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$_memset$DeleteFileHandleModule$__wcstoi64_strncpy$ConsoleCtrlCurrentDirectoryHandlerPathSleepTemp__snprintf_fprintf
                            • String ID: Refreshing every %d seconds..$%s%s$-kKUSvflehHr::o:t:s:c:i:d:a:g:$.$C:\Users\user\AppData\Local\Temp\wceaux.dll$Cannot extract auxiliary DLL!$Cannot extract auxiliary DLL!$Cannot set event hook$Could not enable debug privileges. You must run WCE under an account with administrator privileges.$Current Logon Session LUID: %.8Xh$Error: Cannot extract auxiliary DLL!$Error: Cannot extract auxiliary DLL!$Forced Safe Mode Error: Delete NTLM credentials requires code injection.$Forced Safe Mode Error: Setting NTLM credentials requires code injection.$Forced Safe Mode Error: cannot read credentials using 'safe mode'.$Forced Safe Mode Error: cannot read credentials using 'safe mode'.$Invalid addresses supplied!.$No NTLM credentials were supplied!.$No addresses were supplied!.$No command was supplied!.$R.$Using WCE Windows Service..$Using WCE Windows Service..$Using WCE Windows Service..$Using supplied addresses.$wceaux.dll$1|$mv$$|
                            • API String ID: 814218132-447319926
                            • Opcode ID: 77c43738a492b46034c0c37063fd05a1f1f18a13946c3a860ea2661088fd0958
                            • Instruction ID: c0b7894a231f7ca4ed6279d852b609304fe113a13bb92a710771a7861af4cee7
                            • Opcode Fuzzy Hash: 77c43738a492b46034c0c37063fd05a1f1f18a13946c3a860ea2661088fd0958
                            • Instruction Fuzzy Hash: A43217B1D40214EBEB24BB60DC47B6972B1AF31705F5441A8F51962182EB729BF8CF63

                            Control-flow Graph

                            APIs
                            Strings
                            • LUID:%.8Xh, xrefs: 00162355
                            • lsass.exe, xrefs: 001621BD
                            • Reading by injecting code! (less-safe mode), xrefs: 001621B0
                            • Cannot get PID of LSASS.EXE!, xrefs: 001621D9
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 0016238B
                            • Logon Sessions Found: %d, xrefs: 0016226A
                            • Error in InjectDllAndCallFunction, xrefs: 001623A3
                            • Cannot alloc wceparams!., xrefs: 00162293
                            • %s\%s:%s, xrefs: 00162344
                            • Can't enumerate logon sessions!, xrefs: 00162246
                            • WCEGetNTLMCredentials, xrefs: 001622BD
                            • Error: Cannot open LSASS.EXE!., xrefs: 00162210
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$EnumerateLogonOpenProcessSessions_malloc_strcat
                            • String ID: LUID:%.8Xh$%s\%s:%s$C:\Users\user\AppData\Local\Temp\wceaux.dll$Can't enumerate logon sessions!$Cannot alloc wceparams!.$Cannot get PID of LSASS.EXE!$Error in InjectDllAndCallFunction$Error: Cannot open LSASS.EXE!.$Logon Sessions Found: %d$Reading by injecting code! (less-safe mode)$WCEGetNTLMCredentials$lsass.exe
                            • API String ID: 4050452349-3166370154
                            • Opcode ID: d9e4681230b3adb9e740af96a1913aba1bc189f2026fdb98102517cc4f4b55de
                            • Instruction ID: 296d6ab1abd36b64cb935cebfb0ae1e6bf78a824e9b6db5d15455a39a777799f
                            • Opcode Fuzzy Hash: d9e4681230b3adb9e740af96a1913aba1bc189f2026fdb98102517cc4f4b55de
                            • Instruction Fuzzy Hash: 3571D5B5D402189BEB24EB54DC82FDA7374AF64308F0482E8F50966281EF746BD4CF92

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 903 164840-164876 call 16aaa0 GetModuleHandleA 906 16488d-1648a3 GetProcAddress 903->906 907 164878-164888 call 16a932 903->907 909 1648a5-1648b5 call 16a932 906->909 910 1648ba-164924 906->910 913 16493b-16493e 907->913 909->913 916 164926-16492b call 16a932 910->916 917 164938 910->917 919 164930-164936 916->919 917->913 919->913
                            APIs
                            • _memset.LIBCMT ref: 0016484E
                            • GetModuleHandleA.KERNEL32(ntdll.dll), ref: 00164869
                            • _wprintf.LIBCMT ref: 0016487D
                            • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 00164896
                            • _wprintf.LIBCMT ref: 001648AA
                            Strings
                            • NtCreateThreadEx, xrefs: 0016488D
                            • ntdll.dll, xrefs: 00164864
                            • $, xrefs: 001648BA
                            • CrossSessionCreateRemoteThread: Cannot get ntdll.dll base address, xrefs: 00164878
                            • CrossSessionCreateRemoteThread: cannot get function address, xrefs: 001648A5
                            • CrossSessionCreateRemoteThread: Cannot create new thread, xrefs: 00164926
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$AddressHandleModuleProc_memset
                            • String ID: $$CrossSessionCreateRemoteThread: Cannot create new thread$CrossSessionCreateRemoteThread: Cannot get ntdll.dll base address$CrossSessionCreateRemoteThread: cannot get function address$NtCreateThreadEx$ntdll.dll
                            • API String ID: 4284075971-2308674594
                            • Opcode ID: 4ac42d55760046ad4e254bee80ab2ba692528c60f30d96fed913ed46e3ea5897
                            • Instruction ID: ef1b09b2a1d2e236f9b56ea712415a1ee26b4551bf8601c353965ea9504e35ee
                            • Opcode Fuzzy Hash: 4ac42d55760046ad4e254bee80ab2ba692528c60f30d96fed913ed46e3ea5897
                            • Instruction Fuzzy Hash: 27212BB0D40208AFDB10DFA4DC4ABDEBBB4AF58718F205218F515762C0E7B55658CF96

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 920 161880-1618a1 921 1618a3-1618a7 920->921 922 1618a9-1618ab 920->922 921->922 923 1618b0-1618c7 LsaGetLogonSessionData 921->923 924 161c3a-161c47 call 16ab1a 922->924 925 1618e5-1618ec 923->925 926 1618c9-1618d0 923->926 931 1618f5-16193d call 16aaa0 925->931 932 1618ee-1618f0 925->932 929 1618d2-1618d9 LsaFreeReturnBuffer 926->929 930 1618de-1618e0 926->930 929->930 930->924 935 161943-161956 931->935 936 1619e0-161a3c call 16aaa0 call 16b170 call 16aaa0 931->936 932->924 938 161970-161977 935->938 953 161a42-161a55 936->953 954 161adf-161b47 call 16aaa0 call 16b170 call 16aaa0 936->954 940 1619dc 938->940 941 161979-161986 938->941 940->936 943 161995-1619a3 941->943 944 161988-161993 941->944 946 1619a5-1619b0 943->946 947 1619b2-1619c0 943->947 944->940 946->940 948 1619d7 947->948 949 1619c2-1619d0 947->949 948->938 949->948 956 161a6f-161a76 953->956 971 161b4d-161b60 954->971 972 161bea-161c27 call 16aaa0 call 16b170 954->972 958 161adb 956->958 959 161a78-161a85 956->959 958->954 961 161a87-161a92 959->961 962 161a94-161aa2 959->962 961->958 963 161aa4-161aaf 962->963 964 161ab1-161abf 962->964 963->958 966 161ad6 964->966 967 161ac1-161acf 964->967 966->956 967->966 974 161b7a-161b81 971->974 986 161c35 972->986 987 161c29-161c30 LsaFreeReturnBuffer 972->987 976 161be6 974->976 977 161b83-161b90 974->977 976->972 978 161b92-161b9d 977->978 979 161b9f-161bad 977->979 978->976 981 161baf-161bba 979->981 982 161bbc-161bca 979->982 981->976 984 161be1 982->984 985 161bcc-161bda 982->985 984->974 985->984 986->924 987->986
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _memset$_memmove$BufferDataFreeLogonReturnSession
                            • String ID:
                            • API String ID: 779817456-0
                            • Opcode ID: 17ae38d4e0ca94848eb5e98c360b1f08f2cb8a5f5af9e657eac6f6f730746206
                            • Instruction ID: ae5290123275c89f05f3d37efb6c5e1f11ac0577fb94012b793b5f2111aeb324
                            • Opcode Fuzzy Hash: 17ae38d4e0ca94848eb5e98c360b1f08f2cb8a5f5af9e657eac6f6f730746206
                            • Instruction Fuzzy Hash: C3B139B090425CEBDB14CF54CC90BE9BBB5AF44308F2881E8D6496B281D7749AD4CFA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1016 1622dd-1622f8 1018 1624a2-1624ca call 16b604 LsaFreeReturnBuffer call 16ab1a 1016->1018 1019 1622fe-162315 call 161880 1016->1019 1023 16231a-162320 1019->1023 1025 162326-16232d 1023->1025 1026 16249d 1023->1026 1028 162362-162397 call 163fa0 1025->1028 1029 16232f-16235f call 16a932 * 2 1025->1029 1032 16239c-1623a1 1028->1032 1029->1028 1035 1623b5-1623c2 1032->1035 1036 1623a3-1623b0 call 16a932 1032->1036 1035->1026 1039 1623c8-16249a call 16aaa0 * 2 call 16b4e0 * 2 call 16b170 * 2 call 1615f0 1035->1039 1036->1026 1039->1026
                            APIs
                            • _wprintf.LIBCMT ref: 00162349
                            • _wprintf.LIBCMT ref: 0016235A
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                            • _wprintf.LIBCMT ref: 001623A8
                            • _free.LIBCMT ref: 001624A9
                            • LsaFreeReturnBuffer.SECUR32(?,?,?,?,?,0016128C), ref: 001624B8
                            Strings
                            • LUID:%.8Xh, xrefs: 00162355
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 0016238B
                            • Error in InjectDllAndCallFunction, xrefs: 001623A3
                            • %s\%s:%s, xrefs: 00162344
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$BufferFreeReturn__ftbuf__output_l__stbuf_free
                            • String ID: LUID:%.8Xh$%s\%s:%s$C:\Users\user\AppData\Local\Temp\wceaux.dll$Error in InjectDllAndCallFunction
                            • API String ID: 770965578-12513507
                            • Opcode ID: f96511cb391a8bb94354d59561c69e675818d7127f6afc921a2787744a2dd01e
                            • Instruction ID: 3e337aad000c683acfc1805f30eb2affa69339ff5002df9081647618d437f0f7
                            • Opcode Fuzzy Hash: f96511cb391a8bb94354d59561c69e675818d7127f6afc921a2787744a2dd01e
                            • Instruction Fuzzy Hash: 18118175D006189BDB24DF84DC81EEA73B4BF64304F1486DCE409A7241EB71AE95CF91

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1081 165a60-165a92 GetSystemWindowsDirectoryA 1082 165a94-165a96 1081->1082 1083 165a9b-165adf call 16aaa0 call 16a9ef call 165610 1081->1083 1084 165b5e-165b6b call 16ab1a 1082->1084 1092 165ae4-165af4 1083->1092 1093 165af6-165af8 1092->1093 1094 165afa-165b04 1092->1094 1093->1084 1095 165b15-165b23 1094->1095 1096 165b25-165b49 call 16b6d2 1095->1096 1097 165b5c 1095->1097 1100 165b5a 1096->1100 1101 165b4b-165b58 1096->1101 1097->1084 1100->1095 1101->1084
                            APIs
                            • GetSystemWindowsDirectoryA.KERNEL32(?,000003FF), ref: 00165A7F
                            • _memset.LIBCMT ref: 00165AA9
                            • __snprintf.LIBCMT ref: 00165AC9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: DirectorySystemWindows__snprintf_memset
                            • String ID: %s\system32\lsasrv.dll
                            • API String ID: 1322642736-3821454140
                            • Opcode ID: 28878445c677b0205ed2b1c164af67583faf5f9f12c99b30a98da08de56593c9
                            • Instruction ID: 4dc676ff314c4d49ce4003e900c6050cca0be1d7d3cacf8fd60ab63015a31079
                            • Opcode Fuzzy Hash: 28878445c677b0205ed2b1c164af67583faf5f9f12c99b30a98da08de56593c9
                            • Instruction Fuzzy Hash: A62191B0900118DBDB64DF24DC81BA9B3B6EF08304F4085D8E709A7181EB709AE9CF94

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1103 161c50-161c74 call 16a932 * 2
                            APIs
                            • _wprintf.LIBCMT ref: 00161C5E
                            • _wprintf.LIBCMT ref: 00161C6B
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                            Strings
                            • WCE %s (Windows Credentials Editor) - (c) 2010,2011 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com), xrefs: 00161C59
                            • Use -h for help., xrefs: 00161C66
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__ftbuf__output_l__stbuf
                            • String ID: Use -h for help.$WCE %s (Windows Credentials Editor) - (c) 2010,2011 Amplia Security - by Hernan Ochoa (hernan@ampliasecurity.com)
                            • API String ID: 2991887721-2980755961
                            • Opcode ID: 172d913edec0293c8f7114115471a2904cdb7451f05c29c052249ea61af74d7b
                            • Instruction ID: bf55d604f7ec09fd6d575396a4a6f7bfde9e2f550b94bda1e3e43b3dd69005d1
                            • Opcode Fuzzy Hash: 172d913edec0293c8f7114115471a2904cdb7451f05c29c052249ea61af74d7b
                            • Instruction Fuzzy Hash: 72C04CA29C42046BD1006AD56C4381732BC6B38B15B559074B90C55643E655B9A58AF3
                            APIs
                            • CreateNamedPipeA.KERNEL32(\\.\pipe\WCEServicePipe,00000003,00000000,000000FF,0000FA00,0000FA00,00000000,00000000), ref: 00168419
                            • _wprintf.LIBCMT ref: 00168431
                            • ConnectNamedPipe.KERNEL32(00000000,00000000), ref: 0016843F
                            • GetLastError.KERNEL32 ref: 00168455
                            • _wprintf.LIBCMT ref: 0016847F
                            • FlushFileBuffers.KERNEL32(?), ref: 00168497
                            • DisconnectNamedPipe.KERNEL32(?), ref: 001684A1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: NamedPipe$_wprintf$BuffersConnectCreateDisconnectErrorFileFlushLast
                            • String ID: Client connected!$Waiting for clients...$\\.\pipe\WCEServicePipe
                            • API String ID: 1579961968-1233419677
                            • Opcode ID: 51758811d5cc5e36d84c0f73746de3bb1817605e35b35c15cb13ba1fa02bdc8d
                            • Instruction ID: ad4aed31a6e19db351372f92b8c0584309cbbd20756b08a7c5b2badee2de06e6
                            • Opcode Fuzzy Hash: 51758811d5cc5e36d84c0f73746de3bb1817605e35b35c15cb13ba1fa02bdc8d
                            • Instruction Fuzzy Hash: 3C11E7B1B40205EBDB20DBA4EC0ABAD7774AB15700F244174F509666C1CF709690DB92
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000001), ref: 001674D3
                            • OpenServiceA.ADVAPI32(00000000,00000000,00010004), ref: 001674F3
                            • QueryServiceStatus.ADVAPI32(00000000,?), ref: 0016750A
                            • DeleteService.ADVAPI32(00000000), ref: 0016751E
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0016752C
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Service$Open$CloseDeleteHandleManagerQueryStatus
