Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RXxeYma4d5.exe

Overview

General Information

Sample name:RXxeYma4d5.exe
renamed because original name is a hash value
Original sample name:6496951be7839af7461c7988dd4d324f.exe
Analysis ID:1582584
MD5:6496951be7839af7461c7988dd4d324f
SHA1:b0da6dacfdfafa38f4da8a6de97777a839ab36e4
SHA256:32a8c77f35f4bd8fdd4afe2e5d37c9effeac2df4ba141a3ac611fee37447f68f
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Powershell launch regsvr32
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected GhostRat
AI detected suspicious sample
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found stalling execution ending in API Sleep call
Loading BitLocker PowerShell Module
Sets debug register (to hijack the execution of another thread)
Sigma detected: Potentially Suspicious Child Process Of Regsvr32
Suspicious powershell command line found
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
Uses Register-ScheduledTask to add task schedules
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample file is different than original file name gathered from version info
Sigma detected: Communication To Uncommon Destination Ports
Sigma detected: Network Connection Initiated By Regsvr32.EXE
Sigma detected: Potential Regsvr32 Commandline Flag Anomaly
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • RXxeYma4d5.exe (PID: 7516 cmdline: "C:\Users\user\Desktop\RXxeYma4d5.exe" MD5: 6496951BE7839AF7461C7988DD4D324F)
    • RXxeYma4d5.tmp (PID: 7532 cmdline: "C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp" /SL5="$10480,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" MD5: D5A634439F2ABA0A8D26F31577C73343)
      • RXxeYma4d5.exe (PID: 7568 cmdline: "C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT MD5: 6496951BE7839AF7461C7988DD4D324F)
        • RXxeYma4d5.tmp (PID: 7584 cmdline: "C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp" /SL5="$20484,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT MD5: D5A634439F2ABA0A8D26F31577C73343)
          • regsvr32.exe (PID: 7600 cmdline: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll MD5: 878E47C8656E53AE8A8A21E927C6F7E0)
            • regsvr32.exe (PID: 7616 cmdline: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
              • powershell.exe (PID: 7644 cmdline: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }" MD5: 04029E121A0CFA5991749937DD22A1D9)
                • conhost.exe (PID: 7652 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 7872 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
                • conhost.exe (PID: 7880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • regsvr32.exe (PID: 7256 cmdline: "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Cow.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • regsvr32.exe (PID: 8020 cmdline: C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.2926694272.0000000000C57000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x33638:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x36b6e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x22388:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x258be:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
Process Memory Space: regsvr32.exe PID: 7616JoeSecurity_GhostRatYara detected GhostRatJoe Security
    SourceRuleDescriptionAuthorStrings
    5.2.regsvr32.exe.c695bd.0.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x2107b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x245b1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    5.2.regsvr32.exe.28b130d.1.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x2107b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x245b1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB

    System Summary

    barindex
    Source: Process startedAuthor: elhoim, Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 7616, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", ProcessId: 7644, ProcessName: powershell.exe
    Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 23.235.165.54, DestinationIsIpv6: false, DestinationPort: 8888, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 7616, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 50004
    Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DestinationIp: 23.235.165.54, DestinationIsIpv6: false, DestinationPort: 6666, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 7616, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll, CommandLine: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\regsvr32.exe, NewProcessName: C:\Windows\SysWOW64\regsvr32.exe, OriginalFileName: C:\Windows\SysWOW64\regsvr32.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp" /SL5="$20484,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT, ParentImage: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp, ParentProcessId: 7584, ParentProcessName: RXxeYma4d5.tmp, ProcessCommandLine: "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll, ProcessId: 7600, ProcessName: regsvr32.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 7616, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", ProcessId: 7644, ProcessName: powershell.exe

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: Process startedAuthor: Joe Security: Data: Command: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", CommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll, ParentImage: C:\Windows\System32\regsvr32.exe, ParentProcessId: 7616, ParentProcessName: regsvr32.exe, ProcessCommandLine: "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }", ProcessId: 7644, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-30T23:12:22.238374+010020528751A Network Trojan was detected192.168.2.44973623.235.165.546666TCP
    2024-12-30T23:13:30.811748+010020528751A Network Trojan was detected192.168.2.44973723.235.165.546666TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: C:\Users\user\AppData\Roaming\Setup_Cow.dll (copy)ReversingLabs: Detection: 60%
    Source: C:\Users\user\AppData\Roaming\is-I9R0P.tmpReversingLabs: Detection: 60%
    Source: RXxeYma4d5.exeReversingLabs: Detection: 44%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.1% probability
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013E0170 TlsGetValue,BCryptGenRandom,SystemFunction036,TlsGetValue,TlsGetValue,TlsSetValue,HeapFree,HeapFree,TlsSetValue,HeapFree,HeapFree,TlsSetValue,HeapFree,HeapFree,TlsSetValue,5_2_00007FFE013E0170
    Source: RXxeYma4d5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\File Manager_is1Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: z:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: x:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: v:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: t:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: r:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: p:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: n:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: l:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: j:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: h:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: f:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: b:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: y:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: w:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: u:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: s:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: q:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: o:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: m:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: k:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: i:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: g:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: c:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: [:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E49960 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,5_2_02E49960
    Source: C:\Windows\System32\regsvr32.exeCode function: 4x nop then push r135_2_00007FFE01425514

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49736 -> 23.235.165.54:6666
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49737 -> 23.235.165.54:6666
    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.235.165.54 8888Jump to behavior
    Source: global trafficTCP traffic: 192.168.2.4:49736 -> 23.235.165.54:6666
    Source: Joe Sandbox ViewASN Name: XIAOZHIYUN1-AS-APICIDCNETWORKUS XIAOZHIYUN1-AS-APICIDCNETWORKUS
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: unknownTCP traffic detected without corresponding DNS query: 23.235.165.54
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E43660 select,recv,_errno,_errno,_errno,5_2_02E43660
    Source: powershell.exe, 00000006.00000002.1756750432.000001F411485000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000006.00000002.1728970401.000001F401638000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: powershell.exe, 00000006.00000002.1728970401.000001F401411000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.0000028233781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000006.00000002.1728970401.000001F401638000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: RXxeYma4d5.exe, 00000000.00000003.1666133308.0000000002440000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.exe, 00000000.00000003.1666348689.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.tmp, 00000001.00000000.1666946979.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RXxeYma4d5.tmp.2.dr, is-HU557.tmp.3.dr, RXxeYma4d5.tmp.0.drString found in binary or memory: http://www.innosetup.com/
    Source: powershell.exe, 00000006.00000002.1768623458.000001F47F95B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
    Source: RXxeYma4d5.exe, 00000000.00000003.1666133308.0000000002440000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.exe, 00000000.00000003.1666348689.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.tmp, 00000001.00000000.1666946979.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RXxeYma4d5.tmp.2.dr, is-HU557.tmp.3.dr, RXxeYma4d5.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
    Source: powershell.exe, 00000006.00000002.1728970401.000001F401411000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.0000028233781000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1894153184.000002824BC80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
    Source: powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: RXxeYma4d5.tmp, 00000003.00000003.1675966181.0000000005B30000.00000004.00001000.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmp, is-I9R0P.tmp.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support/rust/deps
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000006.00000002.1756750432.000001F411485000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Windows\System32\regsvr32.exeCode function: [esc]5_2_02E52000
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E52000 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,5_2_02E52000
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E52000 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,5_2_02E52000
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4EBE0 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,5_2_02E4EBE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E51BF0 SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,5_2_02E51BF0
    Source: C:\Windows\System32\regsvr32.exeWindows user hook set: 0 mouse low level C:\Windows\system32\DINPUT8.dllJump to behavior

    System Summary

    barindex
    Source: 5.2.regsvr32.exe.c695bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 5.2.regsvr32.exe.28b130d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000005.00000002.2926694272.0000000000C57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013ED4A0 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,5_2_00007FFE013ED4A0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D5D24 memset,HeapCreate,HeapAlloc,GetLastError,memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,DeleteFileW,HeapFree,GetLastError,HeapFree,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,5_2_00007FFE013D5D24
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D6280 memset,HeapCreate,HeapAlloc,GetLastError,memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,5_2_00007FFE013D6280
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4E0E8 ExitWindowsEx,5_2_02E4E0E8
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4E0C7 ExitWindowsEx,5_2_02E4E0C7
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4E097 ExitProcess,ExitWindowsEx,5_2_02E4E097
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4EBE05_2_02E4EBE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E433605_2_02E43360
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5FF945_2_02E5FF94
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E467905_2_02E46790
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E474F05_2_02E474F0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E484405_2_02E48440
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E515C05_2_02E515C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5AA5C5_2_02E5AA5C
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E60A005_2_02E60A00
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E51BF05_2_02E51BF0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E43BA05_2_02E43BA0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5D3285_2_02E5D328
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5B0BC5_2_02E5B0BC
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5C8705_2_02E5C870
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4B0505_2_02E4B050
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E428505_2_02E42850
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E6C8045_2_02E6C804
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4C1A05_2_02E4C1A0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E459305_2_02E45930
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48EC05_2_02E48EC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5BEDC5_2_02E5BEDC
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5AE805_2_02E5AE80
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E496505_2_02E49650
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E636505_2_02E63650
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4F7905_2_02E4F790
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E55F905_2_02E55F90
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E60F305_2_02E60F30
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E6B4EC5_2_02E6B4EC
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5F4E85_2_02E5F4E8
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E69CA05_2_02E69CA0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E494605_2_02E49460
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E604145_2_02E60414
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E6CD405_2_02E6CD40
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E6BD505_2_02E6BD50
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4F5205_2_02E4F520
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E62D005_2_02E62D00
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013E01705_2_00007FFE013E0170
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014102C05_2_00007FFE014102C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D5DE85_2_00007FFE013D5DE8
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01417C905_2_00007FFE01417C90
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D5D245_2_00007FFE013D5D24
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01421FE05_2_00007FFE01421FE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D1E805_2_00007FFE013D1E80
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0142E1B05_2_00007FFE0142E1B0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EC1705_2_00007FFE013EC170
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014022205_2_00007FFE01402220
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013DC1D05_2_00007FFE013DC1D0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014340B05_2_00007FFE014340B0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EB0505_2_00007FFE013EB050
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014330705_2_00007FFE01433070
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014051305_2_00007FFE01405130
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EE0E05_2_00007FFE013EE0E0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014204005_2_00007FFE01420400
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014204205_2_00007FFE01420420
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F13C05_2_00007FFE013F13C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0143E3C05_2_00007FFE0143E3C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D62805_2_00007FFE013D6280
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FB2905_2_00007FFE013FB290
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0140B3005_2_00007FFE0140B300
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FC32F5_2_00007FFE013FC32F
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FC2DB5_2_00007FFE013FC2DB
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FC2F25_2_00007FFE013FC2F2
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014106105_2_00007FFE01410610
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014325D05_2_00007FFE014325D0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014084605_2_00007FFE01408460
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0141F4F05_2_00007FFE0141F4F0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D47905_2_00007FFE013D4790
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D474F5_2_00007FFE013D474F
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014177605_2_00007FFE01417760
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EA6805_2_00007FFE013EA680
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D47035_2_00007FFE013D4703
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FB7005_2_00007FFE013FB700
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014227305_2_00007FFE01422730
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014057305_2_00007FFE01405730
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0140A6E05_2_00007FFE0140A6E0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014169A05_2_00007FFE014169A0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013DD9C05_2_00007FFE013DD9C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F38805_2_00007FFE013F3880
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0141B8405_2_00007FFE0141B840
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE014159005_2_00007FFE01415900
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FB9275_2_00007FFE013FB927
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F39305_2_00007FFE013F3930
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01433B805_2_00007FFE01433B80
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBB965_2_00007FFE013FBB96
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0140CB505_2_00007FFE0140CB50
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013E2B605_2_00007FFE013E2B60
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013E1C325_2_00007FFE013E1C32
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013E3BC05_2_00007FFE013E3BC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBBEF5_2_00007FFE013FBBEF
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01415AB05_2_00007FFE01415AB0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F7A405_2_00007FFE013F7A40
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D5D445_2_00007FFE013D5D44
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBD3F5_2_00007FFE013FBD3F
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F0DD05_2_00007FFE013F0DD0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE0141EDE05_2_00007FFE0141EDE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EDC905_2_00007FFE013EDC90
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F1D305_2_00007FFE013F1D30
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBCD95_2_00007FFE013FBCD9
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013F2CD05_2_00007FFE013F2CD0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBF405_2_00007FFE013FBF40
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01415F405_2_00007FFE01415F40
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01416F795_2_00007FFE01416F79
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EC0005_2_00007FFE013EC000
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBFCE5_2_00007FFE013FBFCE
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013E7E705_2_00007FFE013E7E70
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013FBEC45_2_00007FFE013FBEC4
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013DCEE05_2_00007FFE013DCEE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013D9EF05_2_00007FFE013D9EF0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028733905_2_02873390
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028773D05_2_028773D0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028768605_2_02876860
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0287A30C5_2_0287A30C
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028728805_2_02872880
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028848985_2_02884898
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0287E1C05_2_0287E1C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02876F705_2_02876F70
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02886C505_2_02886C50
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028B3A9D5_2_028B3A9D
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028B7ADD5_2_028B7ADD
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028BAA195_2_028BAA19
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028B767D5_2_028B767D
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028B2F8D5_2_028B2F8D
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028C4FA55_2_028C4FA5
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028C735D5_2_028C735D
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028B6F6D5_2_028B6F6D
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028BE8CD5_2_028BE8CD
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D762615_2_02D76261
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D85A615_2_02D85A61
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D8FA655_2_02D8FA65
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D723215_2_02D72321
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D810915_2_02D81091
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D789915_2_02D78991
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D8B9AD5_2_02D8B9AD
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D791215_2_02D79121
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D816C15_2_02D816C1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D8FEE55_2_02D8FEE5
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D7E6B15_2_02D7E6B1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D736715_2_02D73671
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D72E315_2_02D72E31
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D927D15_2_02D927D1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D76FC15_2_02D76FC1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D7EFF15_2_02D7EFF1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D904D15_2_02D904D1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D7BC715_2_02D7BC71
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D754015_2_02D75401
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D8A52D5_2_02D8A52D
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B624FFB6_2_00007FFD9B624FFB
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B604DFB8_2_00007FFD9B604DFB
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFE01404B20 appears 46 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFE013DA6D0 appears 32 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFE013ECE50 appears 54 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFE013DA3D0 appears 73 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFE01423D5C appears 94 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFE013DBB00 appears 48 times
    Source: RXxeYma4d5.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: RXxeYma4d5.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: RXxeYma4d5.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: RXxeYma4d5.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: RXxeYma4d5.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: is-HU557.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: is-HU557.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: is-I9R0P.tmp.3.drStatic PE information: Number of sections : 11 > 10
    Source: RXxeYma4d5.exe, 00000000.00000003.1666133308.0000000002561000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs RXxeYma4d5.exe
    Source: RXxeYma4d5.exe, 00000000.00000003.1666348689.000000007FE3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs RXxeYma4d5.exe
    Source: RXxeYma4d5.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: 5.2.regsvr32.exe.c695bd.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 5.2.regsvr32.exe.28b130d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000005.00000002.2926694272.0000000000C57000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@20/21@0/1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE013EFD00 memset,FormatMessageW,GetLastError,HeapFree,HeapFree,5_2_00007FFE013EFD00
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E492E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,5_2_02E492E0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4A900 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,5_2_02E4A900
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48E00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,5_2_02E48E00
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48C80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,OpenProcess,5_2_02E48C80
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48180 GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,5_2_02E48180
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E47400 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,5_2_02E47400
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E47A90 CoInitialize,CoCreateInstance,SysFreeString,CoUninitialize,5_2_02E47A90
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\unins000.datJump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7652:120:WilError_03
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7880:120:WilError_03
    Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12.23
    Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\xjyFV
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeFile created: C:\Users\user\AppData\Local\Temp\is-25UIU.tmpJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
    Source: RXxeYma4d5.exeReversingLabs: Detection: 44%
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeFile read: C:\Users\user\Desktop\RXxeYma4d5.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\RXxeYma4d5.exe "C:\Users\user\Desktop\RXxeYma4d5.exe"
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeProcess created: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp "C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp" /SL5="$10480,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe"
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess created: C:\Users\user\Desktop\RXxeYma4d5.exe "C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeProcess created: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp "C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp" /SL5="$20484,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Cow.dll
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeProcess created: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp "C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp" /SL5="$10480,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess created: C:\Users\user\Desktop\RXxeYma4d5.exe "C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENTJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeProcess created: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp "C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp" /SL5="$20484,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }"Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Cow.dllJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: explorerframe.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: sfc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpWindow found: window name: TMainFormJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\File Manager_is1Jump to behavior