                            • String ID:
                            • API String ID: 661288909-0
                            • Opcode ID: 4d22bf0e244b50a942dbd5f1f6ab6b6c4981fc567122a2eb1c62740097e31697
                            • Instruction ID: d77a38f6a414b519968e061540905a3aaab6ab77ee0a0abb6bb104a79dbd6c2a
                            • Opcode Fuzzy Hash: 4d22bf0e244b50a942dbd5f1f6ab6b6c4981fc567122a2eb1c62740097e31697
                            • Instruction Fuzzy Hash: 3E211074E08208EBCB14DFB4DC48BAEB7B4AB08345F118998F517D6190EB74DAD0DBA0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 830d60b50d9efbe57338475a639a1262402a14993400b55e48abfecd0fba96b0
                            • Instruction ID: 308a914a381a60ca905341e7745e0e7a423c98cff61ce3ccb0ecd396b4d00708
                            • Opcode Fuzzy Hash: 830d60b50d9efbe57338475a639a1262402a14993400b55e48abfecd0fba96b0
                            • Instruction Fuzzy Hash: 3E115274648208FFDB14DFB4DD4DBAABB74AB08745F208558FA069A1C0DB749AD0DB90
                            APIs
                            • IsDebuggerPresent.KERNEL32 ref: 0016FB68
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0016FB7D
                            • UnhandledExceptionFilter.KERNEL32(0017C33C), ref: 0016FB88
                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0016FBA4
                            • TerminateProcess.KERNEL32(00000000), ref: 0016FBAB
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                            • String ID:
                            • API String ID: 2579439406-0
                            • Opcode ID: 682e164d68a252820de34c9af5f29e59f3523ca8a572e2b5bef69ffffdce6473
                            • Instruction ID: c36fb7508c72c031516a6a153769c176b32ed1d0dad6981d9eccc02587a3230b
                            • Opcode Fuzzy Hash: 682e164d68a252820de34c9af5f29e59f3523ca8a572e2b5bef69ffffdce6473
                            • Instruction Fuzzy Hash: 3B21CEB4911600EFD718DF68FC846447BB4BB48B08F48601AE4A9D7F61E7B09BC18F55
                            APIs
                            • StartServiceCtrlDispatcherA.ADVAPI32(00181610), ref: 001678B6
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CtrlDispatcherServiceStart
                            • String ID:
                            • API String ID: 3789849863-0
                            • Opcode ID: 6d4797dd699fe91ce2d82557879c5519d4ca097a1bcaa13c50eaba82541187ae
                            • Instruction ID: 9aa3e4dc7d308ab5771703fadc807f2f6a557c63ef4709af05b645e8ec801ca3
                            • Opcode Fuzzy Hash: 6d4797dd699fe91ce2d82557879c5519d4ca097a1bcaa13c50eaba82541187ae
                            • Instruction Fuzzy Hash: 5AE0BDB4C0020DABCB00EFD4CA096AEBBB8AB04308F6045989804B7240E7B45A188BE2
                            APIs
                            • SetUnhandledExceptionFilter.KERNEL32(Function_00014DC6), ref: 00174E0D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 3fe09349a3090c4a92d5e01edfbffe690fdb227d2b67128c3b376b9b47bc84f6
                            • Instruction ID: 7eccf01b70db1c68e3ea8b5768190365b23034cc245869f868b8a0755b36038a
                            • Opcode Fuzzy Hash: 3fe09349a3090c4a92d5e01edfbffe690fdb227d2b67128c3b376b9b47bc84f6
                            • Instruction Fuzzy Hash: D79002602515008F961067F49C0D40A26F06B596167C14564604AC4495DB504180D555
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                            • Instruction ID: d19a32ea63ea278e384ef8910b8c2eb91f379257e54c1e5a696647f132489f87
                            • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
                            • Instruction Fuzzy Hash: D9C18F73D0F5B6098B36462E48A823FEFA26E91B4131FC395DCD03F189D726AD6196D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                            • Instruction ID: f363f2654c1356615691883489fc64ae56dc9441dfe803b81c7cb9c32ff687c9
                            • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
                            • Instruction Fuzzy Hash: B4C19073D0E5B6058B35852E4CA823FEF62AE91B4131FC395CCD03F299D726AD6196D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                            • Instruction ID: 65088db00fb1c3cbd72044ac1004aed7e915260c760297bce339c6a6fc56d6b2
                            • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
                            • Instruction Fuzzy Hash: C0C18F73D0E4B6498B36462E4CA833BEFA2AE81B4031BC395DCD03F199D7266D6596D0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                            • Instruction ID: f2aec83169939825be56fee27372bb87f2764d40034a063271f75292406f01cf
                            • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
                            • Instruction Fuzzy Hash: 82B18133D0E4B6498B35452E48A823BEF62AE91B4131FC395DCD07F18DD727AEA196D0
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf
                            • String ID: %d/%d/%d %d:%d:%d.%d$%d/%d/%d %d:%d:%d.%d$%d/%d/%d %d:%d:%d.%d$%d/%d/%d %d:%d:%d.%d$AltTargetDomainName$ClientName$DomainName$EncodedTicketSize: %d (%.8Xh)$EndTime: $Flags: %.8Xh$KeyExpirationTime: $PKERB_EXTERNAL_TICKET:%.8Xh$RenewUntil: $ServiceName$SessionKey$StartTime: $TargetDomainName$TargetName$TicketFlags: %.8Xh$TimeSkew:
                            • API String ID: 2738768116-1418653839
                            • Opcode ID: 5d4cd587fd182149b0e428657253c558ac122a86ac1d755487f7c0420647c1d8
                            • Instruction ID: 4776ad0ceb2a3f6bd71e37bc58915a02ec14ff2906ccf671364dd9b121c897dd
                            • Opcode Fuzzy Hash: 5d4cd587fd182149b0e428657253c558ac122a86ac1d755487f7c0420647c1d8
                            • Instruction Fuzzy Hash: 48C170B6D40209ABCB04EFD4CC428BE77B9BF68705F148159F90566241E738EA95CFE2
                            APIs
                            • _wprintf.LIBCMT ref: 0016A542
                              • Part of subcall function 0016ADD2: __fsopen.LIBCMT ref: 0016ADDF
                            • _wprintf.LIBCMT ref: 0016A56A
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                              • Part of subcall function 0016B06C: _doexit.LIBCMT ref: 0016B078
                            • LoadLibraryA.KERNEL32(NTDLL.DLL), ref: 0016A57E
                            • LoadLibraryA.KERNEL32(SECUR32.DLL), ref: 0016A58C
                            • GetProcAddress.KERNEL32(?,RtlInitString), ref: 0016A59E
                            • GetProcAddress.KERNEL32(?,LsaConnectUntrusted), ref: 0016A5B3
                            • GetProcAddress.KERNEL32(?,LsaLookupAuthenticationPackage), ref: 0016A5C8
                            • GetProcAddress.KERNEL32(?,LsaCallAuthenticationPackage), ref: 0016A5DA
                            • GetProcAddress.KERNEL32(?,LsaDeregisterLogonProcess), ref: 0016A5EC
                            • GetCurrentThread.KERNEL32 ref: 0016A5F8
                            • OpenThreadToken.ADVAPI32(?,02000000,00000001,?), ref: 0016A619
                            • GetCurrentProcess.KERNEL32(02000000,?), ref: 0016A62B
                            • OpenProcessToken.ADVAPI32(00000000), ref: 0016A632
                            • GetTokenInformation.ADVAPI32(?,0000000A(TokenIntegrityLevel),?,00000038,?), ref: 0016A64E
                            • _wprintf.LIBCMT ref: 0016A66C
                            • _memset.LIBCMT ref: 0016A684
                            • _wprintf.LIBCMT ref: 0016A6BE
                            • __fread_nolock.LIBCMT ref: 0016A6F0
                            • _malloc.LIBCMT ref: 0016A70D
                              • Part of subcall function 0016B63E: __FF_MSGBANNER.LIBCMT ref: 0016B657
                              • Part of subcall function 0016B63E: __NMSG_WRITE.LIBCMT ref: 0016B65E
                              • Part of subcall function 0016B63E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B683
                            • _wprintf.LIBCMT ref: 0016A735
                            • __fread_nolock.LIBCMT ref: 0016A755
                            • _malloc.LIBCMT ref: 0016A761
                            • _wprintf.LIBCMT ref: 0016A783
                            • __fread_nolock.LIBCMT ref: 0016A7A0
                            • _malloc.LIBCMT ref: 0016A7B3
                            • _memmove.LIBCMT ref: 0016A829
                            • _memmove.LIBCMT ref: 0016A844
                            • _free.LIBCMT ref: 0016A8AF
                            • _free.LIBCMT ref: 0016A8BE
                            • _wprintf.LIBCMT ref: 0016A8EA
                            • _wprintf.LIBCMT ref: 0016A8F7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$AddressProc$Token__fread_nolock_malloc$CurrentLibraryLoadOpenProcessThread_free_memmove$AllocHeapInformation__fsopen__ftbuf__output_l__stbuf_doexit_memset
                            • String ID: %d kerberos tickets were added to the cache.$3333""""$$Done!$Error: cannot access LSA$Error: cannot find Kerberos auth package$Error: cannot open wce_krbtkts.$Fatal Error: cannot read sessionkey$Fatal Error: cannot read ticket$Kerberos$LsaCallAuthenticationPackage$LsaConnectUntrusted$LsaDeregisterLogonProcess$LsaLookupAuthenticationPackage$NTDLL.DLL$Reading kerberos tickets from file 'wce_krbtkts'...$RtlInitString$SECUR32.DLL$wce_krbtkts
                            • API String ID: 790501533-3336531733
                            • Opcode ID: 18ed00a669a3781a9f26eccb0197de74dfecb166edaf16c90ff5d545d6892f5d
                            • Instruction ID: c27b20e0a998eb81901062d4c255894809534fbe668e5b00529d159816b4deb7
                            • Opcode Fuzzy Hash: 18ed00a669a3781a9f26eccb0197de74dfecb166edaf16c90ff5d545d6892f5d
                            • Instruction Fuzzy Hash: 88C167B5D00208AFDB14EFA0DC85BAEB7B5BF58304F108158F505B7241EB75AA95CFA2
                            APIs
                            • LoadLibraryA.KERNEL32(advapi32.dll,CreateProcessWithLogonW), ref: 00164A0A
                            • GetProcAddress.KERNEL32(00000000), ref: 00164A11
                            • _wprintf.LIBCMT ref: 00164A25
                            • _malloc.LIBCMT ref: 00164A45
                            • _malloc.LIBCMT ref: 00164A61
                            • _malloc.LIBCMT ref: 00164A7D
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,00000000,-00000001), ref: 00164AC5
                            • _wprintf.LIBCMT ref: 00164AD4
                            • _free.LIBCMT ref: 00164AE0
                            • _free.LIBCMT ref: 00164AEC
                            • _free.LIBCMT ref: 00164AFB
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,00000000,-00000001), ref: 00164B28
                            • _free.LIBCMT ref: 00164B42
                            • _free.LIBCMT ref: 00164B51
                            • _free.LIBCMT ref: 00164B36
                              • Part of subcall function 0016B604: HeapFree.KERNEL32(00000000,00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B61A
                              • Part of subcall function 0016B604: GetLastError.KERNEL32(00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7,?), ref: 0016B62C
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,000000FF,00000000,-00000001), ref: 00164B81
                            • _free.LIBCMT ref: 00164B8F
                            • _free.LIBCMT ref: 00164B9B
                            • _free.LIBCMT ref: 00164BAA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _free$ByteCharMultiWide_malloc$_wprintf$AddressErrorFreeHeapLastLibraryLoadProc
                            • String ID: Can't find CreateProcessWithLogonW$CreateProcessWithLogonW$D$ERROR: CreateProcessWithLogonW$Error$Error in GetTokenInformation$advapi32.dll
                            • API String ID: 799445548-2671101016
                            • Opcode ID: 2f2bfd9f6b6a1e7ef0207972477d627d45008e55f3d388015e29ab5347ef0080
                            • Instruction ID: e771bdaa14f39d8354426e0e375ae5d171e15479f6fa3fa984f1c0bbc8d68228
                            • Opcode Fuzzy Hash: 2f2bfd9f6b6a1e7ef0207972477d627d45008e55f3d388015e29ab5347ef0080
                            • Instruction Fuzzy Hash: A8C164F1D04308EBEB24DBE4DC4AB9E7775AF64304F048528F50A9B281E77599A4CF52
                            APIs
                            Strings
                            • -aUse Addresses., xrefs: 00161D39
                            • -fForce 'safe mode'., xrefs: 00161D53
                            • Optional: -r<refresh interval>., xrefs: 00161CB7
                            • -KDump Kerberos tickets to file (unix & 'windows wce' format), xrefs: 00161D7A
                            • Parameters: <addresses>, xrefs: 00161D46
                            • Parameters: <password>., xrefs: 00161D6D
                            • -kRead Kerberos tickets from file and insert into Windows cache, xrefs: 00161D87
                            • -osaves all output to a file., xrefs: 00161CEB
                            • Parameters: <luid>., xrefs: 00161D2C
                            • -vverbose output., xrefs: 00161D94
                            • Parameters: <luid>., xrefs: 00161D12
                            • -gGenerate LM & NT Hash., xrefs: 00161D60
                            • -rLists logon sessions and NTLM credentials indefinitely.Refreshes every 5 seconds if new sessions are found., xrefs: 00161CAA
                            • -eLists logon sessions NTLM credentials indefinitely.Refreshes every time a logon event occurs., xrefs: 00161CDE
                            • -cRun <cmd> in a new session with the specified NTLM credentials., xrefs: 00161CC4
                            • -iSpecify LUID instead of use current logon session., xrefs: 00161D05
                            • -dDelete NTLM credentials from logon session., xrefs: 00161D1F
                            • Options: , xrefs: 00161C83
                            • -sChanges NTLM credentials of current logon session.Parameters: <UserName>:<DomainName>:<LMHash>:<NTHash>., xrefs: 00161C9D
                            • Parameters: <filename>., xrefs: 00161CF8
                            • -lList logon sessions and NTLM credentials (default)., xrefs: 00161C90
                            • Parameters: <cmd>., xrefs: 00161CD1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__ftbuf__output_l__stbuf