    Data Obfuscation

    barindex
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }"
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }"Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48A70 LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,5_2_02E48A70
    Source: _setup64.tmp.1.drStatic PE information: real checksum: 0x0 should be: 0x8546
    Source: is-I9R0P.tmp.3.drStatic PE information: real checksum: 0xc4d5e should be: 0xcc413
    Source: _setup64.tmp.3.drStatic PE information: real checksum: 0x0 should be: 0x8546
    Source: is-HU557.tmp.3.drStatic PE information: real checksum: 0x0 should be: 0x1320bf
    Source: RXxeYma4d5.exeStatic PE information: real checksum: 0x0 should be: 0xefeac
    Source: RXxeYma4d5.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x12d741
    Source: RXxeYma4d5.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x12d741
    Source: is-I9R0P.tmp.3.drStatic PE information: section name: .xdata
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess created: C:\Windows\SysWOW64\regsvr32.exe "regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E400B7 push rdi; ret 5_2_02E400BD
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E6F949 push rbp; retf 5_2_02E6F974
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_0287B348 push esp; iretd 5_2_0287B349
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02885DBA push ebp; iretd 5_2_02885DC4
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028BBA55 push esp; iretd 5_2_028BBA56
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_028C64C7 push ebp; iretd 5_2_028C64D1
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D8F787 push cs; retf 5_2_02D8F788
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D90449 pushfd ; ret 5_2_02D9044A
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D7847D push eax; ret 5_2_02D7847E
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02D78428 push ecx; ret 5_2_02D78429
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B50D2A5 pushad ; iretd 6_2_00007FFD9B50D2A6
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B6278B5 push ebx; retf 6_2_00007FFD9B62796A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B622098 push E95E6CD2h; ret 6_2_00007FFD9B6220E9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 6_2_00007FFD9B6278FC push ebx; retf 6_2_00007FFD9B62796A
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B4ED2A5 pushad ; iretd 8_2_00007FFD9B4ED2A6
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B60DBCB push E85B2FB6h; ret 8_2_00007FFD9B60DBF9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B60DB8D push E85B2FB6h; ret 8_2_00007FFD9B60DBF9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B60AFFA push eax; ret 8_2_00007FFD9B60B051
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B6000BD pushad ; iretd 8_2_00007FFD9B6000C1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 8_2_00007FFD9B6D6DCB push ecx; iretd 8_2_00007FFD9B6D6DCC
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Roaming\Setup_Cow.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeFile created: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Roaming\is-I9R0P.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\Temp\is-I54BB.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\Temp\is-I54BB.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\is-HU557.tmpJump to dropped file
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeFile created: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpFile created: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file

    Boot Survival

    barindex
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4E03A OpenEventLogW,ClearEventLogW,CloseEventLog,5_2_02E4E03A
    Source: C:\Windows\System32\regsvr32.exeKey value created or modified: HKEY_CURRENT_USER\Console\1 d33f351a4aeea5e608853d1a56661059Jump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\RXxeYma4d5.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\regsvr32.exeStalling execution: Execution stalls by calling Sleepgraph_5-98710
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 352Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 3592Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 5100Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4988Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4850Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6857Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2725Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Setup_Cow.dll (copy)Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\is-I9R0P.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-I54BB.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-I54BB.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\is-HU557.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
    Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.5 %
    Source: C:\Windows\System32\regsvr32.exe TID: 2304Thread sleep count: 327 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 4464Thread sleep count: 352 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 4464Thread sleep time: -352000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 3368Thread sleep count: 3592 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 3368Thread sleep time: -35920s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 4464Thread sleep count: 5100 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 4464Thread sleep time: -5100000s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7760Thread sleep count: 4988 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7764Thread sleep count: 4850 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7804Thread sleep time: -4611686018427385s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7952Thread sleep count: 6857 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7952Thread sleep count: 2725 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7980Thread sleep time: -4611686018427385s >= -30000sJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E49960 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,5_2_02E49960
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E489F0 GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,5_2_02E489F0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: regsvr32.exe, 00000005.00000002.2926694272.0000000000C57000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
    Source: RXxeYma4d5.tmp, 00000001.00000002.1673095579.0000000000927000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
    Source: RXxeYma4d5.tmp, 00000001.00000002.1673095579.0000000000927000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\QmI
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
    Source: C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmpProcess information queried: ProcessInformationJump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5C1C4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_02E5C1C4
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48A70 LoadLibraryW,GetProcAddress,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,FreeLibrary,5_2_02E48A70
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E47BF0 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,5_2_02E47BF0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E515C0 Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,5_2_02E515C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5C1C4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_02E5C1C4
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E54CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_02E54CD0

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 23.235.165.54 8888Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48EC0 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,5_2_02E48EC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E48EC0 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,5_2_02E48EC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E4A410 VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,VirtualFreeEx,5_2_02E4A410
    Source: C:\Windows\System32\regsvr32.exeThread register set: 7616 5Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe5_2_02E48EC0
    Source: C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmpProcess created: C:\Users\user\Desktop\RXxeYma4d5.exe "C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENTJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }"Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Cow.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"regsvr32\" -argument \"/s /i:360 c:\users\user\appdata\roaming\setup_cow.dll\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{8208a45d-f29a-4a60-cbd5-99028fb966b8}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"regsvr32\" -argument \"/s /i:360 c:\users\user\appdata\roaming\setup_cow.dll\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{8208a45d-f29a-4a60-cbd5-99028fb966b8}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"Jump to behavior
    Source: regsvr32.exe, 00000005.00000003.2019926257.0000000003DA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .2.4 0 min965969Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free3 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
    Source: regsvr32.exe, 00000005.00000002.2927612383.0000000003040000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: regsvr32.exe, 00000005.00000002.2927883605.0000000003F60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .2.4 0 min965969Windows 10 Pro10.0.190454HDD:1WW 223 Gb Free 168 Gb Mem: 8 Gb Free2 Gb Microsoft Basic Render Driver 0 5140 Microsoft Basic Render Driver 0 5140 Program Manager
    Source: C:\Windows\System32\regsvr32.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,GetTickCount,_localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,5_2_02E46790
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,GetLocaleInfoW,GetLocaleInfoW,GetACP,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,5_2_02E66254
    Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,free,5_2_02E673F4
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,5_2_02E65BD8
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoW,5_2_02E66020
    Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,5_2_02E661E8
    Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,5_2_02E66150
    Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,5_2_02E65CC0
    Source: C:\Windows\System32\regsvr32.exeCode function: GetLastError,free,free,GetLocaleInfoW,GetLocaleInfoW,free,GetLocaleInfoW,5_2_02E5E590
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,5_2_02E65D50
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_00007FFE01417C90 GetCurrentProcessId,ProcessPrng,HeapFree,CreateNamedPipeW,GetLastError,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,5_2_00007FFE01417C90
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E515C0 Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,5_2_02E515C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5FF94 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,5_2_02E5FF94
    Source: C:\Windows\System32\regsvr32.exeCode function: 5_2_02E5BA94 HeapCreate,GetVersion,HeapSetInformation,5_2_02E5BA94
    Source: regsvr32.exeBinary or memory string: acs.exe
    Source: regsvr32.exeBinary or memory string: vsserv.exe
    Source: regsvr32.exeBinary or memory string: avcenter.exe
    Source: regsvr32.exeBinary or memory string: kxetray.exe
    Source: regsvr32.exeBinary or memory string: KSafeTray.exe
    Source: regsvr32.exeBinary or memory string: avp.exe
    Source: regsvr32.exeBinary or memory string: cfp.exe
    Source: regsvr32.exeBinary or memory string: 360Safe.exe
    Source: regsvr32.exeBinary or memory string: rtvscan.exe
    Source: regsvr32.exeBinary or memory string: 360tray.exe
    Source: regsvr32.exeBinary or memory string: TMBMSRV.exe
    Source: regsvr32.exeBinary or memory string: ashDisp.exe
    Source: regsvr32.exeBinary or memory string: 360Tray.exe
    Source: regsvr32.exeBinary or memory string: avgwdsvc.exe
    Source: regsvr32.exeBinary or memory string: AYAgent.aye
    Source: regsvr32.exeBinary or memory string: RavMonD.exe
    Source: regsvr32.exeBinary or memory string: QUHLPSVC.EXE
    Source: regsvr32.exeBinary or memory string: Mcshield.exe
    Source: regsvr32.exeBinary or memory string: K7TSecurity.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7616, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7616, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Command and Scripting Interpreter
    1
    Windows Service
    1
    Access Token Manipulation
    3
    Obfuscated Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Screen Capture
    2
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Scheduled Task/Job
    1
    Scheduled Task/Job
    1
    Windows Service
    1
    DLL Side-Loading
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares121
    Input Capture
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    PowerShell
    Login Hook423
    Process Injection
    1
    Masquerading
    NTDS36
    System Information Discovery
    Distributed Component Object Model2
    Clipboard Data
    Protocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
    Scheduled Task/Job
    1
    Modify Registry
    LSA Secrets231
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
    Virtualization/Sandbox Evasion
    Cached Domain Credentials21
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Access Token Manipulation
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job423
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
    Regsvr32
    /etc/passwd and /etc/shadow2
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
    Indicator Removal
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1582584 Sample: RXxeYma4d5.exe Startdate: 30/12/2024 Architecture: WINDOWS Score: 100 63 Suricata IDS alerts for network traffic 2->63 65 Malicious sample detected (through community Yara rule) 2->65 67 Multi AV Scanner detection for dropped file 2->67 69 5 other signatures 2->69 12 RXxeYma4d5.exe 2 2->12         started        15 regsvr32.exe 2->15         started        process3 file4 57 C:\Users\user\AppData\...\RXxeYma4d5.tmp, PE32 12->57 dropped 17 RXxeYma4d5.tmp 3 5 12->17         started        process5 file6 43 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 17->43 dropped 45 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 17->45 dropped 20 RXxeYma4d5.exe 2 17->20         started        process7 file8 47 C:\Users\user\AppData\...\RXxeYma4d5.tmp, PE32 20->47 dropped 23 RXxeYma4d5.tmp 22 7 20->23         started        process9 file10 49 C:\Users\user\AppData\Roaming\is-I9R0P.tmp, PE32+ 23->49 dropped 51 C:\Users\user\...\Setup_Cow.dll (copy), PE32+ 23->51 dropped 53 C:\Users\user\AppData\...\unins000.exe (copy), PE32 23->53 dropped 55 3 other files (none is malicious) 23->55 dropped 26 regsvr32.exe 23->26         started        process11 process12 28 regsvr32.exe 3 1 26->28         started        dnsIp13 59 23.235.165.54, 49736, 49737, 50004 XIAOZHIYUN1-AS-APICIDCNETWORKUS United States 28->59 71 System process connects to network (likely due to code injection or exploit) 28->71 73 Suspicious powershell command line found 28->73 75 Found stalling execution ending in API Sleep call 28->75 77 6 other signatures 28->77 32 powershell.exe 37 28->32         started        35 powershell.exe 36 28->35         started        37 regsvr32.exe 28->37         started        signatures14 process15 signatures16 61 Loading BitLocker PowerShell Module 32->61 39 conhost.exe 32->39         started        41 conhost.exe 35->41         started        process17