                            • String ID: Optional: -r<refresh interval>.$Parameters: <addresses>$Parameters: <cmd>.$Parameters: <filename>.$Parameters: <luid>.$Parameters: <luid>.$Parameters: <password>.$-KDump Kerberos tickets to file (unix & 'windows wce' format)$-aUse Addresses.$-cRun <cmd> in a new session with the specified NTLM credentials.$-dDelete NTLM credentials from logon session.$-eLists logon sessions NTLM credentials indefinitely.Refreshes every time a logon event occurs.$-fForce 'safe mode'.$-gGenerate LM & NT Hash.$-iSpecify LUID instead of use current logon session.$-kRead Kerberos tickets from file and insert into Windows cache$-lList logon sessions and NTLM credentials (default).$-osaves all output to a file.$-rLists logon sessions and NTLM credentials indefinitely.Refreshes every 5 seconds if new sessions are found.$-sChanges NTLM credentials of current logon session.Parameters: <UserName>:<DomainName>:<LMHash>:<NTHash>.$-vverbose output.$Options:
                            • API String ID: 2991887721-159169514
                            • Opcode ID: b411bf543e032955fda97435c8d3d877aec679ba32fe855c70ad829a5c296d15
                            • Instruction ID: 69fe9aed85bc0e6c3f37a0e814954b4b18b2d8f5e0c81e0747e424482799bf37
                            • Opcode Fuzzy Hash: b411bf543e032955fda97435c8d3d877aec679ba32fe855c70ad829a5c296d15
                            • Instruction Fuzzy Hash: 6711ACC2DC524527D4143EA46C0784B30745C70B2DBAAE0B9F44E71193FB66E63A0DD3
                            APIs
                            Strings
                            • RenewTime: %d/%d/%d %d:%d:%d.%d, xrefs: 00169D25
                            • End Time: %d/%d/%d %d:%d:%d.%d, xrefs: 00169CB9
                            • TicketFlags: %.8Xh, xrefs: 00169D69
                            • ClientName: , xrefs: 00169A62
                            • BranchId: %Xh, xrefs: 00169D9F
                            • KERB_QUERY_TKT_CACHE_EX2_RESPONSE.CountOfTickets: %d, xrefs: 00169A20
                            • ClientRealm: , xrefs: 00169AC5
                            • ServerName: , xrefs: 00169B28
                            • EncryptionType %Xh (%d), xrefs: 00169D4E
                            • KERB_QUERY_TKT_CACHE_EX2_RESPONSE.MessageType: %Xh (%d), xrefs: 00169A0C
                            • SessionKeyType: %Xh, xrefs: 00169D84
                            • Ticket #%d, xrefs: 00169A55
                            • Start Time: %d/%d/%d %d:%d:%d.%d, xrefs: 00169C4D
                            • ServerRealm: , xrefs: 00169B8B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$Time$File$LocalSystem$__ftbuf__output_l__stbuf_fputc
                            • String ID: BranchId: %Xh$ClientName: $ClientRealm: $EncryptionType %Xh (%d)$End Time: %d/%d/%d %d:%d:%d.%d$KERB_QUERY_TKT_CACHE_EX2_RESPONSE.CountOfTickets: %d$KERB_QUERY_TKT_CACHE_EX2_RESPONSE.MessageType: %Xh (%d)$RenewTime: %d/%d/%d %d:%d:%d.%d$ServerName: $ServerRealm: $SessionKeyType: %Xh$Start Time: %d/%d/%d %d:%d:%d.%d$Ticket #%d$TicketFlags: %.8Xh
                            • API String ID: 2371443755-4268536054
                            • Opcode ID: c0ea0ab9027815db81df398605b32e633bf1f91c15fc6ed5649eda4580ed1106
                            • Instruction ID: e29242f9e48bcc4f1cc1678df91e0b5b7a0dbd107aadc5191cd355212cea9ca9
                            • Opcode Fuzzy Hash: c0ea0ab9027815db81df398605b32e633bf1f91c15fc6ed5649eda4580ed1106
                            • Instruction Fuzzy Hash: 1EC14FB2A00109EBCB08DF94D882CFEB7B9AFA8704F558159F9057B241E734D991CFA1
                            APIs
                            Strings
                            • Error in cmdline!. Credentials format is wrong! too many ':' characters!, xrefs: 00161E47
                            • domain is too long!., xrefs: 00161F47
                            • , xrefs: 001620DE
                            • lmhash is too long!., xrefs: 00161FD5
                            • lmhash wrong format!., xrefs: 00161FF1
                            • nthash is too long!., xrefs: 0016206A
                            • nthash wrong format!., xrefs: 00162086
                            • domain wrong format!., xrefs: 00161F63
                            • Error in cmdline!. Bye!., xrefs: 00161DF7
                            • username is too long!., xrefs: 00161EB6
                            • username wrong format!., xrefs: 00161ED2
                            • Error in cmdline!. Credentials format is wrong! too few ':' characters!, xrefs: 00161E63
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__wcstoui64_memmove_memset_strcat
                            • String ID: $Error in cmdline!. Bye!.$Error in cmdline!. Credentials format is wrong! too few ':' characters!$Error in cmdline!. Credentials format is wrong! too many ':' characters!$domain is too long!.$domain wrong format!.$lmhash is too long!.$lmhash wrong format!.$nthash is too long!.$nthash wrong format!.$username is too long!.$username wrong format!.
                            • API String ID: 2045161836-2799369676
                            • Opcode ID: 01dcb5e86c4937b733dccb3427b8cc48e0399eb64980fcbd625a62e1b70bee80
                            • Instruction ID: 748aab4c59af2926ee2ac699f272813f0a0d4fa7c17774c7293a911840d9b437
                            • Opcode Fuzzy Hash: 01dcb5e86c4937b733dccb3427b8cc48e0399eb64980fcbd625a62e1b70bee80
                            • Instruction Fuzzy Hash: 58C14F70D042599BDF14DFA4CC92BEEBBB0BF29308F244158E90477282D7759A64CFA2
                            APIs
                            • FindResourceA.KERNEL32(?,?,BINARY), ref: 00164F94
                            • LoadResource.KERNEL32(?,00000000), ref: 00164FB2
                            • CloseHandle.KERNEL32(00000000), ref: 00164FC5
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Resource$CloseFindHandleLoad
                            • String ID: BINARY
                            • API String ID: 3150125948-907554435
                            • Opcode ID: 479a51db43359af9cc405db1e9072ef9887cd2171b2c7bf07361f1c57a3148cc
                            • Instruction ID: eec1fc6f77b14bd11b1e6ca298765a27479f59e8070ab185e44ed54245db804f
                            • Opcode Fuzzy Hash: 479a51db43359af9cc405db1e9072ef9887cd2171b2c7bf07361f1c57a3148cc
                            • Instruction Fuzzy Hash: DF51BBB9E00209EFCB14DFA0DC59BAEB775AB4C701F109918F616A7690D77899C1CFA0
                            APIs
                            • _wprintf.LIBCMT ref: 001626D6
                            • _wprintf.LIBCMT ref: 001626E9
                            • _wprintf.LIBCMT ref: 00162700
                            • _wprintf.LIBCMT ref: 00162711
                            • _wprintf.LIBCMT ref: 00162722
                            • _wprintf.LIBCMT ref: 00162733
                            • _wprintf.LIBCMT ref: 00162766
                            • _wprintf.LIBCMT ref: 0016277E
                            • _wprintf.LIBCMT ref: 0016278F
                            • _wprintf.LIBCMT ref: 001627A0
                            • _wprintf.LIBCMT ref: 001627B1
                            • _wprintf.LIBCMT ref: 001627C2
                              • Part of subcall function 00164940: GetCurrentProcess.KERNEL32(00000008,?), ref: 00164963
                              • Part of subcall function 00164940: OpenProcessToken.ADVAPI32(00000000), ref: 0016496A
                              • Part of subcall function 00164940: GetTokenInformation.ADVAPI32(?,0000000A(TokenIntegrityLevel),?,00000038,?), ref: 00164989
                            • _wprintf.LIBCMT ref: 0016280B
                            Strings
                            • cannot run the specified command!, xrefs: 00162761
                            • Changing NTLM credentials of new logon session %.8Xh to:, xrefs: 00162779
                            • LMHash: %s, xrefs: 0016271D
                            • LMHash: %s, xrefs: 001627AC
                            • domain: %s, xrefs: 0016279B
                            • Username: %s, xrefs: 001626FB
                            • Changing NTLM credentials of logon session %.8Xh to:, xrefs: 001626E4
                            • Changing NTLM credentials of current logon session (%.8Xh) to:, xrefs: 001626D1
                            • NTHash: %s, xrefs: 001627BD
                            • Username: %s, xrefs: 0016278A
                            • domain: %s, xrefs: 0016270C
                            • Using WCE Windows Service.., xrefs: 00162806
                            • NTHash: %s, xrefs: 0016272E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$ProcessToken$CurrentInformationOpen
                            • String ID: Changing NTLM credentials of current logon session (%.8Xh) to:$Changing NTLM credentials of logon session %.8Xh to:$Changing NTLM credentials of new logon session %.8Xh to:$LMHash: %s$LMHash: %s$NTHash: %s$NTHash: %s$Username: %s$Username: %s$Using WCE Windows Service..$cannot run the specified command!$domain: %s$domain: %s
                            • API String ID: 1524233808-1994602542
                            • Opcode ID: a857a028111edcf98fa73c9bee312d48d5c20321f3564914f1c7c67f824dc4ec
                            • Instruction ID: 92f772129906b53dcfc945f590d32fbfa88f00fc293a154a3a8c7c1b648da141
                            • Opcode Fuzzy Hash: a857a028111edcf98fa73c9bee312d48d5c20321f3564914f1c7c67f824dc4ec
                            • Instruction Fuzzy Hash: 1C41EFB6A40108ABDB04EF94DC42DAF37B9AF78704F558158FD0CA7241E774DD618BA2
                            APIs
                            • _wprintf.LIBCMT ref: 001624FE
                              • Part of subcall function 0016B06C: _doexit.LIBCMT ref: 0016B078
                            • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00162518
                            • _wprintf.LIBCMT ref: 0016252C
                            • _malloc.LIBCMT ref: 00162540
                            • _wprintf.LIBCMT ref: 00162556
                            • _strcat.LIBCMT ref: 0016257E
                            • _memset.LIBCMT ref: 001625B0
                            • _strncpy.LIBCMT ref: 001625C7
                            • _memset.LIBCMT ref: 001625E4
                            • _strncpy.LIBCMT ref: 001625F9
                            • _memmove.LIBCMT ref: 00162618
                            • _memmove.LIBCMT ref: 0016262F
                            • _wprintf.LIBCMT ref: 00162658
                            • _free.LIBCMT ref: 0016268E
                              • Part of subcall function 0016B604: HeapFree.KERNEL32(00000000,00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B61A
                              • Part of subcall function 0016B604: GetLastError.KERNEL32(00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7,?), ref: 0016B62C
                            Strings
                            • An error occurred changing the NTLM credentials., xrefs: 0016267D
                            • lsass.exe, xrefs: 001624E3
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 0016263E
                            • Error: Cannot open LSASS.EXE!., xrefs: 00162527
                            • WCEAddNTLMCredentials, xrefs: 00162572
                            • Cannot get LSASS.EXE PID!, xrefs: 001624F9
                            • Cannot alloc wceparams!., xrefs: 00162551
                            • NTLM credentials successfully changed!, xrefs: 0016266E
                            • Error in InjectDllAndCallFunction, xrefs: 00162653
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$_memmove_memset_strncpy$ErrorFreeHeapLastOpenProcess_doexit_free_malloc_strcat
                            • String ID: An error occurred changing the NTLM credentials.$C:\Users\user\AppData\Local\Temp\wceaux.dll$Cannot alloc wceparams!.$Cannot get LSASS.EXE PID!$Error in InjectDllAndCallFunction$Error: Cannot open LSASS.EXE!.$NTLM credentials successfully changed!$WCEAddNTLMCredentials$lsass.exe
                            • API String ID: 664426524-1957168790
                            • Opcode ID: a2c9438c91161c2591c8ce07157de1b01b79ef8ba97bc15f9376609f16248d41
                            • Instruction ID: 85bdf67e65f07b02faedc09e72e952409a567424f1849cc42b1859836f1047b0
                            • Opcode Fuzzy Hash: a2c9438c91161c2591c8ce07157de1b01b79ef8ba97bc15f9376609f16248d41
                            • Instruction Fuzzy Hash: D25177B1D40208EBD710EB94DD56F9E7370AF64704F148078F90967282EB759F65CB92
                            APIs
                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,0016E65B,0017DD20,00000014), ref: 00170DB4
                            • __mtterm.LIBCMT ref: 00170DC0
                              • Part of subcall function 00170AF9: DecodePointer.KERNEL32(00000002,00170F22,?,0016E65B,0017DD20,00000014), ref: 00170B0A
                              • Part of subcall function 00170AF9: TlsFree.KERNEL32(00000004,00170F22,?,0016E65B,0017DD20,00000014), ref: 00170B24
                            • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00170DD6
                            • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00170DE3
                            • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00170DF0
                            • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00170DFD
                            • TlsAlloc.KERNEL32(?,0016E65B,0017DD20,00000014), ref: 00170E4D
                            • TlsSetValue.KERNEL32(00000000,?,0016E65B,0017DD20,00000014), ref: 00170E68
                            • __init_pointers.LIBCMT ref: 00170E72
                            • EncodePointer.KERNEL32(?,0016E65B,0017DD20,00000014), ref: 00170E83
                            • EncodePointer.KERNEL32(?,0016E65B,0017DD20,00000014), ref: 00170E90
                            • EncodePointer.KERNEL32(?,0016E65B,0017DD20,00000014), ref: 00170E9D
                            • EncodePointer.KERNEL32(?,0016E65B,0017DD20,00000014), ref: 00170EAA
                            • DecodePointer.KERNEL32(00170C7D,?,0016E65B,0017DD20,00000014), ref: 00170ECB
                            • __calloc_crt.LIBCMT ref: 00170EE0
                            • DecodePointer.KERNEL32(00000000,?,0016E65B,0017DD20,00000014), ref: 00170EFA
                            • __initptd.LIBCMT ref: 00170F05
                            • GetCurrentThreadId.KERNEL32 ref: 00170F0C
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Pointer$AddressEncodeProc$Decode$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__initptd__mtterm
                            • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                            • API String ID: 3732613303-3819984048
                            • Opcode ID: 89234b3fe4c147500fa6caadb552041961e08fc5a285de2a7474570f3c56864b