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    RXxeYma4d5.exe45%ReversingLabsWin32.Packed.Generic
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp4%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp4%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_setup64.tmp0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_shfoldr.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-I54BB.tmp\_isetup\_setup64.tmp0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-I54BB.tmp\_isetup\_shfoldr.dll0%ReversingLabs
    C:\Users\user\AppData\Local\is-HU557.tmp4%ReversingLabs
    C:\Users\user\AppData\Local\unins000.exe (copy)4%ReversingLabs
    C:\Users\user\AppData\Roaming\Setup_Cow.dll (copy)61%ReversingLabsWin64.Packed.Generic
    C:\Users\user\AppData\Roaming\is-I9R0P.tmp61%ReversingLabsWin64.Packed.Generic
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.innosetup.com/RXxeYma4d5.exe, 00000000.00000003.1666133308.0000000002440000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.exe, 00000000.00000003.1666348689.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.tmp, 00000001.00000000.1666946979.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RXxeYma4d5.tmp.2.dr, is-HU557.tmp.3.dr, RXxeYma4d5.tmp.0.drfalse
      high
      http://nuget.org/NuGet.exepowershell.exe, 00000006.00000002.1756750432.000001F411485000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1894153184.000002824BC80000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpfalse
            high
            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000006.00000002.1728970401.000001F401638000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000006.00000002.1728970401.000001F401638000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://contoso.com/powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://nuget.org/nuget.exepowershell.exe, 00000006.00000002.1756750432.000001F411485000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://contoso.com/Licensepowershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000008.00000002.1883487909.00000282437F5000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.microsoft.powershell.exe, 00000006.00000002.1768623458.000001F47F95B000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://aka.ms/pscore68powershell.exe, 00000006.00000002.1728970401.000001F401411000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.0000028233781000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.remobjects.com/psRXxeYma4d5.exe, 00000000.00000003.1666133308.0000000002440000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.exe, 00000000.00000003.1666348689.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, RXxeYma4d5.tmp, 00000001.00000000.1666946979.0000000000401000.00000020.00000001.01000000.00000004.sdmp, RXxeYma4d5.tmp.2.dr, is-HU557.tmp.3.dr, RXxeYma4d5.tmp.0.drfalse
                                high
                                https://docs.rs/getrandom#nodejs-es-module-support/rust/depsRXxeYma4d5.tmp, 00000003.00000003.1675966181.0000000005B30000.00000004.00001000.00020000.00000000.sdmp, regsvr32.exe, 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmp, is-I9R0P.tmp.3.drfalse
                                  high
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000006.00000002.1728970401.000001F401411000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1804406305.0000028233781000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://github.com/Pester/Pesterpowershell.exe, 00000008.00000002.1804406305.00000282339AA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      23.235.165.54
                                      unknownUnited States
                                      136800XIAOZHIYUN1-AS-APICIDCNETWORKUStrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1582584
                                      Start date and time:2024-12-30 23:11:04 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 7m 15s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:16
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:RXxeYma4d5.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:6496951be7839af7461c7988dd4d324f.exe
                                      Detection:MAL
                                      Classification:mal100.troj.spyw.evad.winEXE@20/21@0/1
                                      EGA Information:
                                      • Successful, ratio: 33.3%
                                      HCA Information:
                                      • Successful, ratio: 96%
                                      • Number of executed functions: 85
                                      • Number of non-executed functions: 215
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target powershell.exe, PID 7644 because it is empty
                                      • Execution Graph export aborted for target powershell.exe, PID 7872 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtCreateKey calls found.
                                      • Report size getting too big, too many NtEnumerateKey calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: RXxeYma4d5.exe
                                      TimeTypeDescription
                                      17:11:57API Interceptor42x Sleep call for process: powershell.exe modified
                                      17:12:57API Interceptor1005224x Sleep call for process: regsvr32.exe modified
                                      22:12:09Task SchedulerRun new task: MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8} path: regsvr32 s>/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
                                      No context
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      XIAOZHIYUN1-AS-APICIDCNETWORKUSvcimanagement.armv7l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 156.253.103.137
                                      vcimanagement.mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 156.254.252.201
                                      vcimanagement.mips.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 156.234.199.209
                                      vcimanagement.x86.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 156.255.154.138
                                      vcimanagement.m68k.elfGet hashmaliciousGafgyt, MiraiBrowse
                                      • 156.241.23.75
                                      Wk6IMAhBNF.exeGet hashmaliciousGhostRatBrowse
                                      • 103.199.100.130
                                      aQ7bSXduYp.exeGet hashmaliciousGhostRat, NitolBrowse
                                      • 156.225.22.155
                                      mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                      • 103.199.102.178
                                      nsharm.elfGet hashmaliciousMiraiBrowse
                                      • 156.234.199.255
                                      loligang.arm7.elfGet hashmaliciousMiraiBrowse
                                      • 156.234.199.204
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
                                        C:\Users\user\AppData\Local\Temp\is-I3JO9.tmp\_isetup\_setup64.tmp017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
                                          vc8Kx5C54G.exeGet hashmaliciousSocks5SystemzBrowse
                                            AbC0LBkVhr.exeGet hashmaliciousSocks5SystemzBrowse
                                              Mg5bMQ2lWi.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                  wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                    AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                      6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                        j9htknb7BQ.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                          AMS_Client_SSO.exeGet hashmaliciousUnknownBrowse
                                                            C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:modified
                                                              Size (bytes):64
                                                              Entropy (8bit):0.34726597513537405
                                                              Encrypted:false
                                                              SSDEEP:3:Nlll:Nll
                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                              Malicious:false
                                                              Preview:@...e...........................................................
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:ASCII text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):60
                                                              Entropy (8bit):4.038920595031593
                                                              Encrypted:false
                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                              Malicious:false
                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                              Process:C:\Users\user\Desktop\RXxeYma4d5.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1223168
                                                              Entropy (8bit):6.330739929540704
                                                              Encrypted:false
                                                              SSDEEP:24576:tYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5QNx9Ie:MGUhni7iSFCQij
                                                              MD5:D5A634439F2ABA0A8D26F31577C73343
                                                              SHA1:7B86B632DDFC82EBC58861A3968B3D2138CD9D53
                                                              SHA-256:B61A425A51DB33911BDC3B8CD89DD2FB47B9E6CDFABCBCAE29391B3568EED198
                                                              SHA-512:A3A426FB963436E9C467506FEC6EF9C3919A9AB1CA15F92759B37672D0F3BDCC026B2A44A7AF684EA46455EE3216307E5818C282F7BDBCAD6C45DF24B1EE5AC7
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                              Joe Sandbox View:
                                                              • Filename: 017069451a4dbc523a1165a2f1bd361a762bb40856778.exe, Detection: malicious, Browse
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..........................p...................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                              Process:C:\Users\user\Desktop\RXxeYma4d5.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1223168
                                                              Entropy (8bit):6.330739929540704
                                                              Encrypted:false
                                                              SSDEEP:24576:tYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5QNx9Ie:MGUhni7iSFCQij
                                                              MD5:D5A634439F2ABA0A8D26F31577C73343
                                                              SHA1:7B86B632DDFC82EBC58861A3968B3D2138CD9D53
                                                              SHA-256:B61A425A51DB33911BDC3B8CD89DD2FB47B9E6CDFABCBCAE29391B3568EED198
                                                              SHA-512:A3A426FB963436E9C467506FEC6EF9C3919A9AB1CA15F92759B37672D0F3BDCC026B2A44A7AF684EA46455EE3216307E5818C282F7BDBCAD6C45DF24B1EE5AC7
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                              Joe Sandbox View:
                                                              • Filename: 017069451a4dbc523a1165a2f1bd361a762bb40856778.exe, Detection: malicious, Browse
                                                              Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..........................p...................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6144
                                                              Entropy (8bit):4.215994423157539
                                                              Encrypted:false
                                                              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                              MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                              SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                              SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                              SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Joe Sandbox View:
                                                              • Filename: 017069451a4dbc523a1165a2f1bd361a762bb40856778.exe, Detection: malicious, Browse
                                                              • Filename: vc8Kx5C54G.exe, Detection: malicious, Browse
                                                              • Filename: AbC0LBkVhr.exe, Detection: malicious, Browse
                                                              • Filename: Mg5bMQ2lWi.exe, Detection: malicious, Browse
                                                              • Filename: KRdh0OaXqH.exe, Detection: malicious, Browse
                                                              • Filename: wG1fFAzGfH.exe, Detection: malicious, Browse
                                                              • Filename: AGcC2uK0El.exe, Detection: malicious, Browse
                                                              • Filename: 6hvZpn91O8.exe, Detection: malicious, Browse
                                                              • Filename: j9htknb7BQ.exe, Detection: malicious, Browse
                                                              • Filename: AMS_Client_SSO.exe, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):23312
                                                              Entropy (8bit):4.596242908851566
                                                              Encrypted:false
                                                              SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                              MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                              SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                              SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                              SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):6144
                                                              Entropy (8bit):4.215994423157539
                                                              Encrypted:false
                                                              SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                              MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                              SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                              SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                              SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):23312
                                                              Entropy (8bit):4.596242908851566
                                                              Encrypted:false
                                                              SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                              MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                              SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                              SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                              SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\System32\regsvr32.exe
                                                              File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                              Category:dropped
                                                              Size (bytes):124944
                                                              Entropy (8bit):7.946193612196617
                                                              Encrypted:false
                                                              SSDEEP:3072:yEbzO3t9QEhtvaiS8wJEKh2fnscdzZNZyLLF6C3oR:ytLzHvdAwsmVHyt2
                                                              MD5:4A7761E79B0B3315FCFB8453DEA4E478
                                                              SHA1:401F63318F270068161CB4987A8659688346BA8F
                                                              SHA-256:644155574CEA880C34CE3AB19BD3FD8A30E9F6C97469D0F1FB99288620FCB654
                                                              SHA-512:81331E9B4F6EF02B1DF309B8A6836BD6B9BE3EF173B60407B521CFDD0C9F38DB0699BACDD4042899D62C1A0E5A20C07EFFCAD1CF614E1F0A763894B20143EC01
                                                              Malicious:false
                                                              Preview:PK.........L.Yb.:el..........second_data.bin.[y8.....c+..S..f.%...X..d.d..Ub2...4.D.1..dK.%BJ"..."K.=......s....{.~.s...}?..]...-.......<....p,.nA.)..XZf [..8...f.......+...(4...Hu..=c..{+K.R...0...M.|(.f.|.}E.[M {.i..~}n../.~.[..d1*A...*b..B.a..n.............#.B....<.......^c...h....M....VR..O7...,..X.~R..;..)..x....h=...[K...Vr....C..d=IY!y.VS'^0.....`.88._0zV...J.e.Nj.{.q...N%u9.7...J.D)...4.?m....sL.....VP....d..c..$a/.5...!,5.p...!9.m...g^.S..Y......,..~.>N..A...{~4O..G....=z..@2Gwk......g....0.*Z..$q..6....<.#0.'.C..D.f........(.Ys...a.7.[.d.........._.v...6.....o..9.t...-'5.....\....\...T.0..4).a?.r4%....Ul.M..)0D..G...y..y3.AJ/....&.hW. q........B.>J.o...>BTY.L..\f...+.R.=c.j.:;e....%6l...Y..f...}._.......?....../...?'g.7.._......{.k...r...=......_.......r.VZa...X ..r3.........c..".......f.]:...#3V..n...b.J.T...n..u..Ke.I...#Q.a..........r.}k.o.k...g....t{.M.....=....8...G.....p.Pz#Y^.&N._8...~..&...w.+..N.......'...:.&1..u.>.u?.".~.,...
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1245543
                                                              Entropy (8bit):6.304831359808555
                                                              Encrypted:false
                                                              SSDEEP:24576:FYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5QNx9I4:UGUhni7iSFCQiX
                                                              MD5:BC171227D80BB934474A5D046DE439A8
                                                              SHA1:2728D7E7FB8041B15EE13297FDC3BE4D3C66BBD4
                                                              SHA-256:0D61901F6DEBBDCBBAFBC6B3448D6304D86415861F3635F459441F4AA95B9DCB
                                                              SHA-512:3C7B2308F14BB74FA275383CB721D34BDBBBCF41D58849A13898C57246A0E2E4F6146E366D6AEB38A9BB5043B2C1BA231F06BD575C42E389B92F49C85FF373DF
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..........................p...................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:InnoSetup Log File Manager, version 0x418, 3441 bytes, 965969\37\user\376, C:\Users\user\AppData\Local\376\377\377\0
                                                              Category:dropped
                                                              Size (bytes):3441
                                                              Entropy (8bit):3.766643339701647
                                                              Encrypted:false
                                                              SSDEEP:96:Y8g1dblhcpvwvJu82tiKSC6bufc1AGlEDA4MZAe2Lb0Hhcv:01dphcpvcJu1iaf7fDSmb0HC
                                                              MD5:1DF4001A16676A5CECABCE42E8991EA6
                                                              SHA1:A6C50DE5924E4291DB9A0D222203AD897CBB6DF1
                                                              SHA-256:963CE95AA41B0AD6CBEC4B1FAAD8A9A96394F56DD3AAEB7B9966983E94BC5CB4
                                                              SHA-512:F524BD1BA4F2D27E8FF19D7552C6567DCC95B30F4C22E1D64B929918787AD8C0629877D5908419C9120E6EC120865A32483ECD0F72E0AB48AAC43B87EC86E8FC
                                                              Malicious:false
                                                              Preview:Inno Setup Uninstall Log (b)....................................File Manager....................................................................................................................File Manager............................................................................................................................q...%...............................................................................................................~..N....Z....di......s........9.6.5.9.6.9......j.o.n.e.s......C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l..................7.;.. ..............IFPS...............................................................................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.................!MAIN....-1..(...dll:shell32.dll.ShellExecuteW........................HASCMDLINEPARAM....26 @16..PARAMCOUNT.......COMPARETEXT.........PARAMSTR...........E.......INITIALIZESE
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:dropped
                                                              Size (bytes):1245543
                                                              Entropy (8bit):6.304831359808555
                                                              Encrypted:false
                                                              SSDEEP:24576:FYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5QNx9I4:UGUhni7iSFCQiX
                                                              MD5:BC171227D80BB934474A5D046DE439A8
                                                              SHA1:2728D7E7FB8041B15EE13297FDC3BE4D3C66BBD4
                                                              SHA-256:0D61901F6DEBBDCBBAFBC6B3448D6304D86415861F3635F459441F4AA95B9DCB
                                                              SHA-512:3C7B2308F14BB74FA275383CB721D34BDBBBCF41D58849A13898C57246A0E2E4F6146E366D6AEB38A9BB5043B2C1BA231F06BD575C42E389B92F49C85FF373DF
                                                              Malicious:false
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 4%
                                                              Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..........................p...................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):801217
                                                              Entropy (8bit):6.835421715076469
                                                              Encrypted:false
                                                              SSDEEP:12288:+3J5++rjKV5hL3H84utTaasFYczPdAwsOStzwe5u+:+5jHKV513H8vtTgFDzPdAwVo0e5u+
                                                              MD5:67CA0A61413616CA31ED61867F344FA8
                                                              SHA1:2D3E4D0A0DA8FE31D02ADCAD58DDEEB408B1C02E
                                                              SHA-256:D69E2296C8211872641FB4FD022CCEABD5521110D5FE47A66993FB9A19B526AA
                                                              SHA-512:30EC9418A7182E70CC0E2504CFFDB02DF5152A36D3007DAFD9AC2379BA69316B1718C1A7F7EEE1948257211A3EE09511A65CB0AEA269C247C9169569BACC0036
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......C.>........&"...*.....:......0...............................................^M....`... ......................................`.......p..................4 ..............................................(....................t...............................text...............................`..`.data... .... ......................@....rdata.......0......................@..@.pdata..4 ......."..................@..@.xdata...G.......H..................@..@.bss....`....P...........................edata.......`......................@..@.idata.......p......................@....CRT....`............4..............@....tls.................6..............@....reloc...............8..............@..B........................................................................................................................................................................
                                                              Process:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                              Category:dropped
                                                              Size (bytes):801217
                                                              Entropy (8bit):6.835421715076469
                                                              Encrypted:false
                                                              SSDEEP:12288:+3J5++rjKV5hL3H84utTaasFYczPdAwsOStzwe5u+:+5jHKV513H8vtTgFDzPdAwVo0e5u+
                                                              MD5:67CA0A61413616CA31ED61867F344FA8
                                                              SHA1:2D3E4D0A0DA8FE31D02ADCAD58DDEEB408B1C02E
                                                              SHA-256:D69E2296C8211872641FB4FD022CCEABD5521110D5FE47A66993FB9A19B526AA
                                                              SHA-512:30EC9418A7182E70CC0E2504CFFDB02DF5152A36D3007DAFD9AC2379BA69316B1718C1A7F7EEE1948257211A3EE09511A65CB0AEA269C247C9169569BACC0036
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 61%
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......C.>........&"...*.....:......0...............................................^M....`... ......................................`.......p..................4 ..............................................(....................t...............................text...............................`..`.data... .... ......................@....rdata.......0......................@..@.pdata..4 ......."..................@..@.xdata...G.......H..................@..@.bss....`....P...........................edata.......`......................@..@.idata.......p......................@....CRT....`............4..............@....tls.................6..............@....reloc...............8..............@..B........................................................................................................................................................................
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):7.745766845427773
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 98.86%
                                                              • Inno Setup installer (109748/4) 1.08%
                                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              File name:RXxeYma4d5.exe
                                                              File size:956'899 bytes
                                                              MD5:6496951be7839af7461c7988dd4d324f
                                                              SHA1:b0da6dacfdfafa38f4da8a6de97777a839ab36e4
                                                              SHA256:32a8c77f35f4bd8fdd4afe2e5d37c9effeac2df4ba141a3ac611fee37447f68f
                                                              SHA512:12d307bd033def7cda32376c0706ae7a300a8e439de18e3ef1a841ce95e3085398d0f617a7bfada7f0392120f02ad01362c0ec36c4191fee5ef85ca8f98d2bee
                                                              SSDEEP:24576:JMjhoLtj63OtMIHV07oWsRvtciqgQRgOD39IUZd:AKj0OPHV071SciuRgC9IUZd
                                                              TLSH:26150202BB8374FCED14CA74C871B4446DDE3DA497E711392DB8FA4D0B7A28A48B7961
                                                              File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                              Icon Hash:4ec1caccccca400d
                                                              Entrypoint:0x416478
                                                              Entrypoint Section:.itext
                                                              Digitally signed:false
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x3DE6EFBD [Fri Nov 29 04:40:29 2002 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:483f0c4259a9148c34961abbda6146c1
                                                              Instruction
                                                              push ebp
                                                              mov ebp, esp
                                                              add esp, FFFFFFA4h
                                                              push ebx
                                                              push esi
                                                              push edi
                                                              xor eax, eax
                                                              mov dword ptr [ebp-3Ch], eax
                                                              mov dword ptr [ebp-40h], eax
                                                              mov dword ptr [ebp-5Ch], eax
                                                              mov dword ptr [ebp-30h], eax
                                                              mov dword ptr [ebp-38h], eax
                                                              mov dword ptr [ebp-34h], eax
                                                              mov dword ptr [ebp-2Ch], eax
                                                              mov dword ptr [ebp-28h], eax
                                                              mov dword ptr [ebp-14h], eax
                                                              mov eax, 004152B8h
                                                              call 00007F064C824041h
                                                              xor eax, eax
                                                              push ebp
                                                              push 00416B45h
                                                              push dword ptr fs:[eax]
                                                              mov dword ptr fs:[eax], esp
                                                              xor edx, edx
                                                              push ebp
                                                              push 00416B01h
                                                              push dword ptr fs:[edx]
                                                              mov dword ptr fs:[edx], esp
                                                              mov eax, dword ptr [0041AB48h]
                                                              call 00007F064C8328EBh
                                                              call 00007F064C832492h
                                                              lea edx, dword ptr [ebp-14h]
                                                              xor eax, eax
                                                              call 00007F064C82C114h
                                                              mov edx, dword ptr [ebp-14h]
                                                              mov eax, 0041D6E8h
                                                              call 00007F064C822677h
                                                              push 00000002h
                                                              push 00000000h
                                                              push 00000001h
                                                              mov ecx, dword ptr [0041D6E8h]
                                                              mov dl, 01h
                                                              mov eax, dword ptr [0040F080h]
                                                              call 00007F064C82C9FFh
                                                              mov dword ptr [0041D6ECh], eax
                                                              xor edx, edx
                                                              push ebp
                                                              push 00416AADh
                                                              push dword ptr fs:[edx]