                            • Instruction ID: a4dbf6fd9a04a1a064d3cfd80eba003c3d2d0ff933a51cd47df6c9483e047f42
                            • Opcode Fuzzy Hash: 89234b3fe4c147500fa6caadb552041961e08fc5a285de2a7474570f3c56864b
                            • Instruction Fuzzy Hash: 5E314631944711DFD7226BB4EC09A157EB4BB49B60B98862AE42893AB1DB7086C1CF90
                            APIs
                            • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0016514E
                            • _wprintf.LIBCMT ref: 00165162
                            • OpenEventLogA.ADVAPI32(00000000,Security), ref: 00165178
                            • _wprintf.LIBCMT ref: 0016518C
                            • CloseHandle.KERNEL32(00000000), ref: 00165198
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Event_wprintf$CloseCreateHandleOpen
                            • String ID: Cannot create event!$Canont open EventLog$NotifyChangeEventLog failed with %lu.$Security$SeekToLastRecord failed with
                            • API String ID: 2955162075-239136800
                            • Opcode ID: dd6e4a3763ac3774ab9c5369471b90af91eac3cfaf907c1cdd92ba242cded2b9
                            • Instruction ID: d6b973050b1613a38115b32a6e2f0aaa49185f635ef3be64d44474d42b55b570
                            • Opcode Fuzzy Hash: dd6e4a3763ac3774ab9c5369471b90af91eac3cfaf907c1cdd92ba242cded2b9
                            • Instruction Fuzzy Hash: FD3182B9A40209EBDB10EBF0DC59B6E7775BF58305F10492CF91AA2180D7349A908FA1
                            APIs
                              • Part of subcall function 00168550: LoadLibraryA.KERNEL32(NTDLL.DLL,?,0016A338), ref: 00168558
                              • Part of subcall function 00168550: LoadLibraryA.KERNEL32(SECUR32.DLL,?,0016A338), ref: 00168568
                            • _wprintf.LIBCMT ref: 0016A341
                            • _wprintf.LIBCMT ref: 0016A368
                            Strings
                            • Converting and saving TGT in UNIX format to file wce_ccache..., xrefs: 0016A4A1
                            • Converting and saving tickets in Windows WCE Format to file wce_krbtkts.., xrefs: 0016A4F5
                            • Kerberos, xrefs: 0016A38F
                            • Error: Cannot load needed libraries, xrefs: 0016A33C
                            • No TGT is available!, xrefs: 0016A476
                            • Error: could not convert and save TGT, xrefs: 0016A4C8
                            • wce_ccache, xrefs: 0016A4B0
                            • Error: cannot find Kerberos auth package, xrefs: 0016A3BF
                            • Error: cannot dump TGT, xrefs: 0016A44A
                            • Error: cannot access LSA, xrefs: 0016A363
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: LibraryLoad_wprintf
                            • String ID: Converting and saving TGT in UNIX format to file wce_ccache...$Converting and saving tickets in Windows WCE Format to file wce_krbtkts..$Error: Cannot load needed libraries$Error: cannot access LSA$Error: cannot dump TGT$Error: cannot find Kerberos auth package$Error: could not convert and save TGT$Kerberos$No TGT is available!$wce_ccache
                            • API String ID: 1430821717-3351687992
                            • Opcode ID: fccdb7d6eee7a748619e291943d75cb76577235477ad4bce348c51fa623cfab2
                            • Instruction ID: cd4e28de987c4dbcd6812ec93af0bc429e1f93ce74a833efad02775fd88ff240
                            • Opcode Fuzzy Hash: fccdb7d6eee7a748619e291943d75cb76577235477ad4bce348c51fa623cfab2
                            • Instruction Fuzzy Hash: C55165B1D402069BDB10EFA0DC4ABAE77B4AF28305F544568F60672141EBB59B54CFA3
                            APIs
                            • _wprintf.LIBCMT ref: 00162878
                              • Part of subcall function 0016B06C: _doexit.LIBCMT ref: 0016B078
                            • OpenProcess.KERNEL32(001FFFFF,00000000,00000000), ref: 00162895
                            • _wprintf.LIBCMT ref: 001628AF
                            • _malloc.LIBCMT ref: 001628C3
                            • _wprintf.LIBCMT ref: 001628DF
                            • _strcat.LIBCMT ref: 00162922
                            • _wprintf.LIBCMT ref: 0016295E
                            • _wprintf.LIBCMT ref: 0016297C
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                            • _wprintf.LIBCMT ref: 0016298B
                            • _free.LIBCMT ref: 001629A3
                            Strings
                            • WCEDelNTLMCredentials, xrefs: 00162916
                            • NTLM credentials successfully deleted!, xrefs: 00162977
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 00162941
                            • Cannot alloc wceparams!., xrefs: 001628DA
                            • Cannot delete NTLM credentials, xrefs: 00162986
                            • Cannot get PID of LSASS.EXE!, xrefs: 00162873
                            • Error in InjectDllAndCallFunction, xrefs: 00162959
                            • Error: Cannot open LSASS.EXE!., xrefs: 001628AA
                            • lsass.exe, xrefs: 00162857
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$OpenProcess__ftbuf__output_l__stbuf_doexit_free_malloc_strcat
                            • String ID: C:\Users\user\AppData\Local\Temp\wceaux.dll$Cannot alloc wceparams!.$Cannot delete NTLM credentials$Cannot get PID of LSASS.EXE!$Error in InjectDllAndCallFunction$Error: Cannot open LSASS.EXE!.$NTLM credentials successfully deleted!$WCEDelNTLMCredentials$lsass.exe
                            • API String ID: 2494054735-912798575
                            • Opcode ID: 5a947a949fd89435b7206a52700b94800eee5b0bffe96f67c5a3a655b0dadad0
                            • Instruction ID: a1635158dd7263735f0880516b2c62ee826b6f3eaff85cdd0ad6bdb1ae9366b1
                            • Opcode Fuzzy Hash: 5a947a949fd89435b7206a52700b94800eee5b0bffe96f67c5a3a655b0dadad0
                            • Instruction Fuzzy Hash: A7319574D442149BEB24AF60DC46B9973B0AF64705F1482F8F40D66282EF74AED4CF92
                            APIs
                            • WaitNamedPipeA.KERNEL32(\\.\pipe\WCEServicePipe,00004E20), ref: 001678E3
                            • CreateFileA.KERNEL32(\\.\pipe\WCEServicePipe,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 00167908
                            • _wprintf.LIBCMT ref: 0016791C
                            Strings
                            • \\.\pipe\WCEServicePipe, xrefs: 00167903
                            • Cannot allocate memory!, xrefs: 001679F8
                            • Error: INVALID_HANDLE_VALUE, xrefs: 00167917
                            • \\.\pipe\WCEServicePipe, xrefs: 001678DE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CreateFileNamedPipeWait_wprintf
                            • String ID: Cannot allocate memory!$Error: INVALID_HANDLE_VALUE$\\.\pipe\WCEServicePipe$\\.\pipe\WCEServicePipe
                            • API String ID: 276255076-1223086826
                            • Opcode ID: 4f340e187c161c1b82d9998a737a1f444f993ed12dc599b5a1185363f501048f
                            • Instruction ID: 51d5738778077af0c68446870fe0294763fef52c06396f40febad9f781ae7437
                            • Opcode Fuzzy Hash: 4f340e187c161c1b82d9998a737a1f444f993ed12dc599b5a1185363f501048f
                            • Instruction Fuzzy Hash: 8C515171E04219EFDB24EBA4DC49BAEB7B4FF48304F248998E519A7280D7745A90CF50
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _fprintf
                            • String ID: %.2X$%.2X$%.2X$%.2X$%.8X:$%.8X:$%s:%s:$%s:%s:
                            • API String ID: 1654120334-637162346
                            • Opcode ID: b4dcf80f696e6f1d5f2c756f072718e9313e8b19bdd3d25232ec4bf45c973bfd
                            • Instruction ID: b64b59573a3fd3371f828a34fa77614a5c3bb7a92b3f95b9029dd8bff470b84a
                            • Opcode Fuzzy Hash: b4dcf80f696e6f1d5f2c756f072718e9313e8b19bdd3d25232ec4bf45c973bfd
                            • Instruction Fuzzy Hash: F5516EB1940104FBDB04DB94CC46BAE77B5FF51305F2885A8F80A6B242D7719FA1EB92
                            APIs
                            • WaitNamedPipeA.KERNEL32(\\.\pipe\WCEServicePipe,00004E20), ref: 00167ADD
                            • CreateFileA.KERNEL32(\\.\pipe\WCEServicePipe,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 00167B02
                            • _wprintf.LIBCMT ref: 00167B16
                            Strings
                            • \\.\pipe\WCEServicePipe, xrefs: 00167AFD
                            • Error: INVALID_HANDLE_VALUE, xrefs: 00167B11
                            • \\.\pipe\WCEServicePipe, xrefs: 00167AD8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CreateFileNamedPipeWait_wprintf
                            • String ID: Error: INVALID_HANDLE_VALUE$\\.\pipe\WCEServicePipe$\\.\pipe\WCEServicePipe
                            • API String ID: 276255076-2998164799
                            • Opcode ID: aaf7bc6d3a3bdf1c1729f250f15f17fe31abd7a836044f50814e0326ab100dde
                            • Instruction ID: 60aaf01c580a411b371076e0fff3204764765f405a9ca982b80662239deed754
                            • Opcode Fuzzy Hash: aaf7bc6d3a3bdf1c1729f250f15f17fe31abd7a836044f50814e0326ab100dde
                            • Instruction Fuzzy Hash: 7B517171A40209FBDB10EBB0DC4AFED7778AB08704F504598B609A61C1EB749BD4CF50
                            APIs
                            • LoadLibraryA.KERNEL32(NTDLL.DLL,?,0016A338), ref: 00168558
                            • LoadLibraryA.KERNEL32(SECUR32.DLL,?,0016A338), ref: 00168568
                            • FreeLibrary.KERNEL32(00000000,?,0016A338), ref: 00168592
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Library$Load$Free
                            • String ID: LsaCallAuthenticationPackage$LsaConnectUntrusted$LsaDeregisterLogonProcess$LsaFreeReturnBuffer$LsaLookupAuthenticationPackage$NTDLL.DLL$RtlInitString$SECUR32.DLL
                            • API String ID: 2872008576-4260052665
                            • Opcode ID: 14917991cb3ca9de59ff653fd7dda8c9d7bce5094897ccc6066df23a43dc3046
                            • Instruction ID: c3bd0c858a324c7a99ef4d4b0452d4cd3650058aba96cf37431eeb0508805916
                            • Opcode Fuzzy Hash: 14917991cb3ca9de59ff653fd7dda8c9d7bce5094897ccc6066df23a43dc3046
                            • Instruction Fuzzy Hash: 431196B9950353FFC300AFB0FC4992537B8F70A726B204619F91692AA0FB7096C18F94
                            APIs
                            • _wprintf.LIBCMT ref: 00167E48
                              • Part of subcall function 001647A0: GetCurrentProcess.KERNEL32(00000020,00000000), ref: 001647C4
                              • Part of subcall function 001647A0: OpenProcessToken.ADVAPI32(00000000), ref: 001647CB
                              • Part of subcall function 001647A0: CloseHandle.KERNELBASE(00000000), ref: 00164829
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00167E61
                              • Part of subcall function 00164DC0: FindResourceA.KERNEL32(0016126C,?,BINARY), ref: 00164DD4
                            • _wprintf.LIBCMT ref: 00167E79
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00167E92
                            • WriteFile.KERNEL32(0016832A,00000000,00000008,?,00000000), ref: 00167ED6
                            Strings
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 00167E55, 00167E8D
                            • Call GetNTLMCredentials() function, xrefs: 00167E43
                            • Error: Cannot extract auxiliary DLL!, xrefs: 00167E74
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: FileHandleProcess_wprintf$CloseCurrentDeleteFindModuleOpenResourceTokenWrite__ftbuf__output_l__stbuf
                            • String ID: C:\Users\user\AppData\Local\Temp\wceaux.dll$Call GetNTLMCredentials() function$Error: Cannot extract auxiliary DLL!
                            • API String ID: 1365154622-1970172050
                            • Opcode ID: 45b86a5510a5af0f7fa38e5ff6343e5fccb2b370411be33f34e0297d312ac4e3
                            • Instruction ID: 7681ca842ab0b64d811640dddf3863d29de7fb306aca1097fbd4b9b7ffd1e58a
                            • Opcode Fuzzy Hash: 45b86a5510a5af0f7fa38e5ff6343e5fccb2b370411be33f34e0297d312ac4e3
                            • Instruction Fuzzy Hash: F0518075A00209EFDB04EF94EC99FAE77B4EF54304F144568F909A7281DB70AA94CF91
                            APIs
                            Strings
                            • Error: cannot generate LM Hash., xrefs: 0016107C
                            • %.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X, xrefs: 001611B1
                            • Password: %s, xrefs: 00161058
                            • %.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X, xrefs: 00161117
                            • Hashes: , xrefs: 001610BA
                            • Error: cannot generate NT Hash., xrefs: 001610A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__snprintf_memset
                            • String ID: Password: %s$%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X$%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X%.2X$Error: cannot generate LM Hash.$Error: cannot generate NT Hash.$Hashes:
                            • API String ID: 3072940087-2501730538
                            • Opcode ID: 7e25b44646040fb499d228e7da6103aa5abcfe3219d7660bac06e221cc470052
                            • Instruction ID: 524cdaca9433ffe6845996614b717c9a76a61035aaf4ecd5abab2a88744aa28b
                            • Opcode Fuzzy Hash: 7e25b44646040fb499d228e7da6103aa5abcfe3219d7660bac06e221cc470052
                            • Instruction Fuzzy Hash: 724144E29081E875CB2597E65C22AFEBAF90F5E701F4880D9B6D960182E63C87509F71
                            APIs
                            Strings
                            • Error: cannot start & run WCE service, xrefs: 00163705
                            • Install & Run Windows WCE Service.., xrefs: 001636EF
                            • Error: cannot get credentials from WCE Service, xrefs: 0016373D
                            • Stop & Uninstall Windows WCE Service.., xrefs: 0016375F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__snprintf_memmove$Sleep_free_malloc
                            • String ID: Error: cannot get credentials from WCE Service$Error: cannot start & run WCE service$Install & Run Windows WCE Service..$Stop & Uninstall Windows WCE Service..