                                                              mov dword ptr fs:[edx], esp
                                                              call 00007F064C832973h
                                                              mov dword ptr [0041D6F4h], eax
                                                              mov eax, dword ptr [0041D6F4h]
                                                              cmp dword ptr [eax+0Ch], 01h
                                                              jne 00007F064C833CDAh
                                                              mov eax, dword ptr [0041D6F4h]
                                                              mov edx, 00000028h
                                                              call 00007F064C82CEC8h
                                                              mov edx, dword ptr [0041D6F4h]
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x1e0000xf9e.idata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000x1a724.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x200000x18.rdata
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x1e3500x24c.idata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x143f80x14400c9bb3afc1ceaaa31127ccfa204c657efFalse0.5487316743827161data6.482216817915366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .itext0x160000xbe80xc001ba5adf2e1058c0460dcc814ba86fb32False0.6246744791666666data6.005798728198158IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .data0x170000xd9c0xe00d5b22eff9e08edaa95f493c1a71158c0False0.2924107142857143data2.669288666959085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .bss0x180000x574c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .idata0x1e0000xf9e0x1000b47eaca4c149ee829de76a342b5560d5False0.35595703125data4.9677831942996935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .tls0x1f0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rdata0x200000x180x2003746f5876803f8f30db5bb2deb8772aeFalse0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .rsrc0x210000x1a7240x1a800421d70a18258de633df2ded74d6c9fe1False0.12851009728773585data4.230549890480233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x2138c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mEnglishUnited States0.1033065183958358
                                                              RT_STRING0x31bb40xc4data0.5969387755102041
                                                              RT_STRING0x31c780xccdata0.6225490196078431
                                                              RT_STRING0x31d440x174data0.5510752688172043
                                                              RT_STRING0x31eb80x39cdata0.34523809523809523
                                                              RT_STRING0x322540x34cdata0.4218009478672986
                                                              RT_STRING0x325a00x294data0.4106060606060606
                                                              RT_RCDATA0x328340x82e8dataEnglishUnited States0.11261637622344235
                                                              RT_RCDATA0x3ab1c0x10data1.5
                                                              RT_RCDATA0x3ab2c0x1a0data0.8149038461538461
                                                              RT_RCDATA0x3accc0x2cdata1.1818181818181819
                                                              RT_GROUP_ICON0x3acf80x14dataEnglishUnited States1.15
                                                              RT_VERSION0x3ad0c0x4b8COM executable for DOSEnglishUnited States0.3079470198675497
                                                              RT_MANIFEST0x3b1c40x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                              DLLImport
                                                              oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                              advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                              user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                                              kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                                              kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                                              user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                                              kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, LeaveCriticalSection, InitializeCriticalSection, GetWindowsDirectoryW, GetVersionExW, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                                                              advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                                              comctl32.dllInitCommonControls
                                                              kernel32.dllSleep
                                                              advapi32.dllAdjustTokenPrivileges
                                                              oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-12-30T23:12:22.238374+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.44973623.235.165.546666TCP
                                                              2024-12-30T23:13:30.811748+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.44973723.235.165.546666TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 30, 2024 23:12:22.232784033 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:22.237732887 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:22.237833977 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:22.238373995 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:22.243113041 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.099669933 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.099968910 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.104865074 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.104876041 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.104886055 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.406429052 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.406443119 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.406455040 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.406493902 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.406716108 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.406727076 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.406773090 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.617100954 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617114067 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617125988 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617136955 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617147923 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617150068 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.617196083 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.617451906 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617463112 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617475033 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617490053 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.617499113 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.617526054 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.827689886 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827702999 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827748060 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.827801943 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827815056 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827826023 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827836037 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827847004 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.827862978 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.827888012 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.828505993 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.828519106 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.828528881 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.828545094 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.828555107 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.828556061 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.828562975 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.828597069 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:23.829375982 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.829392910 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:23.829441071 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.038168907 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038182974 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038194895 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038206100 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038234949 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.038263083 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.038413048 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038431883 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038443089 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038455009 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038466930 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.038471937 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.038506031 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.039346933 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.039357901 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.039369106 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.039383888 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.039395094 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.039397001 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.039422035 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.039434910 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.040040016 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040050983 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040069103 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040079117 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040085077 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040107965 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.040119886 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.040842056 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040853024 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040865898 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040877104 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.040878057 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.040901899 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.092761040 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249001026 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249017954 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249028921 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249047995 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249059916 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249084949 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249140978 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249260902 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249279022 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249289989 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249300003 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249310970 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249316931 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249370098 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249370098 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249780893 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249792099 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249809027 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249825954 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249829054 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249836922 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249849081 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249860048 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.249871969 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.249901056 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.250580072 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250591040 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250607967 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250619888 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250628948 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.250633001 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250644922 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250653982 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250658989 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.250704050 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.250704050 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.251621008 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251632929 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251643896 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251653910 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251663923 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251673937 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251678944 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.251687050 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251698971 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.251715899 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.251759052 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.252624989 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252636909 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252648115 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252657890 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252669096 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252676964 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.252681017 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252693892 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252703905 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.252707005 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.252731085 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.253437996 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.253473043 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.253499031 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.295881987 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.459669113 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459683895 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459695101 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459707022 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459717989 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459729910 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459739923 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459750891 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459758997 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.459804058 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.459804058 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.459841013 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459872007 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459992886 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.459992886 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460004091 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460021973 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460032940 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460043907 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460047960 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460055113 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460069895 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460079908 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460092068 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460094929 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460119009 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460119009 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460633039 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460649967 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460660934 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460671902 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460684061 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460685015 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460694075 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460696936 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460722923 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460751057 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460762024 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460772991 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460789919 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460802078 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460812092 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460817099 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.460827112 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.460844994 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.461025000 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.461675882 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461687088 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461699009 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461708069 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461719036 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461729050 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461739063 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461745024 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.461750031 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.461765051 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.461822987 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.462193966 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462204933 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462217093 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462233067 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462243080 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462253094 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462264061 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462266922 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.462291956 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.462352991 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.462352991 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462367058 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462378025 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462389946 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462399960 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462412119 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.462428093 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.462439060 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.463241100 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463252068 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463263035 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463273048 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463289976 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463299036 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.463299990 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463318110 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463330030 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463341951 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463344097 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.463352919 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463365078 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463365078 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.463372946 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.463376999 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463392019 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.463402033 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.463808060 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.464134932 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.464145899 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.464157104 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.464168072 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.464190960 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.464229107 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.669975042 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670013905 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670032978 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670053005 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670063972 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670074940 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670087099 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670094013 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670103073 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670104027 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670115948 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670142889 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670157909 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670170069 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670176029 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670182943 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670222998 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670232058 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670243979 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670284986 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670289993 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670308113 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670319080 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670329094 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670340061 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670340061 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670372009 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670412064 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670579910 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670622110 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670633078 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670676947 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670686960 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670697927 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670722961 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670902014 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670913935 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670924902 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670953035 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670953035 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.670964003 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670975924 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.670985937 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671004057 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671014071 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671015024 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671029091 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671029091 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671051979 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671350002 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671361923 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671371937 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671396971 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671400070 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671408892 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671420097 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671425104 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671432018 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671458006 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671487093 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671498060 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671509981 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671525955 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671526909 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671540022 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671566963 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671582937 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671595097 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671597004 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671607971 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671619892 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671621084 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671633005 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671643972 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671647072 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671654940 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.671672106 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.671736956 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.674900055 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675107956 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675276041 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675287008 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675287962 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.675333023 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.675466061 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675497055 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675508022 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.675533056 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.675874949 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676002979 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676013947 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676027060 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676038027 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.676135063 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676163912 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.676275969 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.676769018 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676779985 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676790953 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676804066 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676814079 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.676815033 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.676861048 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679495096 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679507971 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679521084 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679529905 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679564953 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679564953 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679596901 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679615974 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679626942 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679641962 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679644108 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679656029 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679666042 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679677010 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679681063 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679688931 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679699898 CET66664973623.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:24.679701090 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679729939 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:24.679770947 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:25.718472004 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:25.724005938 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:25.724093914 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:27.704850912 CET497366666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:31.021240950 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:31.026771069 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:31.026879072 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:31.026887894 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:31.026951075 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:31.324547052 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:31.327338934 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:31.332113028 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:41.905472040 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:41.910851002 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:42.205106020 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:42.249051094 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:42.266066074 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:42.271361113 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:58.139808893 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:58.144824982 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:58.441375017 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:12:58.483475924 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:58.522212982 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:12:58.527076006 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:14.549282074 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:14.554053068 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:14.848603964 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:14.889743090 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:14.943383932 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:14.948199987 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:30.811748028 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:30.816698074 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:31.112663031 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:31.155425072 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:31.181245089 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:31.186037064 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:47.546117067 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:47.546159983 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:47.551000118 CET66664973723.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:47.551137924 CET497376666192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:49.484024048 CET500048888192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:49.488909006 CET88885000423.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:49.488997936 CET500048888192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:54.527590036 CET500048888192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:54.532546043 CET88885000423.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:54.532560110 CET88885000423.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:54.532567978 CET88885000423.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:54.532768965 CET88885000423.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:55.056932926 CET88885000423.235.165.54192.168.2.4
                                                              Dec 30, 2024 23:13:55.059498072 CET500048888192.168.2.423.235.165.54
                                                              Dec 30, 2024 23:13:55.066652060 CET88885000423.235.165.54192.168.2.4

                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:17:11:54
                                                              Start date:30/12/2024
                                                              Path:C:\Users\user\Desktop\RXxeYma4d5.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\RXxeYma4d5.exe"
                                                              Imagebase:0x400000
                                                              File size:956'899 bytes
                                                              MD5 hash:6496951BE7839AF7461C7988DD4D324F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:Borland Delphi
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:1
                                                              Start time:17:11:54
                                                              Start date:30/12/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\is-25UIU.tmp\RXxeYma4d5.tmp" /SL5="$10480,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe"
                                                              Imagebase:0x400000
                                                              File size:1'223'168 bytes
                                                              MD5 hash:D5A634439F2ABA0A8D26F31577C73343
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:Borland Delphi
                                                              Antivirus matches:
                                                              • Detection: 4%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:17:11:54
                                                              Start date:30/12/2024
                                                              Path:C:\Users\user\Desktop\RXxeYma4d5.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT
                                                              Imagebase:0x400000
                                                              File size:956'899 bytes
                                                              MD5 hash:6496951BE7839AF7461C7988DD4D324F
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:Borland Delphi
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:17:11:55
                                                              Start date:30/12/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\AppData\Local\Temp\is-6HP8A.tmp\RXxeYma4d5.tmp" /SL5="$20484,572569,203776,C:\Users\user\Desktop\RXxeYma4d5.exe" /VERYSILENT
                                                              Imagebase:0x400000
                                                              File size:1'223'168 bytes
                                                              MD5 hash:D5A634439F2ABA0A8D26F31577C73343
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:Borland Delphi
                                                              Antivirus matches:
                                                              • Detection: 4%, ReversingLabs
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:17:11:55
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\SysWOW64\regsvr32.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"regsvr32.exe" /s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
                                                              Imagebase:0xae0000
                                                              File size:20'992 bytes
                                                              MD5 hash:878E47C8656E53AE8A8A21E927C6F7E0
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:5
                                                              Start time:17:11:55
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\regsvr32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:/s /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
                                                              Imagebase:0x7ff732dd0000
                                                              File size:25'088 bytes
                                                              MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000005.00000002.2926694272.0000000000C57000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:6
                                                              Start time:17:11:55
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll' }) { exit 0 } else { exit 1 }"
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:17:11:55
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:17:12:05
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{8208A45D-F29A-4A60-CBD5-99028FB966B8}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                              Imagebase:0x7ff788560000
                                                              File size:452'608 bytes
                                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:17:12:05
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:17:12:09
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\regsvr32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\regsvr32.EXE /S /i:360 C:\Users\user\AppData\Roaming\Setup_Cow.dll
                                                              Imagebase:0x7ff732dd0000
                                                              File size:25'088 bytes
                                                              MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:14
                                                              Start time:17:12:18
                                                              Start date:30/12/2024
                                                              Path:C:\Windows\System32\regsvr32.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:"regsvr32" /i:360 /s C:\Users\user\AppData\Roaming\Setup_Cow.dll
                                                              Imagebase:0x7ff732dd0000
                                                              File size:25'088 bytes
                                                              MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:3.2%
                                                                Dynamic/Decrypted Code Coverage:25.4%
                                                                Signature Coverage:49.5%
                                                                Total number of Nodes:2000
                                                                Total number of Limit Nodes:65
                                                                execution_graph 96181 7ffe01416fd1 96184 7ffe0140adf0 96181->96184 96201 7ffe0140b160 96184->96201 96189 7ffe0140ae99 96190 7ffe0140b010 HeapFree 96189->96190 96191 7ffe0140ae5b 96189->96191 96190->96191 96192 7ffe0140af42 CreateFileW 96193 7ffe0140af83 96192->96193 96194 7ffe0140afe9 GetLastError 96192->96194 96195 7ffe0140afc6 96193->96195 96197 7ffe0140af94 GetLastError 96193->96197 96194->96189 96194->96191 96195->96191 96196 7ffe0140afce HeapFree 96195->96196 96196->96191 96197->96195 96198 7ffe0140afa3 SetFileInformationByHandle 96197->96198 96198->96195 96199 7ffe0140b02e GetLastError CloseHandle 96198->96199 96199->96191 96200 7ffe0140b04f 96199->96200 96200->96190 96202 7ffe0140b1b2 96201->96202 96203 7ffe0140b187 96201->96203 96265 7ffe0140ba50 96202->96265 96204 7ffe0140b194 96203->96204 96205 7ffe0140b2c8 96203->96205 96269 7ffe0141b7d0 96204->96269 96284 7ffe013d8da0 48 API calls 96205->96284 96209 7ffe0140b2cd 96285 7ffe013d8d80 48 API calls 96209->96285 96210 7ffe0140b1a9 96210->96202 96210->96209 96213 7ffe0140b28f 96219 7ffe0140ae21 96213->96219 96275 7ffe0140b9b0 96213->96275 96215 7ffe0140b260 96218 7ffe0140b27f HeapFree 96215->96218 96215->96219 96218->96219 96219->96191 96223 7ffe0140b300 96219->96223 96228 7ffe0140b329 96223->96228 96224 7ffe0140ae4e 96224->96189 96224->96191 96224->96192 96225 7ffe0140b4c3 SetLastError GetFullPathNameW 96227 7ffe0140b4ec GetLastError 96225->96227 96225->96228 96227->96228 96229 7ffe0140b592 GetLastError 96227->96229 96228->96224 96228->96225 96230 7ffe0140b505 GetLastError 96228->96230 96232 7ffe0140b53d 96228->96232 96295 7ffe013f2580 49 API calls 96228->96295 96233 7ffe0140b5c0 96229->96233 96234 7ffe0140b5ab HeapFree 96229->96234 96230->96228 96231 7ffe0140b90e 96230->96231 96297 7ffe013da6d0 48 API calls 96231->96297 96236 7ffe0140b546 96232->96236 96237 7ffe0140b928 96232->96237 96233->96224 96235 7ffe0140b5e9 HeapFree 96233->96235 96234->96233 96235->96224 96246 7ffe0140b6de 96236->96246 96256 7ffe0140b569 96236->96256 96298 7ffe013da360 48 API calls 96237->96298 96241 7ffe0140b6eb 96242 7ffe0140b6fd 96241->96242 96296 7ffe013f2580 49 API calls 96241->96296 96247 7ffe0140b7d2 memcpy 96242->96247 96246->96241 96251 7ffe013f24e0 2 API calls 96246->96251 96252 7ffe0140b804 96247->96252 96253 7ffe0140b7fc 96247->96253 96250 7ffe0140b692 memcpy 96250->96241 96250->96247 96257 7ffe0140b8c7 96251->96257 96252->96224 96260 7ffe0140b827 HeapFree 96252->96260 96258 7ffe0140b9b0 49 API calls 96253->96258 96256->96250 96262 7ffe013f24e0 2 API calls 96256->96262 96257->96241 96261 7ffe0140b93f 96257->96261 96258->96252 96260->96224 96299 7ffe013d8d80 48 API calls 96261->96299 96264 7ffe0140b77e 96262->96264 96264->96250 96264->96261 96268 7ffe0140ba79 96265->96268 96266 7ffe0140b1e0 96266->96213 96266->96215 96268->96266 96286 7ffe013f2580 49 API calls 96268->96286 96270 7ffe0141b7eb 96269->96270 96274 7ffe0141b7e5 HeapAlloc 96269->96274 96273 7ffe0141b836 96270->96273 96270->96274 96272 7ffe01477740 96273->96210 96274->96210 96274->96272 96276 7ffe0140b9c7 96275->96276 96277 7ffe0140ba39 96275->96277 96287 7ffe013f24e0 96276->96287 96293 7ffe013d8d80 48 API calls 96277->96293 96283 7ffe0140ba26 96283->96219 96286->96266 96288 7ffe013f24f5 96287->96288 96289 7ffe013f2522 96287->96289 96290 7ffe013f252e 96288->96290 96291 7ffe013f2509 HeapReAlloc 96288->96291 96289->96283 96294 7ffe013d8d80 48 API calls 96289->96294 96290->96289 96292 7ffe0141b7d0 HeapAlloc 96290->96292 96291->96289 96292->96289 96295->96228 96296->96242 96300 2e432e0 96301 2e432ef setsockopt CancelIo closesocket SetEvent 96300->96301 96302 2e4335a 96300->96302 96301->96302 96303 2e43660 96304 2e43690 ctype 96303->96304 96305 2e436e0 select 96304->96305 96307 2e43748 96304->96307 96309 2e43708 recv 96304->96309 96312 2e55614 42 API calls _errno 96304->96312 96305->96304 96305->96307 96313 