                            • API String ID: 1585808594-2717280290
                            • Opcode ID: fa0e38ac8dd5934f6d47c63efea8d3ff14325c14a10f3f0fa2618a332a511c2a
                            • Instruction ID: bf88d49a485cfcd75229f40d814e78a2cec6d0a8e3143973569789ac0aba7cb9
                            • Opcode Fuzzy Hash: fa0e38ac8dd5934f6d47c63efea8d3ff14325c14a10f3f0fa2618a332a511c2a
                            • Instruction Fuzzy Hash: D041D4F0D00209ABDB04EB94DC47BBF7770AF60308F144128E51567282E7759BA48B92
                            APIs
                            • LoadLibraryA.KERNEL32(bcrypt.dll,?,?,001672A5), ref: 001671AF
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID: BCryptDecrypt$BCryptEncrypt$BCryptGenerateSymmetricKey$BCryptGetProperty$BCryptOpenAlgorithmProvider$BCryptSetProperty$bcrypt.dll
                            • API String ID: 1029625771-645198769
                            • Opcode ID: 2d210d76f39778ca750b6c13fc9594488d5a525a6fc08f0e293ce74ca6d565a0
                            • Instruction ID: a5d2f513029ef11cd9c1e2ea317e562d4ceb5ada46362bd00a94d7115330bc21
                            • Opcode Fuzzy Hash: 2d210d76f39778ca750b6c13fc9594488d5a525a6fc08f0e293ce74ca6d565a0
                            • Instruction Fuzzy Hash: D8213AB9904246EFEB10DBA0ED0876977B9F746309F210659F40192AA0F7758BC1DF90
                            APIs
                            Strings
                            • something terrible happened! could not allocate memory for new list!, xrefs: 001616FE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _memcmp
                            • String ID: something terrible happened! could not allocate memory for new list!
                            • API String ID: 2931989736-2067920347
                            • Opcode ID: 4c8197fcbb072fde2709202efc7a64746e46252fd72051639bc2a9f5783ca411
                            • Instruction ID: 95fef42586c01f1dd638bcaa5a9a3665bcb50436295fe3e037ccb34a16459b33
                            • Opcode Fuzzy Hash: 4c8197fcbb072fde2709202efc7a64746e46252fd72051639bc2a9f5783ca411
                            • Instruction Fuzzy Hash: B3718FB4E00209EBDB04DF58DD85BBE73B5FF54304F188628E905A7381D774AAA0CB94
                            APIs
                            Strings
                            • %d kerberos tickets saved to file 'wce_ccache'., xrefs: 0016A269
                            • %d kerberos tickets saved to file 'wce_krbtkts'., xrefs: 0016A27A
                            • Error: cannot access LSA, xrefs: 0016A0B1
                            • wce_krbtkts, xrefs: 0016A23E
                            • Ticket #%d, xrefs: 0016A1B8
                            • Error: cannot find Kerberos auth package, xrefs: 0016A0FF
                            • Kerberos, xrefs: 0016A0D5
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$_memset
                            • String ID: %d kerberos tickets saved to file 'wce_ccache'.$%d kerberos tickets saved to file 'wce_krbtkts'.$Error: cannot access LSA$Error: cannot find Kerberos auth package$Kerberos$Ticket #%d$wce_krbtkts
                            • API String ID: 4245733127-468912919
                            • Opcode ID: a14817490c128ca6781d538a23bea83fb4652b4e6677ce0325bed0ed923aa3f0
                            • Instruction ID: f50f3294252fd446176dbb51a6453b6ea82b6d2e39a65256f8c52842b6c6010c
                            • Opcode Fuzzy Hash: a14817490c128ca6781d538a23bea83fb4652b4e6677ce0325bed0ed923aa3f0
                            • Instruction Fuzzy Hash: 4E613BB1D00109AFCB04EFE4DC95AEEB7B9BF19304F604519E501B7241EB35AA94CFA2
                            APIs
                            • WaitNamedPipeA.KERNEL32(\\.\pipe\WCEServicePipe,00004E20), ref: 00167CAD
                            • CreateFileA.KERNEL32(\\.\pipe\WCEServicePipe,C0000000,00000003,00000000,00000003,00000000,00000000), ref: 00167CD2
                            • _wprintf.LIBCMT ref: 00167CE6
                            Strings
                            • Error: INVALID_HANDLE_VALUE, xrefs: 00167CE1
                            • \\.\pipe\WCEServicePipe, xrefs: 00167CCD
                            • \\.\pipe\WCEServicePipe, xrefs: 00167CA8
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CreateFileNamedPipeWait_wprintf
                            • String ID: Error: INVALID_HANDLE_VALUE$\\.\pipe\WCEServicePipe$\\.\pipe\WCEServicePipe
                            • API String ID: 276255076-2998164799
                            • Opcode ID: 75c52050d2902c077f799b585a09a61bc359c9a413ae11778e787095bc85aac2
                            • Instruction ID: 7a1236f2fe1ea012d7939b8c8649b47f4ffa25584b42731d9e6d7e8423c9f8b8
                            • Opcode Fuzzy Hash: 75c52050d2902c077f799b585a09a61bc359c9a413ae11778e787095bc85aac2
                            • Instruction Fuzzy Hash: 2631EC75A54219EFDB20DBA4DC89BADB7B8EF08704F5049A8B50AE61C0D7745BC4CF60
                            APIs
                            • _malloc.LIBCMT ref: 001653C4
                              • Part of subcall function 0016B63E: __FF_MSGBANNER.LIBCMT ref: 0016B657
                              • Part of subcall function 0016B63E: __NMSG_WRITE.LIBCMT ref: 0016B65E
                              • Part of subcall function 0016B63E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B683
                            • ReadEventLogA.ADVAPI32(00000038,00000000,00000000,00000000,00000038,00000000,00000000), ref: 001653EF
                            • GetLastError.KERNEL32 ref: 001653FD
                            • _wprintf.LIBCMT ref: 001654A5
                              • Part of subcall function 0016D9D6: _malloc.LIBCMT ref: 0016D9E4
                            • _wprintf.LIBCMT ref: 00165434
                            • ReadEventLogA.ADVAPI32(00000038,00000000,0000007A,00000000,00000038,00000000,00000000), ref: 0016546C
                            • GetLastError.KERNEL32 ref: 00165476
                            • _wprintf.LIBCMT ref: 00165488
                            Strings
                            • Second ReadEventLog failed with %lu., xrefs: 00165483
                            • &, xrefs: 00165496
                            • Failed to reallocate memory for the record buffer (%d bytes)., xrefs: 0016542F
                            • 8, xrefs: 001653A6
                            • ReadEventLog failed with %lu., xrefs: 001654A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$ErrorEventLastRead_malloc$AllocHeap
                            • String ID: &$8$Failed to reallocate memory for the record buffer (%d bytes).$ReadEventLog failed with %lu.$Second ReadEventLog failed with %lu.
                            • API String ID: 3506726304-2216783070
                            • Opcode ID: a09f8dd075556b843dda20bc3786c48377edbf5d2dfb9c52aff3860688a12382
                            • Instruction ID: 8937e90e96f4ca636a328d936e5b34589766a36817e69ffe9d8a2759d5cb7576
                            • Opcode Fuzzy Hash: a09f8dd075556b843dda20bc3786c48377edbf5d2dfb9c52aff3860688a12382
                            • Instruction Fuzzy Hash: 59310DB5E00109EFCB04DF94DC85AAEB7B9FF58301F108599F91597240EB74AA94CFA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: 3DES$BlockLength$ChainingMode$ChainingModeCBC$ObjectLength
                            • API String ID: 0-2391730222
                            • Opcode ID: 7b43c438774956f8e3a4cd69472c6c8aca4b19bb323904b19f3aff660b81d566
                            • Instruction ID: ce46403d1c93d0c6f83d1a73d410a34cbb3a1a3273e180b7c65d1b6d080f104a
                            • Opcode Fuzzy Hash: 7b43c438774956f8e3a4cd69472c6c8aca4b19bb323904b19f3aff660b81d566
                            • Instruction Fuzzy Hash: E25183B190421AABDB34DB60DC55FFAB378AB08300F1085E9B10AA6580EB709FD4DF60
                            APIs
                            • _wprintf.LIBCMT ref: 0016123C
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00161260
                            • _wprintf.LIBCMT ref: 00161278
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00161291
                            • _wprintf.LIBCMT ref: 001612A7
                            • _wprintf.LIBCMT ref: 00161311
                            • _fprintf.LIBCMT ref: 00161339
                              • Part of subcall function 00165DD0: _memset.LIBCMT ref: 00165E1C
                              • Part of subcall function 00165DD0: _wprintf.LIBCMT ref: 00165E3B
                              • Part of subcall function 00165DD0: _wprintf.LIBCMT ref: 00165E94
                            Strings
                            • Using WCE Windows Service..., xrefs: 001612A2
                            • Forced Safe Mode Error: cannot read credentials using 'safe mode'., xrefs: 00161237
                            • Error: Cannot extract auxiliary DLL!, xrefs: 00161273
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 00161254, 0016128C
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$DeleteFileHandleModule_fprintf_memset
                            • String ID: C:\Users\user\AppData\Local\Temp\wceaux.dll$Error: Cannot extract auxiliary DLL!$Forced Safe Mode Error: cannot read credentials using 'safe mode'.$Using WCE Windows Service...
                            • API String ID: 3876512577-3791912217
                            • Opcode ID: 217ad25fd70dadb583828425f1e683cf7431e2bc3cbe614d558f71ad555e7aff
                            • Instruction ID: 4052120fcb005dca9917e6f45801bd2701b73e9cdbb12990e2433d8c5faee01e
                            • Opcode Fuzzy Hash: 217ad25fd70dadb583828425f1e683cf7431e2bc3cbe614d558f71ad555e7aff
                            • Instruction Fuzzy Hash: B03192B5D44204FBD704EB90EC46B2D33B1AB22705F6C822CF819A6651E7319BA4CB52
                            APIs
                            • RegisterServiceCtrlHandlerA.ADVAPI32(WCE SERVICE,Function_000076B0), ref: 00167783
                            • SetServiceStatus.ADVAPI32(00000000,00184660), ref: 001677B0
                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 001677BE
                            • SetServiceStatus.ADVAPI32(00000000,00184660), ref: 001677EE
                            • CreateThread.KERNEL32(00000000,00000000,Function_000076A0,00000000,00000000,00000000), ref: 00167803
                            • WaitForSingleObject.KERNEL32(00000000,00001388), ref: 00167814
                            • SetServiceStatus.ADVAPI32(00000000,00184660), ref: 00167837
                            • CloseHandle.KERNEL32(00000000), ref: 00167844
                            • SetServiceStatus.ADVAPI32(00000000,00184660), ref: 00167877
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Service$Status$Create$CloseCtrlEventHandleHandlerObjectRegisterSingleThreadWait
                            • String ID: WCE SERVICE
                            • API String ID: 535409839-1632131648
                            • Opcode ID: ed1f10b7c51211152c936edb686c0b89b75ebe4676f2bb50abfda3b2bf93d83f
                            • Instruction ID: e1bcd69c0d33f8f730a509515590b5fcd9f7ee184677b623034540ec8c4bf71d
                            • Opcode Fuzzy Hash: ed1f10b7c51211152c936edb686c0b89b75ebe4676f2bb50abfda3b2bf93d83f
                            • Instruction Fuzzy Hash: F631A3B5241302EBE3109F64FC5AF153BB4B786B04F244218F1159AAE0EBB497C5CBA4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: 3DES$ChainingMode$ChainingModeCBC$I$K$ObjectLength
                            • API String ID: 0-3285708808
                            • Opcode ID: 81e6a478cc2ee7297f1554c8de0e8809b2bf793c1fccc1a9aa391bb4d1f3c128
                            • Instruction ID: 5c1bf91cce13c9dc53c1a26dd8b78bde940cb5576b536742b56f65ff40e319aa
                            • Opcode Fuzzy Hash: 81e6a478cc2ee7297f1554c8de0e8809b2bf793c1fccc1a9aa391bb4d1f3c128
                            • Instruction Fuzzy Hash: BB41FAB1E04209EFDB04DFE4DD85BEDBBB5BB48318F244419E902B7280E774A994DB64
                            APIs
                            • ReadFile.KERNEL32(00168308,?,00000004,?,00000000,?,?,?,?,?,?,00168308,?,?,?), ref: 00168196
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001681CA
                            • _wprintf.LIBCMT ref: 001681E2
                            • WriteFile.KERNEL32(00000000,00000000,00000008,?,00000000), ref: 00168209
                            Strings
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 001681BE, 00168226
                            • Error: Cannot extract auxiliary DLL!, xrefs: 001681DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: File$HandleModuleReadWrite_wprintf
                            • String ID: C:\Users\user\AppData\Local\Temp\wceaux.dll$Error: Cannot extract auxiliary DLL!
                            • API String ID: 1724720484-1674787540
                            • Opcode ID: 8e32c27c17f5f73d077d035bd214fd97a1a1b0aa23057290907a9ed6f122912d
                            • Instruction ID: 3f07aa0f9ae816a74c24b1416e6f5472e420223a2ba9777fc161bf6ae3f1b1b0
                            • Opcode Fuzzy Hash: 8e32c27c17f5f73d077d035bd214fd97a1a1b0aa23057290907a9ed6f122912d
                            • Instruction Fuzzy Hash: 433123B5D40209EFEB00DFE4DC49BEE7BB8AB18705F108558FA05A6281DB749794CBE1
                            APIs
                            • _wprintf.LIBCMT ref: 001693EE
                            • _wprintf.LIBCMT ref: 00169409
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                            • _wprintf.LIBCMT ref: 00169416
                            • _wprintf.LIBCMT ref: 0016944E
                            • _wprintf.LIBCMT ref: 0016945D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__ftbuf__output_l__stbuf
                            • String ID: KeyType: (%s) (%xh)$Length: (%d) (%xh)$Value: $%.2x
                            • API String ID: 2991887721-2535179509
                            • Opcode ID: 11062f84fe279af56e9de4e6fe0c324837470d4c70bdfca05f48cd4c2e06f117
                            • Instruction ID: 15c1d2b245c8b43df82df1b83ea2584464f13bf13d0ea16a641b914b105d34a5
                            • Opcode Fuzzy Hash: 11062f84fe279af56e9de4e6fe0c324837470d4c70bdfca05f48cd4c2e06f117
                            • Instruction Fuzzy Hash: 131130B5A40204BBCB04EF84DD42C697779AFA4314F15C194F8495B342E731EE61CF92
                            APIs
                            • ReadFile.KERNEL32(00000000,?,00000224,?,00000000), ref: 0016807C
                            • GetModuleHandleA.KERNEL32(00000000,00008A8A,C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001680A9
                            • _wprintf.LIBCMT ref: 001680C1
                            Strings
                            • Error: Cannot extract auxiliary DLL!, xrefs: 001680BC
                            • C:\Users\user\AppData\Local\Temp\wceaux.dll, xrefs: 0016809D, 00168113
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: FileHandleModuleRead_wprintf
                            • String ID: C:\Users\user\AppData\Local\Temp\wceaux.dll$Error: Cannot extract auxiliary DLL!
                            • API String ID: 2601644046-1674787540
                            • Opcode ID: 088d9e5b7d71491f7f207b42dc717e31beebb1892ba5ff846302ae54ac2bdef2
                            • Instruction ID: 71eb2b5ec73c7c613d6f41b79558676a772554d336d94ad9bbdeccc26febf982
                            • Opcode Fuzzy Hash: 088d9e5b7d71491f7f207b42dc717e31beebb1892ba5ff846302ae54ac2bdef2
                            • Instruction Fuzzy Hash: 7A316471D00218EFDB14DFA4DC49BEE77B8EB18704F104598F60DA6181EB74AA94CFA1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: SystemFunction007$advapi32.dll
                            • API String ID: 0-3703967615
                            • Opcode ID: 547696176731eebd45f3179a0fb3adef3ce425c171b21420484998411a30ac50
                            • Instruction ID: efd54985172aa611401e95664185f2f2dd972415b9eafcbbf16227fd522557aa
                            • Opcode Fuzzy Hash: 547696176731eebd45f3179a0fb3adef3ce425c171b21420484998411a30ac50
                            • Instruction Fuzzy Hash: 80213975D0020CEFDB14DFE0CC89BEE77B5AB18314F408569A416A7280EB749694CF91
                            APIs
                            • LoadLibraryA.KERNEL32(LSASRV.DLL), ref: 00166E94
                            • _malloc.LIBCMT ref: 00166EAE
                            • _memmove.LIBCMT ref: 00166EDA
                            • _memmove.LIBCMT ref: 00166EF9
                            • _memmove.LIBCMT ref: 00166F1F
                            • _free.LIBCMT ref: 00166F2B
                              • Part of subcall function 0016B604: HeapFree.KERNEL32(00000000,00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B61A
                              • Part of subcall function 0016B604: GetLastError.KERNEL32(00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7,?), ref: 0016B62C
                            • FreeLibrary.KERNEL32(000000FF), ref: 00166F37
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _memmove$FreeLibrary$ErrorHeapLastLoad_free_malloc
                            • String ID: LSASRV.DLL
                            • API String ID: 2360547179-957653126
                            • Opcode ID: 59a4a29da392afe7492cf4c6dc39c02e5e765f2d984ff34adbd71f40c1e98c9c
                            • Instruction ID: 910acaf6777e0417851b86d265f22d63daca47a1418086af921b2b8bb88fefdb
                            • Opcode Fuzzy Hash: 59a4a29da392afe7492cf4c6dc39c02e5e765f2d984ff34adbd71f40c1e98c9c
                            • Instruction Fuzzy Hash: 652162B5D04209FBCB04DFA4EC89AAE73B4AB58300F108568F915D7241E7359AA0CF95
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: SystemFunction006$advapi32.dll
                            • API String ID: 0-1103752713
                            • Opcode ID: 8cb80407ac28b7c3d178e8ce99adae2a4a97bee1de3cb4f41e7e2a5b88ade170
                            • Instruction ID: 2b91e05346b1dacfedd519be2fce88ab9ccc3aa962868500fd24a5f90b872991
                            • Opcode Fuzzy Hash: 8cb80407ac28b7c3d178e8ce99adae2a4a97bee1de3cb4f41e7e2a5b88ade170
                            • Instruction Fuzzy Hash: 3F217F74900209EBDB14DB60CC49BED73B9AF18318F5085A8E54AA7181EBB49FD4DF90
                            APIs
                            • _wprintf.LIBCMT ref: 00169312
                            • _wprintf.LIBCMT ref: 00169327
                              • Part of subcall function 0016A932: __stbuf.LIBCMT ref: 0016A980
                              • Part of subcall function 0016A932: __output_l.LIBCMT ref: 0016A998
                              • Part of subcall function 0016A932: __ftbuf.LIBCMT ref: 0016A9A9
                            • _wprintf.LIBCMT ref: 00169334
                            • _wprintf.LIBCMT ref: 0016935F
                            • _wprintf.LIBCMT ref: 001693B3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__ftbuf__output_l__stbuf
                            • String ID: NameCount: %u$NameType: (%s) %d$Names
                            • API String ID: 2991887721-1433487181
                            • Opcode ID: 248f9bf6449e618b56161ea4f4a67f357702b181f58460372947bdbe5c56afe9
                            • Instruction ID: 7b8a2ad77ede21eb4cc7b382d1f2032bfa2b6a0cfc1049757865719f04059668
                            • Opcode Fuzzy Hash: 248f9bf6449e618b56161ea4f4a67f357702b181f58460372947bdbe5c56afe9
                            • Instruction Fuzzy Hash: 332150B1D00209EBCB04EFA4CC4297D77B5BFA4705F1580A9E8055B381F775AA61DB92
                            APIs
                            • _memset.LIBCMT ref: 001635B1
                            • _memset.LIBCMT ref: 001635C7
                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 001635DD
                            • __snprintf.LIBCMT ref: 001635FF
                            • Sleep.KERNEL32(00000064), ref: 0016362C
                              • Part of subcall function 00167590: OpenSCManagerA.ADVAPI32(00000000,00000000,00000001), ref: 001675A3
                              • Part of subcall function 00167590: OpenServiceA.ADVAPI32(00000000,00000001,00000014), ref: 001675BC
                              • Part of subcall function 00167590: StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 001675D3
                              • Part of subcall function 00167590: CloseServiceHandle.ADVAPI32(00000000), ref: 001675E0
                              • Part of subcall function 00167590: CloseServiceHandle.ADVAPI32(00000000), ref: 001675F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Service$CloseHandleOpen_memset$FileManagerModuleNameSleepStart__snprintf
                            • String ID: %s -S$WCE SERVICE$WCE SERVICE
                            • API String ID: 66998917-898484323
                            • Opcode ID: 3a483db7ec593af3562d54dc72a4b94ad2cc934b2a7efe1388963504f199d9d7
                            • Instruction ID: de8673911a95fe2c4c2869af9e815beb7b2e69abe58815e3878435e165c9293d
                            • Opcode Fuzzy Hash: 3a483db7ec593af3562d54dc72a4b94ad2cc934b2a7efe1388963504f199d9d7
                            • Instruction Fuzzy Hash: F0118671E4021CABD714EB90DC4BBE97775AF18B04F400499F71D66182F7B15B988FA2
                            APIs
                            • GetOldestEventLogRecord.ADVAPI32(00000000,00000000), ref: 0016531C
                            • GetLastError.KERNEL32 ref: 00165326
                            • _wprintf.LIBCMT ref: 00165332
                            • GetNumberOfEventLogRecords.ADVAPI32(00000000,00000000), ref: 00165346
                            • GetLastError.KERNEL32 ref: 00165350
                            • _wprintf.LIBCMT ref: 0016535C
                            Strings
                            • GetOldestEventLogRecord failed with %lu., xrefs: 0016532D
                            • GetOldestEventLogRecord failed with %lu., xrefs: 00165357
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: ErrorEventLast_wprintf$NumberOldestRecordRecords
                            • String ID: GetOldestEventLogRecord failed with %lu.$GetOldestEventLogRecord failed with %lu.
                            • API String ID: 1871152013-377973058
                            • Opcode ID: 1ab379d73e96e429aa544fdb7be266ff8e5e139c12170c2b04e21697cb939ccc
                            • Instruction ID: b4f888d4197b7b5ebaca4c1a85ed20ca80760571fe131e95220bef31966c64ba
                            • Opcode Fuzzy Hash: 1ab379d73e96e429aa544fdb7be266ff8e5e139c12170c2b04e21697cb939ccc
                            • Instruction Fuzzy Hash: 7A113574A00208EFCB04EFA8CC44A9DBBB9EF49744F518158E9098B340E771DA94CBA1
                            APIs
                            • DeleteFileA.KERNEL32(wce_ccache,?,00162C33), ref: 0016A2AB
                            • DeleteFileA.KERNEL32(wce_krbtkts,?,00162C33), ref: 0016A2B6
                              • Part of subcall function 00169550: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Lsa\Kerberos\Parameters,00000000,00000001,?,?,?,?,?,0016A2D2), ref: 00169568
                            • _wprintf.LIBCMT ref: 0016A30D
                              • Part of subcall function 00169470: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Lsa\Kerberos\Parameters,00000000,00000002,?,?,?,?,?,0016A2DB), ref: 00169488
                            • _wprintf.LIBCMT ref: 0016A2E4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: DeleteFileOpen_wprintf
                            • String ID: Done!$Warning: I will not be able to extract the TGT session key$wce_ccache$wce_krbtkts
                            • API String ID: 427953825-4233650052
                            • Opcode ID: b2d20972d53865a4c76976bbdb43ff1ab4dcb843a420da1a2791bdae2a5a9216
                            • Instruction ID: 921e7e0b1e012ec60e334147e03cc6ca259f9bb1522e4a13134cef13947f436c
                            • Opcode Fuzzy Hash: b2d20972d53865a4c76976bbdb43ff1ab4dcb843a420da1a2791bdae2a5a9216
                            • Instruction Fuzzy Hash: 62F05E709C0204DBD7017BB49D0A75D76686F21309F508098FD0962282FB764AA4CFE3
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: __wgetenv_fprintf
                            • String ID: %s: invalid option -- %c$%s: option requires an argument -- %c$?$POSIXLY_CORRECT
                            • API String ID: 699729447-850619729
                            • Opcode ID: 7fe148f2c3a4e112c4885549a0a3f916c6c9b7647fa03e92138e8150aa6ecf7b
                            • Instruction ID: 0309fc412075002a20bd94f7d6979fec783a47707e50856dd72a172c50e5aceb
                            • Opcode Fuzzy Hash: 7fe148f2c3a4e112c4885549a0a3f916c6c9b7647fa03e92138e8150aa6ecf7b
                            • Instruction Fuzzy Hash: 4FB157B4A00245DFDB18EF58EC90A6977F2FB46704F288249F8259B791C731ABA5CF41
                            APIs
                              • Part of subcall function 001653A0: _malloc.LIBCMT ref: 001653C4
                              • Part of subcall function 001653A0: ReadEventLogA.ADVAPI32(00000038,00000000,00000000,00000000,00000038,00000000,00000000), ref: 001653EF
                              • Part of subcall function 001653A0: GetLastError.KERNEL32 ref: 001653FD
                              • Part of subcall function 001653A0: _wprintf.LIBCMT ref: 00165434
                            • _wprintf.LIBCMT ref: 0016550B
                            • _free.LIBCMT ref: 0016551D
                              • Part of subcall function 0016B604: HeapFree.KERNEL32(00000000,00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B61A
                              • Part of subcall function 0016B604: GetLastError.KERNEL32(00000000,?,00170C54,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7,?), ref: 0016B62C
                              • Part of subcall function 001653A0: ReadEventLogA.ADVAPI32(00000038,00000000,0000007A,00000000,00000038,00000000,00000000), ref: 0016546C
                              • Part of subcall function 001653A0: GetLastError.KERNEL32 ref: 00165476
                              • Part of subcall function 001653A0: _wprintf.LIBCMT ref: 00165488
                            • _free.LIBCMT ref: 0016558F
                            • _wprintf.LIBCMT ref: 001655C0
                            • _free.LIBCMT ref: 001655D2
                            Strings
                            • ReadRecord sequential failed., xrefs: 001655BB
                            • ReadRecord (priming read) failed., xrefs: 00165506
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$ErrorLast_free$EventRead$FreeHeap_malloc
                            • String ID: ReadRecord (priming read) failed.$ReadRecord sequential failed.