2e54cd0 96307->96313 96308 2e43780 96309->96304 96310 2e43789 96309->96310 96324 2e43ba0 52 API calls ctype 96310->96324 96312->96304 96314 2e54cd9 96313->96314 96315 2e54ce4 96314->96315 96316 2e5b7ac RtlCaptureContext RtlLookupFunctionEntry 96314->96316 96315->96308 96317 2e5b831 96316->96317 96318 2e5b7f0 RtlVirtualUnwind 96316->96318 96319 2e5b853 IsDebuggerPresent 96317->96319 96318->96319 96325 2e66784 96319->96325 96321 2e5b8b2 SetUnhandledExceptionFilter UnhandledExceptionFilter 96322 2e5b8d0 _cftof_l 96321->96322 96323 2e5b8da GetCurrentProcess TerminateProcess 96321->96323 96322->96323 96323->96308 96324->96304 96325->96321 96326 2e43360 ResetEvent timeGetTime socket 96327 2e433ef lstrlenW WideCharToMultiByte 96326->96327 96328 2e433e8 96326->96328 96329 2e52694 96327->96329 96330 2e54cd0 _cftof_l 8 API calls 96328->96330 96331 2e4343a lstrlenW WideCharToMultiByte gethostbyname 96329->96331 96332 2e4364b 96330->96332 96333 2e43481 96331->96333 96333->96328 96334 2e4348e htons connect 96333->96334 96334->96328 96335 2e434d4 setsockopt setsockopt setsockopt setsockopt 96334->96335 96336 2e435d7 96335->96336 96337 2e43588 WSAIoctl 96335->96337 96341 2e5576c 96336->96341 96337->96336 96340 2e5576c 49 API calls 96340->96328 96342 2e55797 96341->96342 96343 2e557ac 96341->96343 96378 2e55614 42 API calls _getptd 96342->96378 96359 2e5a860 96343->96359 96345 2e5579c 96379 2e5c3b4 DecodePointer _invalid_parameter_noinfo 96345->96379 96348 2e43601 96348->96340 96350 2e55830 96380 2e55280 96350->96380 96354 2e55838 96354->96348 96386 2e55654 42 API calls 2 library calls 96354->96386 96360 2e5a885 96359->96360 96362 2e557c0 96360->96362 96363 2e5a8a3 Sleep 96360->96363 96387 2e640b8 96360->96387 96362->96350 96364 2e5df90 96362->96364 96363->96360 96363->96362 96397 2e5df0c GetLastError FlsGetValue 96364->96397 96366 2e5df9b 96367 2e557cd 96366->96367 96408 2e5be88 42 API calls 2 library calls 96366->96408 96369 2e5de54 96367->96369 96409 2e62cbc 96369->96409 96378->96345 96379->96348 96381 2e55285 HeapFree 96380->96381 96382 2e552b5 free 96380->96382 96381->96382 96383 2e552a0 96381->96383 96382->96354 96417 2e55614 42 API calls _getptd 96383->96417 96385 2e552a5 GetLastError 96385->96382 96386->96348 96388 2e640cd 96387->96388 96389 2e640ea 96387->96389 96388->96389 96390 2e640db 96388->96390 96392 2e64102 HeapAlloc 96389->96392 96393 2e640e0 96389->96393 96396 2e5c188 DecodePointer 96389->96396 96395 2e55614 42 API calls _getptd 96390->96395 96392->96389 96392->96393 96393->96360 96395->96393 96396->96389 96398 2e5df32 96397->96398 96399 2e5df7a SetLastError 96397->96399 96400 2e5a860 __onexitinit 38 API calls 96398->96400 96399->96366 96401 2e5df3f _getptd 96400->96401 96401->96399 96402 2e5df73 96401->96402 96403 2e5df5d 96401->96403 96405 2e55280 free 38 API calls 96402->96405 96404 2e5de54 _getptd 38 API calls 96403->96404 96406 2e5df64 GetCurrentThreadId 96404->96406 96407 2e5df78 96405->96407 96406->96399 96407->96399 96410 2e62cda 96409->96410 96411 2e62ceb 96409->96411 96415 2e62bd4 42 API calls 8 library calls 96410->96415 96413 2e62cdf 96413->96411 96416 2e5be88 42 API calls 2 library calls 96413->96416 96415->96413 96417->96385 96430 2e4d920 96431 2e4d95f RegOpenKeyExW 96430->96431 96433 2e4d9b9 96430->96433 96432 2e4d993 RegQueryValueExW 96431->96432 96431->96433 96432->96433 96434 2876682 96436 28766a8 _cftof_l 96434->96436 96435 28766cb RegOpenKeyExW RegDeleteValueW RegSetValueExW RegCloseKey 96437 287673d 96435->96437 96436->96435 96438 2e571e0 96440 2e57206 96438->96440 96439 2e57243 96447 2e5720e 96439->96447 96493 2e51b50 96439->96493 96440->96439 96440->96447 96450 2e5708c 96440->96450 96444 2e57288 96445 2e5708c 82 API calls 96444->96445 96444->96447 96445->96447 96446 2e51b50 270 API calls 96448 2e5727b 96446->96448 96449 2e5708c 82 API calls 96448->96449 96449->96444 96451 2e5709e 96450->96451 96452 2e5711b 96450->96452 96497 2e5ba94 HeapCreate 96451->96497 96454 2e5716c 96452->96454 96460 2e5711f 96452->96460 96456 2e571c7 96454->96456 96457 2e57171 96454->96457 96470 2e570a7 96456->96470 96515 2e5e0e8 43 API calls 2 library calls 96456->96515 96463 2e5a860 __onexitinit 42 API calls 96457->96463 96461 2e57156 96460->96461 96460->96470 96511 2e61f44 43 API calls free 96460->96511 96461->96470 96514 2e5de2c 45 API calls free 96461->96514 96462 2e570b3 _RTC_Initialize 96465 2e570b7 96462->96465 96472 2e570c3 GetCommandLineA 96462->96472 96473 2e57185 _getptd 96463->96473 96503 2e5baec HeapDestroy 96465->96503 96466 2e5714c 96512 2e5de2c 45 API calls free 96466->96512 96470->96439 96471 2e57151 96513 2e5baec HeapDestroy 96471->96513 96504 2e623b0 47 API calls 2 library calls 96472->96504 96473->96470 96476 2e571a7 96473->96476 96477 2e571bd 96473->96477 96481 2e5de54 _getptd 42 API calls 96476->96481 96480 2e55280 free 42 API calls 96477->96480 96478 2e570d5 96505 2e61c70 47 API calls 2 library calls 96478->96505 96480->96470 96483 2e571ae GetCurrentThreadId 96481->96483 96482 2e570e1 96484 2e570e5 96482->96484 96507 2e622b8 53 API calls 3 library calls 96482->96507 96483->96470 96506 2e5de2c 45 API calls free 96484->96506 96487 2e570f1 96488 2e57105 96487->96488 96508 2e61fb8 53 API calls 5 library calls 96487->96508 96488->96470 96510 2e61f44 43 API calls free 96488->96510 96491 2e570fa 96491->96488 96509 2e5bc2c 48 API calls 2 library calls 96491->96509 96494 2e51b94 96493->96494 96495 2e51b58 96493->96495 96494->96444 96494->96446 96495->96494 96496 2e51b62 CreateThread WaitForSingleObject 96495->96496 96496->96494 96516 2e515c0 96496->96516 96498 2e570a3 96497->96498 96499 2e5babc GetVersion 96497->96499 96498->96470 96502 2e5e128 47 API calls 2 library calls 96498->96502 96500 2e5bac6 HeapSetInformation 96499->96500 96501 2e5bae0 96499->96501 96500->96501 96501->96498 96502->96462 96503->96470 96504->96478 96505->96482 96506->96465 96507->96487 96508->96491 96509->96488 96510->96484 96511->96466 96512->96471 96513->96461 96514->96470 96515->96470 96559 2e56498 96516->96559 96560 2e56ec0 96559->96560 96561 7ffe013d1e80 96569 7ffe013d1ec8 96561->96569 96562 7ffe013d2376 97196 7ffe0140d100 96562->97196 96565 7ffe013d23e4 97219 7ffe013fdcd0 49 API calls 96565->97219 96566 7ffe013d1f73 96572 7ffe013f0dd0 51 API calls 96566->96572 96569->96562 96569->96566 96571 7ffe0140b9b0 49 API calls 96569->96571 96570 7ffe013d242c 96938 7ffe0140d3d0 96570->96938 96571->96569 96573 7ffe013d1fcd 96572->96573 97194 7ffe013fdcd0 49 API calls 96573->97194 96577 7ffe013d25a6 96581 7ffe013d276e 96577->96581 96585 7ffe013d2605 HeapFree 96577->96585 96578 7ffe013d2618 96580 7ffe013d7681 96578->96580 96582 7ffe0141b7d0 HeapAlloc 96578->96582 96579 7ffe013d2468 96583 7ffe013d2483 96579->96583 96587 7ffe013f0dd0 51 API calls 96579->96587 97240 7ffe013d8d80 48 API calls 96580->97240 96584 7ffe013d277d HeapFree 96581->96584 96611 7ffe013d2805 96581->96611 96588 7ffe013d267d 96582->96588 96589 7ffe013d24a6 96583->96589 96590 7ffe013d2522 HeapFree 96583->96590 96584->96611 96585->96577 96591 7ffe013d24c3 96587->96591 96588->96580 96615 7ffe013d2686 96588->96615 96589->96570 96592 7ffe013d2540 HeapFree 96589->96592 96590->96589 96591->96583 97220 7ffe013fdcd0 49 API calls 96591->97220 96592->96570 96593 7ffe013d7e29 HeapFree 96598 7ffe013d7edc 96593->96598 96594 7ffe0140d3d0 49 API calls 96594->96615 96595 7ffe013d2364 96595->96562 96603 7ffe0140b9b0 49 API calls 96595->96603 96597 7ffe013f0dd0 51 API calls 96605 7ffe013d1fda 96597->96605 96599 7ffe013d1770 63 API calls 96598->96599 96606 7ffe013d7ee9 96599->96606 96600 7ffe013d29e3 96601 7ffe013d2a14 96600->96601 96607 7ffe013d2a01 HeapFree 96600->96607 96608 7ffe013d6faa 96601->96608 96609 7ffe013d2a23 HeapFree 96601->96609 96602 7ffe013d2798 96613 7ffe013d27e4 96602->96613 96616 7ffe013d27d1 HeapFree 96602->96616 96603->96562 96605->96579 96605->96595 96605->96597 96610 7ffe013f2580 49 API calls 96605->96610 96619 7ffe0140b9b0 49 API calls 96605->96619 97195 7ffe013fdcd0 49 API calls 96605->97195 97267 7ffe013d1660 HeapFree 96606->97267 96607->96600 96609->96608 96610->96605 96611->96600 96947 7ffe013d8f90 96611->96947 96613->96611 96617 7ffe013d27ef HeapFree 96613->96617 96615->96594 96615->96602 97221 7ffe013e9e10 49 API calls 96615->97221 96616->96602 96617->96611 96618 7ffe013d7f20 96622 7ffe013d7ffa HeapFree 96618->96622 96623 7ffe013d814a 96618->96623 96619->96605 96622->96623 97268 7ffe013d1660 HeapFree 96623->97268 96624 7ffe013d2977 CreateMutexA GetLastError 96628 7ffe013d29ab 96624->96628 96629 7ffe013d2a3e 96624->96629 96625 7ffe013d7704 97243 7ffe013db610 48 API calls 96625->97243 96628->96600 96630 7ffe013d29c0 HeapFree 96628->96630 96963 7ffe013d8830 96629->96963 96630->96600 96631 7ffe013d8157 96633 7ffe013d8204 96631->96633 96635 7ffe013d81ff HeapFree 96631->96635 96636 7ffe013d8225 96633->96636 96637 7ffe013d820f HeapFree 96633->96637 96634 7ffe013d2d91 96638 7ffe013d8830 53 API calls 96634->96638 96635->96633 96639 7ffe013d8246 96636->96639 96640 7ffe013d8230 HeapFree 96636->96640 96637->96636 96641 7ffe013d2d9e 96638->96641 96642 7ffe013d824f 96639->96642 96647 7ffe013d845b HeapFree 96639->96647 96640->96639 96644 7ffe013d7796 96641->96644 96645 7ffe013d2db9 96641->96645 96652 7ffe013d8583 96642->96652 96654 7ffe013d859b HeapFree 96642->96654 96643 7ffe0141b7d0 HeapAlloc 96650 7ffe013d2bac 96643->96650 97245 7ffe013db730 48 API calls 96644->97245 96649 7ffe013d8830 53 API calls 96645->96649 96647->96642 96653 7ffe013d2ddb 96649->96653 96651 7ffe013d7afb 96650->96651 96666 7ffe013d2bb5 96650->96666 97264 7ffe013d8d80 48 API calls 96651->97264 96660 7ffe013d87ff 96652->96660 96661 7ffe013d87ee HeapFree 96652->96661 96655 7ffe013d77ae 96653->96655 96656 7ffe013d2dfe 96653->96656 96654->96652 97246 7ffe013da6d0 48 API calls 96655->97246 96977 7ffe013e0170 96656->96977 97269 7ffe013d19f0 HeapFree 96660->97269 96661->96660 96662 7ffe013d2e23 96667 7ffe013d77cb 96662->96667 96675 7ffe013d2e2c 96662->96675 96664 7ffe013d2d4e 96668 7ffe013d2d56 HeapFree 96664->96668 96669 7ffe013d2d69 SetFileAttributesW 96664->96669 96665 7ffe013d880c 97270 7ffe01424130 6 API calls 96665->97270 96666->96664 97222 7ffe013e9f80 49 API calls 96666->97222 97247 7ffe013db610 48 API calls 96667->97247 96668->96669 96669->96634 96673 7ffe013d2d80 HeapFree 96669->96673 96673->96634 96674 7ffe013d8814 96690 7ffe013d6e59 96675->96690 97026 7ffe013ec920 96675->97026 96677 7ffe013d2ebb 96678 7ffe013ec920 56 API calls 96677->96678 