                            • API String ID: 2215106706-2447787395
                            • Opcode ID: c879f2da7b41acd0c9187ffa59687935e43780945ff1e195426807d786d65c99
                            • Instruction ID: 0d9ef108abab11fd20ee4afa6eb196856b476681ff16e55e4d5d48f3c38600ad
                            • Opcode Fuzzy Hash: c879f2da7b41acd0c9187ffa59687935e43780945ff1e195426807d786d65c99
                            • Instruction Fuzzy Hash: 81313CB1D0060AABEB14DF94DC4E7AF7B73AB10304F510518E1066B281D7B5DAA4CBD2
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Lsa\Kerberos\Parameters,00000000,00000001,?,?,?,?,?,0016A2D2), ref: 00169568
                            • RegQueryValueExA.ADVAPI32(?,allowtgtsessionkey,00000000,?,00000000,00000004), ref: 001695A0
                            • RegCloseKey.ADVAPI32(?), ref: 001695AD
                            Strings
                            • allowtgtsessionkey, xrefs: 00169597
                            • System\CurrentControlSet\Control\Lsa\Kerberos\Parameters, xrefs: 0016955E
                            • AllowTGTSessionKey: %d, xrefs: 001695CA
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CloseOpenQueryValue
                            • String ID: AllowTGTSessionKey: %d$System\CurrentControlSet\Control\Lsa\Kerberos\Parameters$allowtgtsessionkey
                            • API String ID: 3677997916-1596152800
                            • Opcode ID: 65fc1c7ad1e9eb4442057d88339a36936080b05508f165711e124f6159f388bb
                            • Instruction ID: 7ca83752d137c10afc09c1ca7d8213fd45012822e479f76f15a083a9b0c07077
                            • Opcode Fuzzy Hash: 65fc1c7ad1e9eb4442057d88339a36936080b05508f165711e124f6159f388bb
                            • Instruction Fuzzy Hash: 1911A175940209FFDB15DFA0CC49BFE73BCBB04304F20465AE606A2180E3B18B98CBA1
                            Strings
                            • wce_ccache, xrefs: 0016A046
                            • Error: could not convert and save Ticket, xrefs: 0016A05B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: Error: could not convert and save Ticket$wce_ccache
                            • API String ID: 0-3496376632
                            • Opcode ID: e19e1377b7535cb9f4dcce05c770cee1271a96f720869216abcdf6d8d2239afb
                            • Instruction ID: 60a65a3594fe760c09b695217fbd62604267d8973a4adfa1ed8a615a8d409865
                            • Opcode Fuzzy Hash: e19e1377b7535cb9f4dcce05c770cee1271a96f720869216abcdf6d8d2239afb
                            • Instruction Fuzzy Hash: DC413BB590020AEFCB04DF94D985BAFB7B4BF48304F208558E905AB391D775DA91CFA2
                            Strings
                            • wce_krbtkts, xrefs: 00169EE0
                            • Error: cannot save ticket in WCE Windows format, xrefs: 00169EF5
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: Error: cannot save ticket in WCE Windows format$wce_krbtkts
                            • API String ID: 0-751244346
                            • Opcode ID: 8552621cf4d75072456407c77dc8739529eb06c4f9b5e2e26e425ccf6abc380f
                            • Instruction ID: 549fbbdb8c8e7bf47fdca2baea78d4a2b4b8ee34bc611f27840c9199088c3990
                            • Opcode Fuzzy Hash: 8552621cf4d75072456407c77dc8739529eb06c4f9b5e2e26e425ccf6abc380f
                            • Instruction Fuzzy Hash: D9414CB590020AEFCB04DF94D994BAFB7B8BF48305F208558E905AB341E735DA95CFA1
                            APIs
                            • DecodePointer.KERNEL32(?,?,?,?,?,0016D2F0,00162B45,0017DC80,0000000C,0016D31C,00162B45,?,00162B45), ref: 0016D201
                            • DecodePointer.KERNEL32(?,?,?,?,?,0016D2F0,00162B45,0017DC80,0000000C,0016D31C,00162B45,?,00162B45), ref: 0016D20E
                            • __realloc_crt.LIBCMT ref: 0016D24B
                            • __realloc_crt.LIBCMT ref: 0016D261
                            • EncodePointer.KERNEL32(00000000,?,?,?,?,?,0016D2F0,00162B45,0017DC80,0000000C,0016D31C,00162B45,?,00162B45), ref: 0016D273
                            • EncodePointer.KERNEL32(00162B45,?,?,?,?,?,0016D2F0,00162B45,0017DC80,0000000C,0016D31C,00162B45,?,00162B45), ref: 0016D287
                            • EncodePointer.KERNEL32(-00000004,?,?,?,?,?,0016D2F0,00162B45,0017DC80,0000000C,0016D31C,00162B45,?,00162B45), ref: 0016D28F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Pointer$Encode$Decode__realloc_crt
                            • String ID:
                            • API String ID: 4108716018-0
                            • Opcode ID: f02dfab30213200fd521806d94502075b3261fa52b6d02bd7a8bad8869a8ca8a
                            • Instruction ID: 790b2ee2de6b82339cb02161149b6e93e317cf4558ddc00dc907c8dddbe48451
                            • Opcode Fuzzy Hash: f02dfab30213200fd521806d94502075b3261fa52b6d02bd7a8bad8869a8ca8a
                            • Instruction Fuzzy Hash: 0511D332A04215AFDB105F75ECE089A7BE9EB40360321443EF809E7520EB71ED948B94
                            APIs
                              • Part of subcall function 00165300: GetOldestEventLogRecord.ADVAPI32(00000000,00000000), ref: 0016531C
                              • Part of subcall function 00165300: GetLastError.KERNEL32 ref: 00165326
                              • Part of subcall function 00165300: _wprintf.LIBCMT ref: 00165332
                            • _wprintf.LIBCMT ref: 00165292
                            • _wprintf.LIBCMT ref: 001652C6
                            • _free.LIBCMT ref: 001652D8
                            Strings
                            • ReadRecord failed seeking to record %lu., xrefs: 001652C1
                            • GetLastRecordNumber failed., xrefs: 0016528D
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$ErrorEventLastOldestRecord_free
                            • String ID: GetLastRecordNumber failed.$ReadRecord failed seeking to record %lu.
                            • API String ID: 3573976781-2818593916
                            • Opcode ID: fdb9a0384905364435e1ed78872882afb17f5a86a78ae7fbe22d18bd09d0a26f
                            • Instruction ID: 563baa99eeb40970b38a5754ec80336842cf0225b43d16d19b24c14bfb77c5dd
                            • Opcode Fuzzy Hash: fdb9a0384905364435e1ed78872882afb17f5a86a78ae7fbe22d18bd09d0a26f
                            • Instruction Fuzzy Hash: 25118EB5D0020CFBDB10EBE4DC46B9E7779AB24304F1084A8E905A7241E775ABA4CF92
                            APIs
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001629DF
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001629EE
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 001629FD
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00162A0C
                            • DeleteFileA.KERNEL32(C:\Users\user\AppData\Local\Temp\wceaux.dll), ref: 00162A1B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: DeleteFile
                            • String ID: C:\Users\user\AppData\Local\Temp\wceaux.dll
                            • API String ID: 4033686569-3091589033
                            • Opcode ID: cdd5cbc53207faf20c0034574912c63859d66d10cc9a3f77a975acd68607dcca
                            • Instruction ID: cebfca258de19ae06b42c9b5320e5d159a2ae649e7aafda2d0db6d3fadeb605e
                            • Opcode Fuzzy Hash: cdd5cbc53207faf20c0034574912c63859d66d10cc9a3f77a975acd68607dcca
                            • Instruction Fuzzy Hash: FEF03630A35525EBC315ABF0AC155A97BB0DB0D743F568454F00AD6850EBB087909FA1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _memset_strncpy
                            • String ID:
                            • API String ID: 3140232205-0
                            • Opcode ID: aa5a17baead55dae8e5e9509481a2ff16e1e5181bf3767bec869037eb8480d79
                            • Instruction ID: 3b17210738719fd139d1c9c5c7f392975c93c94737db8f5f2c1ffd5f1fafa4ca
                            • Opcode Fuzzy Hash: aa5a17baead55dae8e5e9509481a2ff16e1e5181bf3767bec869037eb8480d79
                            • Instruction Fuzzy Hash: 01711970D0461ADFCF18CFD4CC886AEB7B2FB54304F21856AE8166B281D7719AA4DF91
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: File__snprintf_memmove$BuffersFlushWrite_memset
                            • String ID:
                            • API String ID: 3037722120-0
                            • Opcode ID: 4b903717b8b84c4049c56785673735442c0d5023e219b2a6b1bd246799f7c73a
                            • Instruction ID: 4b80a034bc0ed9db88c6180e66a0480c8d409c7d027c8a7a4d78a98ca943f994
                            • Opcode Fuzzy Hash: 4b903717b8b84c4049c56785673735442c0d5023e219b2a6b1bd246799f7c73a
                            • Instruction Fuzzy Hash: 38316E75A00108EBD714DF44EC95FBD73B5EF48309F048698EA0967782DB31AA95CF80
                            APIs
                            • __getptd.LIBCMT ref: 0017164A
                              • Part of subcall function 00170C63: __getptd_noexit.LIBCMT ref: 00170C66
                              • Part of subcall function 00170C63: __amsg_exit.LIBCMT ref: 00170C73
                            • __amsg_exit.LIBCMT ref: 0017166A
                            • __lock.LIBCMT ref: 0017167A
                            • InterlockedDecrement.KERNEL32(?), ref: 00171697
                            • _free.LIBCMT ref: 001716AA
                            • InterlockedIncrement.KERNEL32(014B1670), ref: 001716C2
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                            • String ID:
                            • API String ID: 3470314060-0
                            • Opcode ID: c8edeec441a189e79b8596109b99bcc7726e1230f0b72720381ed7696c1e19b4
                            • Instruction ID: 4e72164759b96e1e799b176f6524862ee51f9164df23ce09a3639a69a076bb31
                            • Opcode Fuzzy Hash: c8edeec441a189e79b8596109b99bcc7726e1230f0b72720381ed7696c1e19b4
                            • Instruction Fuzzy Hash: F6016132901711BBCB32AF289846B5D7770BF15720F188119F808A7691DBB469C1CFD5
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Lsa\Kerberos\Parameters,00000000,00000002,?,?,?,?,?,0016A2DB), ref: 00169488
                            • RegSetValueExA.ADVAPI32(?,allowtgtsessionkey,00000000,00000004,00000001,00000004), ref: 001694C7
                            • RegCloseKey.ADVAPI32(?), ref: 001694D4
                            Strings
                            • allowtgtsessionkey, xrefs: 001694BE
                            • System\CurrentControlSet\Control\Lsa\Kerberos\Parameters, xrefs: 0016947E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CloseOpenValue
                            • String ID: System\CurrentControlSet\Control\Lsa\Kerberos\Parameters$allowtgtsessionkey
                            • API String ID: 779948276-1352724389
                            • Opcode ID: c6affb6990e5cd8a05ab76dadc742b15c8b39df0bab45eae69353187ad0e741d
                            • Instruction ID: e878c2b4dfffb5f9bddd0d96372e21c946bbe191c530c038e8c51eb23f9f42dd
                            • Opcode Fuzzy Hash: c6affb6990e5cd8a05ab76dadc742b15c8b39df0bab45eae69353187ad0e741d
                            • Instruction Fuzzy Hash: 2F014BB5900209FBDB14DFE4CD09BAEB7B8BB04704F204659EA05B6280D7B55A85CBA0
                            APIs
                              • Part of subcall function 00163590: _memset.LIBCMT ref: 001635B1
                              • Part of subcall function 00163590: _memset.LIBCMT ref: 001635C7
                              • Part of subcall function 00163590: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 001635DD
                              • Part of subcall function 00163590: __snprintf.LIBCMT ref: 001635FF
                              • Part of subcall function 00163590: Sleep.KERNEL32(00000064), ref: 0016362C
                            • _wprintf.LIBCMT ref: 001638F2
                              • Part of subcall function 0016B06C: _doexit.LIBCMT ref: 0016B078
                            • Sleep.KERNEL32(000007D0,?,?,00162834,?,?,?,?,?,?,?), ref: 00163906
                            • _wprintf.LIBCMT ref: 00163936
                            Strings
                            • Error: cannot start & run WCE service, xrefs: 001638ED
                            • Error: cannot delete credentials using WCE Service, xrefs: 00163931
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Sleep_memset_wprintf$FileModuleName__snprintf_doexit
                            • String ID: Error: cannot delete credentials using WCE Service$Error: cannot start & run WCE service
                            • API String ID: 326890480-3275841638
                            • Opcode ID: 6bca16689f0748879bc2a1aa446f2e45f0fd3c9a9585fc84021f76931df7fe9e
                            • Instruction ID: 23fa31c374ae4a6472033c936a2e2f8591d64ee97b7b24c88a42caa7f9854a83
                            • Opcode Fuzzy Hash: 6bca16689f0748879bc2a1aa446f2e45f0fd3c9a9585fc84021f76931df7fe9e
                            • Instruction Fuzzy Hash: E6F062B1A44208BBCB50FFA49C42B5F36786F28718F104158F91D93282EB75DB608BA2
                            APIs
                            • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Lsa\Kerberos\Parameters,00000000,00000002,?,?,0016A308), ref: 00169508
                            • RegDeleteValueA.ADVAPI32(?,allowtgtsessionkey), ref: 00169524
                            • RegCloseKey.ADVAPI32(?), ref: 00169531
                            Strings
                            • System\CurrentControlSet\Control\Lsa\Kerberos\Parameters, xrefs: 001694FE
                            • allowtgtsessionkey, xrefs: 0016951B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: CloseDeleteOpenValue
                            • String ID: System\CurrentControlSet\Control\Lsa\Kerberos\Parameters$allowtgtsessionkey
                            • API String ID: 849931509-1352724389
                            • Opcode ID: 2eacd790ad083dc2dc66e3336fec0d7a60825a4de200fc2ec7744644cc2776c0
                            • Instruction ID: 94506e545eae480a3b0dbf319f62994e645b20bc7aa31d1c7c77f7c3fd91f7dc
                            • Opcode Fuzzy Hash: 2eacd790ad083dc2dc66e3336fec0d7a60825a4de200fc2ec7744644cc2776c0
                            • Instruction Fuzzy Hash: F6F08234A01208FBDB14DFB4DD09BAD777CA704701F1046A9B906A3280E7705AD1DB90
                            APIs
                              • Part of subcall function 00163590: _memset.LIBCMT ref: 001635B1
                              • Part of subcall function 00163590: _memset.LIBCMT ref: 001635C7
                              • Part of subcall function 00163590: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 001635DD
                              • Part of subcall function 00163590: __snprintf.LIBCMT ref: 001635FF
                              • Part of subcall function 00163590: Sleep.KERNEL32(00000064), ref: 0016362C
                            • _wprintf.LIBCMT ref: 00163882
                              • Part of subcall function 0016B06C: _doexit.LIBCMT ref: 0016B078
                            • Sleep.KERNEL32(000007D0,?,?,0016343A,?), ref: 00163896
                            • _wprintf.LIBCMT ref: 001638B6
                            Strings
                            • Error: cannot start & run WCE service, xrefs: 0016387D
                            • Error: cannot delete credentials using WCE Service, xrefs: 001638B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Sleep_memset_wprintf$FileModuleName__snprintf_doexit
                            • String ID: Error: cannot delete credentials using WCE Service$Error: cannot start & run WCE service
                            • API String ID: 326890480-3275841638
                            • Opcode ID: 4bb340a5521738c59a01a919e721392e15c48f245d827a0cfd4c5f0a66f57566
                            • Instruction ID: 13c6661b402a9c80f3a73b7e94e8d8e31754b3c768b8975181ad5a8a47436261
                            • Opcode Fuzzy Hash: 4bb340a5521738c59a01a919e721392e15c48f245d827a0cfd4c5f0a66f57566
                            • Instruction Fuzzy Hash: 54E06DA1D48308BBDA507BB09C0BB5E36785F34715F500160FD1DAA282FB769BB44AE3
                            APIs
                            • _wprintf.LIBCMT ref: 00167DF8
                            • FlushFileBuffers.KERNEL32(?,00000000), ref: 00167E04
                            • DisconnectNamedPipe.KERNEL32(?), ref: 00167E0E
                            • CloseHandle.KERNEL32(?), ref: 00167E18
                              • Part of subcall function 0016B06C: _doexit.LIBCMT ref: 0016B078
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: BuffersCloseDisconnectFileFlushHandleNamedPipe_doexit_wprintf
                            • String ID: Shutdown
                            • API String ID: 505104530-3319367026
                            • Opcode ID: 7c30fe85df421341e7c6cc956f912f5059001eaf01b496401c86b26bae429007
                            • Instruction ID: 9a2fa4537f8077cd08cae52db8a95f9dbe56b7ffa9a4d6a0d7c37b626d5bd8bf
                            • Opcode Fuzzy Hash: 7c30fe85df421341e7c6cc956f912f5059001eaf01b496401c86b26bae429007
                            • Instruction Fuzzy Hash: C2D0127A140204F7CB10AFE0EC4A98A3B38AB64741F508418F90D46651DB35D5D48BE1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _memset$__filbuf__getptd_noexit__read_memcpy_s
                            • String ID:
                            • API String ID: 4048096073-0
                            • Opcode ID: d49e911a3980906cf1a1a38c0045879ff791fbb5355fc9613c5dc1b7dc8bb88f
                            • Instruction ID: ed3c93f0874a565cb737744e032b89e762dd306264b1af4429a6d2497a3228c4
                            • Opcode Fuzzy Hash: d49e911a3980906cf1a1a38c0045879ff791fbb5355fc9613c5dc1b7dc8bb88f
                            • Instruction Fuzzy Hash: 9B51D139A00205EBDF249FB9CC446AEBBF1BF50324F258329E82597290DB719E71DB51
                            APIs
                            • _malloc.LIBCMT ref: 0016D9E4
                              • Part of subcall function 0016B63E: __FF_MSGBANNER.LIBCMT ref: 0016B657
                              • Part of subcall function 0016B63E: __NMSG_WRITE.LIBCMT ref: 0016B65E
                              • Part of subcall function 0016B63E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00171F01,?,00000001,?,?,00170767,00000018,0017DDA8,0000000C,001707F7), ref: 0016B683
                            • _free.LIBCMT ref: 0016D9F7
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: AllocHeap_free_malloc
                            • String ID:
                            • API String ID: 2734353464-0
                            • Opcode ID: 993a2c52ff561b7df271ac9ee65ab28a795847b08a58de2446bda6da78ee92e7
                            • Instruction ID: 4ccc9b33d421c747918a574ae55404800c12fed15a9e01bc9afea32556e2b9bb
                            • Opcode Fuzzy Hash: 993a2c52ff561b7df271ac9ee65ab28a795847b08a58de2446bda6da78ee92e7
                            • Instruction Fuzzy Hash: AB11A332A0D211ABCB267FB4FD056593BA59FA4374B218539F848D7161DF30CDA1C790
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000001,?,?,?,?,?,?,0016367E,WCE SERVICE), ref: 0016762D
                            • OpenServiceA.ADVAPI32(00000000,00000001,00000024,?,?,?,?,?,?,0016367E,WCE SERVICE), ref: 00167646
                            • ControlService.ADVAPI32(00000000,00000001,?), ref: 0016765F
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0016766C
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 0016767F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Service$CloseHandleOpen$ControlManager
                            • String ID:
                            • API String ID: 2705437689-0
                            • Opcode ID: 33b5b7c4df7353972eb88d2d69dc31350b2848c37d26cd21d08911a43c34c99c
                            • Instruction ID: 0f94fa59b7574391c46c7bc4c2c91155f8d8dac853df595361d7d6bcf4e7c553
                            • Opcode Fuzzy Hash: 33b5b7c4df7353972eb88d2d69dc31350b2848c37d26cd21d08911a43c34c99c
                            • Instruction Fuzzy Hash: 0C11C974E04208EFDB14DFA8D889BDDBBB4AB48705F108558F509AB290D7759A84CFA0
                            APIs
                            • OpenSCManagerA.ADVAPI32(00000000,00000000,00000001), ref: 001675A3
                            • OpenServiceA.ADVAPI32(00000000,00000001,00000014), ref: 001675BC
                            • StartServiceA.ADVAPI32(00000000,00000000,00000000), ref: 001675D3
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001675E0
                            • CloseServiceHandle.ADVAPI32(00000000), ref: 001675F3
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Service$CloseHandleOpen$ManagerStart
                            • String ID:
                            • API String ID: 1485051382-0
                            • Opcode ID: af7971bdec2c2196fb53a1dae0527daeb1bba81ae4e419e41185acbc27256f83
                            • Instruction ID: d1d1c7418d0da2483f35e36453de8d9537b5ef0a3fd7b7a9fa72784b65d479d1
                            • Opcode Fuzzy Hash: af7971bdec2c2196fb53a1dae0527daeb1bba81ae4e419e41185acbc27256f83
                            • Instruction Fuzzy Hash: B6014F78904208FFDB14DFE4DC49B9DBBB4AB04305F208498F606AB2C0D7759A84DF90
                            APIs
                            • __getptd.LIBCMT ref: 00171DCB
                              • Part of subcall function 00170C63: __getptd_noexit.LIBCMT ref: 00170C66
                              • Part of subcall function 00170C63: __amsg_exit.LIBCMT ref: 00170C73
                            • __getptd.LIBCMT ref: 00171DE2
                            • __amsg_exit.LIBCMT ref: 00171DF0
                            • __lock.LIBCMT ref: 00171E00
                            • __updatetlocinfoEx_nolock.LIBCMT ref: 00171E14
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                            • String ID:
                            • API String ID: 938513278-0
                            • Opcode ID: 58d537cc064559a47d7ed942da52960ef1e21b416aa9d70bfc02489d4fd0f54a
                            • Instruction ID: c5a6c99e3654881a604708ff7161ae7e77a975de46d47e14d4f202cbaf6e345f
                            • Opcode Fuzzy Hash: 58d537cc064559a47d7ed942da52960ef1e21b416aa9d70bfc02489d4fd0f54a
                            • Instruction Fuzzy Hash: 7CF06D32904711BBD636BBBCE84AB4E76B0AF14B20F11C149F418AA6E2CB645A818F55
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$__ftbuf__output_l__stbuf_fputc
                            • String ID: ClientName: $Ticket #%d
                            • API String ID: 1210932002-1352260334
                            • Opcode ID: 6d775224bbbb0cb96bd41ef80881f1ea624df839e9c4ec47b04f9d76eeaa80c2
                            • Instruction ID: d8d3084da037962221af25970b3b8b36b39eceed6ef69dc2c89c6bfdc9be4d9d
                            • Opcode Fuzzy Hash: 6d775224bbbb0cb96bd41ef80881f1ea624df839e9c4ec47b04f9d76eeaa80c2
                            • Instruction Fuzzy Hash: EB014CB1E001059BCB08DF98C8929BDBBB6EFA4304F16C019E9056B345D731A8A1CFD5
                            APIs
                            • ReadProcessMemory.KERNEL32(000000FF,?,?,0000004C,00000004), ref: 0016656B
                            • _wprintf.LIBCMT ref: 0016658E
                            • _wprintf.LIBCMT ref: 001665C0
                            • ReadProcessMemory.KERNEL32(000000FF,?,?,0000008C,00000004), ref: 001665FC
                            • _wprintf.LIBCMT ref: 00166622
                            • _wprintf.LIBCMT ref: 0016668F
                            • _wprintf.LIBCMT ref: 001666A6
                            • _wprintf.LIBCMT ref: 001666BD
                            • _wprintf.LIBCMT ref: 001666D4
                            • _wprintf.LIBCMT ref: 001666EB
                            • ReadProcessMemory.KERNEL32(000000FF,00000000,?,0000000C,0000008C), ref: 001667E4
                            • _wprintf.LIBCMT ref: 00166807
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf$MemoryProcessRead
                            • String ID: Error: cannot List Session List Entry!.$L
                            • API String ID: 1336411900-1589785453
                            • Opcode ID: 15ce87e20305d21cdf9d306861baf11f5e4e7481b3159f2611bbb410397df2af
                            • Instruction ID: d290d5d9d5afcfbc8dda53057bd137226781175ee1d487c1a33567209f95581a
                            • Opcode Fuzzy Hash: 15ce87e20305d21cdf9d306861baf11f5e4e7481b3159f2611bbb410397df2af
                            • Instruction Fuzzy Hash: FC015AB4A08268CBCB24DF14CC91BE9B3B1EB48305F4082DCE20EA7140DB755ED08F95
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                            • String ID:
                            • API String ID: 2782032738-0
                            • Opcode ID: 83ba5fab60c30f126f66c6f4e3d954d1715329a561fb13c6423154274ee2cb55
                            • Instruction ID: bc509d455900a1699f57345f8de4b6b22fa0d7932c69d8ea7fccf4aab626d6bc
                            • Opcode Fuzzy Hash: 83ba5fab60c30f126f66c6f4e3d954d1715329a561fb13c6423154274ee2cb55
                            • Instruction Fuzzy Hash: B241CA31F00705EBDB24DF69EC84AAEBBB5AF90320F2585ADE41697180D771DD62CB40
                            APIs
                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00178624
                            • __isleadbyte_l.LIBCMT ref: 00178657
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000000,?,00000000,00000000,?,?,?,?,00000000,00000000), ref: 00178688
                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000000,00000001,00000000,00000000,?,?,?,?,00000000,00000000), ref: 001786F6
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                            • String ID:
                            • API String ID: 3058430110-0
                            • Opcode ID: 88239dfb63e0520eff897786dbabb8ddbb05992dedce7c229397a34cec8aa785
                            • Instruction ID: 86d042fdc1baee7b0c8cc7b4500e0c1f33247ac478ba2542aa5dbf28823bb313
                            • Opcode Fuzzy Hash: 88239dfb63e0520eff897786dbabb8ddbb05992dedce7c229397a34cec8aa785
                            • Instruction Fuzzy Hash: 94319E31A40246FFDB20DF64C8989BE7BB5BF01311B15C5A9F4698B1A2DB30DD90DBA1
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                            • String ID:
                            • API String ID: 3016257755-0
                            • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                            • Instruction ID: 5deb5f9055b00a00f68b4e03f1888fda515970a01ca1e3a5bfb7fd6ba3f4791d
                            • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
                            • Instruction Fuzzy Hash: 9C11253244018ABBCF169E88CC028AE3F72BB28350F598515FA1C59131DB36C9B2AB81
                            APIs
                              • Part of subcall function 00167610: OpenSCManagerA.ADVAPI32(00000000,00000000,00000001,?,?,?,?,?,?,0016367E,WCE SERVICE), ref: 0016762D
                              • Part of subcall function 00167610: OpenServiceA.ADVAPI32(00000000,00000001,00000024,?,?,?,?,?,?,0016367E,WCE SERVICE), ref: 00167646
                              • Part of subcall function 00167610: ControlService.ADVAPI32(00000000,00000001,?), ref: 0016765F
                              • Part of subcall function 00167610: CloseServiceHandle.ADVAPI32(00000000), ref: 0016766C
                              • Part of subcall function 00167610: CloseServiceHandle.ADVAPI32(00000000), ref: 0016767F
                            • Sleep.KERNEL32(000007D0,00163771), ref: 00163689
                            • Sleep.KERNEL32(000007D0), ref: 001636A7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: Service$CloseHandleOpenSleep$ControlManager
                            • String ID: WCE SERVICE$WCE SERVICE
                            • API String ID: 2881204338-103427495
                            • Opcode ID: 75396ea15cbbda5dde84f1127a5bab2908a21f5c6df9742b15bbf8e248881a31
                            • Instruction ID: a012adfd276ed415616667d7e208f744d416e3dd65cb9e10e19a37f31a125192
                            • Opcode Fuzzy Hash: 75396ea15cbbda5dde84f1127a5bab2908a21f5c6df9742b15bbf8e248881a31
                            • Instruction Fuzzy Hash: EFE0E675D45208FFDA00AB95ED0F52D76749B15729F000155F80D61681E7B16F684BD2
                            Strings
                            • Error Reading from pipe!, xrefs: 001682BF
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID:
                            • String ID: Error Reading from pipe!
                            • API String ID: 0-1652627068
                            • Opcode ID: a078b3c99ee78cc9dbdbd20da46c5a63489cf788525c9e6354667d03d5156acd
                            • Instruction ID: 3e5070061b2a94f9741c036039594da0b4208a73946596ea23e8d75ab4c907a6
                            • Opcode Fuzzy Hash: a078b3c99ee78cc9dbdbd20da46c5a63489cf788525c9e6354667d03d5156acd
                            • Instruction Fuzzy Hash: 6E21C3B4C04248EBCF00DFA0DC456AE7B74BB14784F204669E90697341DB30DA65DBA1
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3263694311.0000000000161000.00000020.00000001.01000000.00000003.sdmp, Offset: 00160000, based on PE: true
                            • Associated: 00000000.00000002.3263664859.0000000000160000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263736707.000000000017C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263761210.000000000017F000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263791159.0000000000182000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000187000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3263820104.0000000000195000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_160000_wce.jbxd
                            Similarity
                            • API ID: _wprintf
                            • String ID: %.2x
                            • API String ID: 2738768116-1955163564
                            • Opcode ID: 06018109646e7ed5396b563043e76e737450226b8c7e9b586c24efc89c6edf0d
                            • Instruction ID: 0ceed09fca19ca7986ab769998618bad830da8cc801b17921c4701acd11dd8b7
                            • Opcode Fuzzy Hash: 06018109646e7ed5396b563043e76e737450226b8c7e9b586c24efc89c6edf0d
                            • Instruction Fuzzy Hash: A3F08970904109E7CB04DF44CD52B6D73B5DF61304F24C198E80967241EF30AF20AF91