96679 7ffe013d2f74 96678->96679 96680 7ffe013d31b2 96679->96680 96688 7ffe013d3027 96679->96688 96691 7ffe013d3054 96679->96691 96693 7ffe013d3186 memcpy 96679->96693 96681 7ffe013d31bd HeapFree 96680->96681 96682 7ffe013d31ce 96680->96682 96681->96682 96683 7ffe013d3216 96682->96683 96684 7ffe013d3200 HeapFree 96682->96684 96685 7ffe013d3232 96683->96685 96686 7ffe013d3221 HeapFree 96683->96686 96684->96683 97045 7ffe013d9320 96685->97045 96686->96685 97238 7ffe013d99c0 48 API calls 96688->97238 96690->96593 96690->96608 97237 7ffe013d9a70 48 API calls 96691->97237 96693->96679 96693->96680 96694 7ffe013d32a3 97060 7ffe013f11e0 96694->97060 96697 7ffe013d77fc 97248 7ffe013db610 48 API calls 96697->97248 96699 7ffe013d3524 96700 7ffe013d7752 96699->96700 96701 7ffe013d35d2 96699->96701 97244 7ffe013db730 48 API calls 96700->97244 96703 7ffe013d7a56 96701->96703 96704 7ffe0141b7d0 HeapAlloc 96701->96704 96706 7ffe013d3604 96701->96706 97256 7ffe013d8d80 48 API calls 96703->97256 96705 7ffe013d35fb 96704->96705 96705->96703 96705->96706 96708 7ffe013d7634 96706->96708 96710 7ffe013d3768 memcpy 96706->96710 97239 7ffe013d99c0 48 API calls 96708->97239 96710->96708 96711 7ffe013d3786 96710->96711 96712 7ffe013d37ec 96711->96712 96713 7ffe013d37d9 HeapFree 96711->96713 96714 7ffe0141b7d0 HeapAlloc 96712->96714 96713->96712 96715 7ffe013d383c 96714->96715 96716 7ffe013d782d 96715->96716 96717 7ffe013d3845 96715->96717 97249 7ffe013d8d80 48 API calls 96716->97249 96719 7ffe0141b7d0 HeapAlloc 96717->96719 96720 7ffe013d3982 96719->96720 96721 7ffe013d398b 96720->96721 96722 7ffe013d7841 96720->96722 97070 7ffe01420320 96721->97070 97250 7ffe013d8d80 48 API calls 96722->97250 96730 7ffe013d7855 97251 7ffe013db610 48 API calls 96730->97251 96731 7ffe013d3a35 97117 7ffe013d1770 96731->97117 96735 7ffe013d3a92 GetCurrentProcess OpenProcessToken 96737 7ffe013d3bc7 96735->96737 96738 7ffe013d3ad3 GetTokenInformation CloseHandle 96735->96738 96736 7ffe013d42c1 96740 7ffe013d42e5 96736->96740 96741 7ffe013d42cf HeapFree 96736->96741 96742 7ffe013d9320 49 API calls 96737->96742 96738->96737 96739 7ffe013d3b0c 96738->96739 96739->96737 96743 7ffe013d3b17 96739->96743 96744 7ffe013d4306 96740->96744 96745 7ffe013d42f0 HeapFree 96740->96745 96741->96740 96746 7ffe013d3bc2 96742->96746 96747 7ffe013d9320 49 API calls 96743->96747 96748 7ffe013d430b HeapFree 96744->96748 96749 7ffe013d431e 96744->96749 96745->96744 96753 7ffe0141b7d0 HeapAlloc 96746->96753 96747->96746 96748->96749 96750 7ffe013d4347 96749->96750 96751 7ffe013d4331 HeapFree 96749->96751 96752 7ffe013d4352 HeapFree 96750->96752 96852 7ffe013d4368 96750->96852 96751->96750 96752->96852 96754 7ffe013d3cd1 96753->96754 96755 7ffe013d3cda 96754->96755 96756 7ffe013d7a6c 96754->96756 96758 7ffe01420250 51 API calls 96755->96758 97257 7ffe013d8d80 48 API calls 96756->97257 96757 7ffe013d4393 HeapFree 96757->96852 96761 7ffe013d3dde 96758->96761 96759 7ffe013d4389 HeapFree 96759->96852 96762 7ffe013d4466 SetLastError 96762->96852 96766 7ffe013d4482 GetLastError 96769 7ffe013d71b5 GetLastError 96766->96769 96766->96852 96774 7ffe013d71db 96769->96774 96775 7ffe013d71c8 HeapFree 96769->96775 96770 7ffe013d449b GetLastError 96773 7ffe013d7198 96770->96773 96770->96852 97230 7ffe013da6d0 48 API calls 96773->97230 97231 7ffe013db610 48 API calls 96774->97231 96775->96774 96777 7ffe013d788b 97252 7ffe013da360 48 API calls 96777->97252 96788 7ffe013d4510 HeapFree 96788->96852 96795 7ffe013d7ab9 97259 7ffe013d8da0 48 API calls 96795->97259 96796 7ffe013d45d8 memcpy 97154 7ffe0140e3a0 96796->97154 96803 7ffe013d7ac3 97260 7ffe013d8d80 48 API calls 96803->97260 96804 7ffe013d464e HeapFree 96804->96852 96807 7ffe013d79fd 96807->96690 97263 7ffe013db610 48 API calls 96807->97263 96809 7ffe013d7576 97235 7ffe013db610 48 API calls 96809->97235 96818 7ffe013d7568 CloseHandle 96818->96809 96820 7ffe013d75aa 97236 7ffe013d9a00 48 API calls 96820->97236 96824 7ffe013d47a0 CloseHandle 96827 7ffe013d47b0 96824->96827 96824->96852 96825 7ffe013d4780 96829 7ffe013d47b5 CloseHandle 96825->96829 96827->96809 96829->96852 96831 7ffe0140adf0 71 API calls 96831->96852 96836 7ffe013d4822 SetFilePointerEx 96840 7ffe013d78d9 GetLastError 96836->96840 96836->96852 96837 7ffe013d78a5 97253 7ffe013db610 48 API calls 96837->97253 96862 7ffe013d713b 96840->96862 96841 7ffe013d7432 CloseHandle 96846 7ffe013d743c 96841->96846 96844 7ffe013d6b90 HeapFree 96844->96852 96845 7ffe013d48c3 SetFilePointerEx 96847 7ffe013d712e GetLastError 96845->96847 96845->96852 97232 7ffe013db610 48 API calls 96846->97232 96847->96862 96849 7ffe013d6bab HeapFree 96849->96852 96851 7ffe013d6bcc HeapFree 96851->96852 96852->96757 96852->96759 96852->96762 96852->96766 96852->96770 96852->96774 96852->96777 96852->96788 96852->96795 96852->96796 96852->96803 96852->96804 96852->96807 96852->96809 96852->96818 96852->96820 96852->96824 96852->96825 96852->96829 96852->96831 96852->96836 96852->96837 96852->96844 96852->96845 96852->96846 96852->96849 96852->96851 96853 7ffe013d6bed HeapFree 96852->96853 96854 7ffe013d6c08 HeapFree 96852->96854 96855 7ffe013d6c24 HeapFree 96852->96855 96856 7ffe013d491a SetFilePointerEx 96852->96856 96857 7ffe013d6c45 HeapFree 96852->96857 96858 7ffe013ebbb0 50 API calls 96852->96858 96859 7ffe013d6c60 HeapFree 96852->96859 96860 7ffe013d6c86 HeapFree 96852->96860 96852->96862 96863 7ffe013d7925 96852->96863 96866 7ffe013d7ad5 96852->96866 96868 7ffe013d4bd9 SetFilePointerEx 96852->96868 96869 7ffe013d7955 96852->96869 96872 7ffe013d5c10 HeapFree 96852->96872 96873 7ffe013d79ae 96852->96873 96875 7ffe013d5cd7 SetFilePointerEx 96852->96875 96884 7ffe013d70d1 96852->96884 96887 7ffe013ebad0 51 API calls 96852->96887 96888 7ffe013d724a 96852->96888 96890 7ffe013d7260 96852->96890 96891 7ffe013d90e0 52 API calls 96852->96891 96892 7ffe014228a0 51 API calls 96852->96892 96894 7ffe013d7697 96852->96894 96895 7ffe013d522b memcpy 96852->96895 96896 7ffe013d5344 SetFilePointerEx 96852->96896 96906 7ffe013d76c6 96852->96906 96907 7ffe013d5305 memcpy 96852->96907 96909 7ffe0141b7d0 HeapAlloc 96852->96909 96915 7ffe013d5780 SetFilePointerEx 96852->96915 96917 7ffe013d6e36 96852->96917 96918 7ffe013d5841 HeapFree 96852->96918 96919 7ffe013d5862 HeapFree 96852->96919 96921 7ffe013d701e 96852->96921 96922 7ffe013d5888 HeapFree 96852->96922 96924 7ffe013d755e 96852->96924 96925 7ffe013d5752 memcpy 96852->96925 96926 7ffe013d5966 memcpy 96852->96926 96929 7ffe013d7041 96852->96929 96932 7ffe013d754c 96852->96932 96935 7ffe013d5a5c memcmp 96852->96935 96936 7ffe013d5ae7 HeapFree 96852->96936 96937 7ffe013d4c90 memcpy 96852->96937 97136 7ffe013f0dd0 96852->97136 97162 7ffe013ed4a0 96852->97162 97173 7ffe0140e340 SetFilePointerEx 96852->97173 97176 7ffe013ec410 96852->97176 97223 7ffe013f2580 49 API calls 96852->97223 97224 7ffe013ece50 HeapFree 96852->97224 97225 7ffe013eb050 51 API calls 96852->97225 96853->96852 96854->96852 96855->96852 96856->96847 96856->96852 96857->96852 96858->96852 96859->96852 96860->96852 96862->96841 96863->96862 96864 7ffe013d741c HeapFree 96863->96864 96864->96841 97261 7ffe013d8d80 48 API calls 96866->97261 96868->96852 96871 7ffe013d7986 GetLastError 96868->96871 97254 7ffe013db610 48 API calls 96869->97254 96871->96846 96872->96852 97255 7ffe013d99c0 48 API calls 96873->97255 96875->96852 96876 7ffe013d7a0e GetLastError 96875->96876 96876->96807 96877 7ffe013d7368 96878 7ffe013d7378 HeapFree 96877->96878 96879 7ffe013d70f0 96877->96879 96878->96879 96880 7ffe013d73f0 96879->96880 96881 7ffe013d73c4 HeapFree 96879->96881 96886 7ffe013d73dd HeapFree 96879->96886 96881->96879 96884->96877 96884->96879 96884->96884 96885 7ffe013d7506 HeapFree 96884->96885 96885->96884 96886->96879 96887->96852 96888->96884 96889 7ffe013d7330 HeapFree 96888->96889 96889->96884 96890->96888 96893 7ffe013d7305 HeapFree 96890->96893 96891->96852 96892->96852 96893->96888 97241 7ffe013d8d80 48 API calls 96894->97241 96895->96852 96897 7ffe013d715d GetLastError 96896->96897 96898 7ffe013d5370 SetFilePointerEx 96896->96898 96900 7ffe013d7189 96897->96900 96898->96897 96912 7ffe013d53a5 96898->96912 96904 7ffe013d7076 96904->96890 97242 7ffe013d8d80 48 API calls 96906->97242 96907->96896 96909->96852 96912->96900 96915->96852 96916 7ffe013d751a GetLastError 96915->96916 96916->96884 97226 7ffe013d9a00 48 API calls 96917->97226 96918->96852 96919->96852 97227 7ffe014231e0 49 API calls 96921->97227 96922->96852 97234 7ffe013d8da0 48 API calls 96924->97234 96925->96852 96928 7ffe013d7043 96925->96928 96926->96852 97228 7ffe014231e0 49 API calls 96928->97228 97229 7ffe013ec530 HeapFree 96929->97229 97233 7ffe013d8d80 48 API calls 96932->97233 96935->96852 96936->96852 96937->96852 96939 7ffe013d258f 96938->96939 96940 7ffe0140d3f0 96938->96940 96939->96577 96939->96578 96940->96939 97271 7ffe013db610 48 API calls 96940->97271 96948 7ffe0141b7d0 HeapAlloc 96947->96948 96949 7ffe013d8fbf 96948->96949 96950 7ffe013d9027 96949->96950 96951 7ffe013d8fc4 memcpy 96949->96951 97272 7ffe013d8d80 48 API calls 96950->97272 96952 7ffe013d295f 96951->96952 96952->96624 96952->96625 96964 7ffe013d885c 96963->96964 96965 7ffe013d8860 96964->96965 96966 7ffe013d2a4b 96964->96966 96967 7ffe013d8875 GetModuleFileNameW 96965->96967 96966->96634 96966->96643 96966->96651 96967->96966 96968 7ffe013d888c 96967->96968 96969 7ffe013d889a 96968->96969 96970 7ffe013d89d7 96968->96970 96971 7ffe013f0dd0 51 API calls 96969->96971 97273 7ffe013da360 48 API calls 96970->97273 96975 7ffe013d88a9 96971->96975 96974 7ffe013d88bf 96974->96966 96975->96966 96975->96974 96976 7ffe013d89c4 HeapFree 96975->96976 96976->96966 96978 7ffe013e024c 96977->96978 96979 7ffe013e0188 TlsGetValue 96977->96979 97274 7ffe013ecbc0 48 API calls 96978->97274 96980 7ffe013e0199 96979->96980 97012 7ffe013e0245 96979->97012 96982 7ffe013e019f BCryptGenRandom 96980->96982 96980->97012 96984 7ffe013e01cb SystemFunction036 96982->96984 96987 7ffe013e01ef 96982->96987 96983 7ffe013e0258 TlsGetValue 96983->96980 96983->97012 96985 7ffe013e01e3 96984->96985 96984->96987 96986 7ffe013e0492 96985->96986 96985->96987 96988 7ffe0141b7d0 HeapAlloc 96986->96988 96990 7ffe0141b7d0 HeapAlloc 96987->96990 96989 7ffe013e04a5 96988->96989 97277 7ffe013d99c0 48 API calls 96989->97277 96991 7ffe013e02cc 96990->96991 96993 7ffe0141b7d0 HeapAlloc 96991->96993 96999 7ffe013e046f 96991->96999 96994 7ffe013e03c0 96993->96994 96995 7ffe013e03c9 96994->96995 96994->96999 96997 7ffe013e03e4 TlsGetValue 96995->96997 97275 7ffe013ecbc0 48 API calls 96995->97275 96996 7ffe013e057a 97278 7ffe01424130 6 API calls 96996->97278 97004 7ffe013e03f8 TlsSetValue 96997->97004 97005 7ffe013e0452 96997->97005 96998 7ffe013e0569 HeapFree 96998->96996 96999->96996 96999->96998 97003 7ffe013e0582 97006 7ffe013e0594 HeapFree 97003->97006 97011 7ffe013e05a5 97003->97011 97008 7ffe013e0407 97004->97008 97004->97012 97276 7ffe013ecbc0 48 API calls 97005->97276 97006->97011 97010 7ffe013e0423 HeapFree 97008->97010 97013 7ffe013e0415 HeapFree 97008->97013 97009 7ffe013e045e TlsSetValue 97009->97008 97009->97012 97010->97012 97279 7ffe01424130 6 API calls 97011->97279 97012->96662 97013->97010 97015 7ffe013e05bd 97016 7ffe013e05d4 TlsSetValue 97015->97016 97280 7ffe013ecbc0 48 API calls 97015->97280 97019 7ffe013e0608 HeapFree 97016->97019 97020 7ffe013e05f4 97016->97020 97021 7ffe013e0624 97019->97021 97022 7ffe013e0620 TlsSetValue 97019->97022 97020->97019 97023 7ffe013e05fa HeapFree 97020->97023 97281 7ffe013ecbc0 48 API calls 97021->97281 97022->96662 97023->97019 97027 7ffe013ec989 97026->97027 97028 7ffe013ec936 97026->97028 97027->96677 97028->97027 97029 7ffe013ec9fd 97028->97029 97030 7ffe013ecb4b 97028->97030 97031 7ffe0141b7d0 HeapAlloc 97029->97031 97283 7ffe013d8d80 48 API calls 97030->97283 97033 7ffe013eca0e 97031->97033 97034 7ffe013ecb55 97033->97034 97041 7ffe013eca17 97033->97041 97284 7ffe013d8d80 48 API calls 97034->97284 97041->97027 97282 7ffe013e9ed0 49 API calls 97041->97282 97046 7ffe013d940d 97045->97046 97050 7ffe013d9340 97045->97050 97047 7ffe013d943b 97046->97047 97286 7ffe013db610 48 API calls 97046->97286 97047->96694 97049 7ffe013d947b 97287 7ffe013d8da0 48 API calls 97049->97287 97050->97046 97050->97049 97052 7ffe0141b7d0 HeapAlloc 97050->97052 97054 7ffe013d93fb 97052->97054 97054->97046 97285 7ffe013d8d80 48 API calls 97054->97285 97067 7ffe013f1209 97060->97067 97061 7ffe013d34f7 97061->96697 97061->96699 97062 7ffe013f13a4 97290 7ffe013db6a0 48 API calls 97062->97290 97063 7ffe013f1392 97289 7ffe013da360 48 API calls 97063->97289 97067->97061 97067->97062 97067->97063 97068 7ffe013f1323 97067->97068 97288 7ffe013d9a00 48 API calls 97068->97288 97071 7ffe0142033e 97070->97071 97072 7ffe014203c4 97070->97072 97076 7ffe013f24e0 2 API calls 97071->97076 97291 7ffe013d8d80 48 API calls 97072->97291 97074 7ffe014203aa 97078 7ffe013d39ab 97074->97078 97292 7ffe013d8d80 48 API calls 97074->97292 97076->97074 97079 7ffe01420250 97078->97079 97080 7ffe0142026a 97079->97080 97092 7ffe01420285 memcpy 97079->97092 97081 7ffe014202e6 97080->97081 97082 7ffe0142026c 97080->97082 97293 7ffe013d8da0 48 API calls 97081->97293 97084 7ffe0141b7d0 HeapAlloc 97082->97084 97088 7ffe01420280 97084->97088 97085 7ffe013d39fa 97098 7ffe0141aa10 97085->97098 97086 7ffe014202a7 97089 7ffe01420320 49 API calls 97086->97089 97090 7ffe014202eb 97088->97090 97088->97092 97089->97085 97294 7ffe013d8d80 48 API calls 97090->97294 97092->97085 97092->97086 97295 7ffe01410610 97098->97295 97100 7ffe0141aa52 97101 7ffe0141aa6a 97100->97101 97103 7ffe013d3a1d 97100->97103 97102 7ffe0141aaa7 CloseHandle 97101->97102 97104 7ffe0141aaac 97101->97104 97102->97104 97103->96730 97103->96731 97573 7ffe0141b200 11 API calls 97104->97573 97106 7ffe0141ab2c CloseHandle 97108 7ffe0141aefd WaitForSingleObject 97106->97108 97110 7ffe0141af17 GetLastError 97108->97110 97111 7ffe0141af3e 97110->97111 97112 7ffe0141af29 HeapFree 97110->97112 97113 7ffe0141af61 CloseHandle CloseHandle 97111->97113 97114 7ffe0141af4c HeapFree 97111->97114 97112->97111 97116 7ffe0141afcf 97113->97116 97114->97113 97116->97103 97118 7ffe013d1792 97117->97118 97119 7ffe013d1780 HeapFree 97117->97119 97120 7ffe013d17c4 97118->97120 97121 7ffe013d17b1 HeapFree 97118->97121 97119->97118 97122 7ffe013d17cb HeapFree 97120->97122 97123 7ffe013d17dd 97120->97123 97121->97118 97122->97123 97795 7ffe013ea550 97123->97795 97126 7ffe013d1813 97128 7ffe013d1829 97126->97128 97129 7ffe013d1820 CloseHandle 97126->97129 97127 7ffe013d1801 HeapFree 97127->97126 97130 7ffe013d183f 97128->97130 97131 7ffe013d1836 CloseHandle 97128->97131 97129->97128 97132 7ffe013d184c CloseHandle 97130->97132 97134 7ffe013d1858 97130->97134 97131->97130 97132->97134 97133 7ffe013d3a84 97133->96735 97133->96736 97134->97133 97135 7ffe013eaa70 HeapFree 97134->97135 97135->97134 97137 7ffe013f0df7 97136->97137 97150 7ffe013f0e17 97136->97150 97138 7ffe013f0dfd 97137->97138 97139 7ffe013f1063 97137->97139 97145 7ffe013f103f 97145->96852 97150->97145 97152 7ffe013f0e50 memcpy 97150->97152 97818 7ffe013f2440 49 API calls 97150->97818 97152->97150 97155 7ffe0140e404 97154->97155 97156 7ffe0140e3d8 97154->97156 97163 7ffe013ed4f1 97162->97163 97164 7ffe013ed4f8 WaitForSingleObject 97163->97164 97165 7ffe013ed50f 97163->97165 97164->97165 97174 7ffe0140e370 97173->97174 97175 7ffe0140e37c GetLastError 97173->97175 97174->96852 97175->96852 97177 7ffe013ec43c 97176->97177 97178 7ffe013ec426 TlsGetValue 97176->97178 97825 7ffe013ecbc0 48 API calls 97177->97825 97181 7ffe013ec455 97178->97181 97193 7ffe013ec433 97178->97193 97181->97193 97193->96852 97194->96605 97195->96605 97199 7ffe0140d164 97196->97199 97197 7ffe0140d1e7 SetLastError GetModuleFileNameW 97197->97199 97200 7ffe0140d202 GetLastError 97197->97200 97199->97197 97202 7ffe0140d21b GetLastError 97199->97202 97204 7ffe0140d24d 97199->97204 97828 7ffe013f2580 49 API calls 97199->97828 97200->97199 97201 7ffe0140d2b5 GetLastError 97200->97201 97205 7ffe013d23b0 97201->97205 97206 7ffe0140d28b HeapFree 97201->97206 97202->97199 97203 7ffe0140d2e6 97202->97203 97829 7ffe013da6d0 48 API calls 97203->97829 97208 7ffe0140d300 97204->97208 97209 7ffe0140d256 97204->97209 97205->96565 97218 7ffe013ece50 HeapFree 97205->97218 97206->97205 97830 7ffe013da360 48 API calls 97208->97830 97212 7ffe013f0dd0 51 API calls 97209->97212 97213 7ffe0140d265 97212->97213 97213->97205 97213->97206 97218->96565 97219->96570 97220->96583 97221->96615 97222->96666 97223->96852 97224->96852 97225->96852 97226->96690 97227->96929 97228->96929 97229->96904 97236->96690 97237->96690 97244->96690 97245->96690 97267->96618 97268->96631 97269->96665 97270->96674 97274->96983 97275->96997 97276->97009 97278->97003 97279->97015 97280->97016 97281->97022 97282->97041 97288->97061 97296 7ffe01410656 97295->97296 97297 7ffe01410693 GetEnvironmentStringsW 97296->97297 97327 7ffe0141065b 97296->97327 97371 7ffe01410875 97296->97371 97298 7ffe014133e8 GetLastError 97297->97298 97364 7ffe014106a1 97297->97364 97660 7ffe013d99c0 48 API calls 97298->97660 97300 7ffe014110ec 97303 7ffe0141b7d0 HeapAlloc 97300->97303 97301 7ffe01412ed6 CloseHandle 97311 7ffe014134f0 CloseHandle 97301->97311 97302 7ffe01413243 97649 7ffe013db710 48 API calls 97302->97649 97307 7ffe01411126 97303->97307 97305 7ffe014117aa 97308 7ffe014117b0 CloseHandle 97305->97308 97309 7ffe014117b9 97305->97309 97336 7ffe014133a4 97307->97336 97621 7ffe01413a20 50 API calls 97307->97621 97308->97309 97309->97100 97310 7ffe01411734 97310->97305 97624 7ffe01416e50 280 API calls 97310->97624 97312 7ffe0141353d CloseHandle 97311->97312 97316 7ffe014135be 97312->97316 97317 7ffe0141354e CloseHandle 97312->97317 97313 7ffe01412eca 97648 7ffe013db710 48 API calls 97313->97648 97664 7ffe01417bd0 CloseHandle CloseHandle 97316->97664 97317->97316 97318 7ffe0141333e 97654 7ffe013d9a00 48 API calls 97318->97654 97321 7ffe01411247 HeapFree 97325 7ffe0141128e HeapFree 97321->97325 97321->97327 97325->97327 97326 7ffe01413356 97655 7ffe013da360 48 API calls 97326->97655 97327->97310 97333 7ffe0141131f 97327->97333 97335 7ffe0141139b 97327->97335 97357 7ffe014114d6 97327->97357 97329 7ffe013f0dd0 51 API calls 97329->97364 97331 7ffe014111e5 CompareStringOrdinal 97348 7ffe01411166 97331->97348 97332 7ffe014132d9 97651 7ffe013d8d80 48 API calls 97332->97651 97333->97100 97334 7ffe01410b7a memcpy 97334->97371 97335->97336 97341 7ffe0141b7d0 HeapAlloc 97335->97341 97661 7ffe013d8d80 48 API calls 97336->97661 97337 7ffe014135ca 97338 7ffe014135f5 97337->97338 97343 7ffe014135f0 HeapFree 97337->97343 97344 7ffe01413603 HeapFree 97338->97344 97345 7ffe014136c4 97338->97345 97339 7ffe014132fe 97652 7ffe013d8d80 48 API calls 97339->97652 97340 7ffe01413370 97656 7ffe013d9a00 48 API calls 97340->97656 97352 7ffe01411426 97341->97352 97342 7ffe01410bef memcpy 97342->97371 97343->97338 97344->97345 97358 7ffe014136d0 97345->97358 97359 7ffe014136ec HeapFree 97345->97359 97347 7ffe0141123e 97347->97321 97354 7ffe01413254 GetLastError 97347->97354 97348->97321 97348->97331 97348->97347 97349 7ffe01411668 97348->97349 97349->97354 97350 7ffe0141b7d0 HeapAlloc 97350->97371 97352->97336 97355 7ffe0141142f memcpy 97352->97355 97650 7ffe013d99c0 48 API calls 97354->97650 97622 7ffe0140d530 50 API calls 97355->97622 97356 7ffe0141331e 97653 7ffe013d8d80 48 API calls 97356->97653 97357->97310 97372 7ffe01411af8 97357->97372 97626 7ffe0140ce20 97357->97626 97362 7ffe014136da 97358->97362 97363 7ffe0141370b HeapFree 97358->97363 97359->97362 97359->97363 97360 7ffe01410c5f memcpy 97620 7ffe01413c30 78 API calls 97360->97620 97373 7ffe014136e7 97362->97373 97378 7ffe014138e2 HeapFree 97362->97378 97363->97362 97363->97373 97364->97318 97364->97326 97364->97329 97364->97340 97364->97371 97392 7ffe0141085b HeapFree 97364->97392 97617 7ffe01413a20 50 API calls 97364->97617 97618 7ffe01413c30 78 API calls 97364->97618 97367 7ffe01414e90 75 API calls 97367->97371 97370 7ffe0141146a 97374 7ffe014159e0 97 API calls 97370->97374 97371->97300 97371->97302 97371->97313 97371->97332 97371->97334 97371->97339 97371->97342 97371->97350 97371->97356 97371->97360 97371->97367 97377 7ffe01410cc6 HeapFree 97371->97377 97379 7ffe01411024 HeapFree 97371->97379 97380 7ffe01413387 97371->97380 97386 7ffe0141109f HeapFree 97371->97386 97391 7ffe014110b2 HeapFree 97371->97391 97398 7ffe014110d4 HeapFree 97371->97398 97619 7ffe01414d30 50 API calls 97371->97619 97376 7ffe0140d100 58 API calls 97372->97376 97384 7ffe014138f8 97373->97384 97665 7ffe01417c20 280 API calls 97373->97665 97382 7ffe01411488 97374->97382 97383 7ffe01411b04 97376->97383 97377->97371 97378->97373 97379->97371 97657 7ffe013da6d0 48 API calls 97380->97657 97388 7ffe014115b2 97382->97388 97623 7ffe0140fca0 48 API calls 97382->97623 97389 7ffe01411b1a 97383->97389 97390 7ffe01411b2b 97383->97390 97396 7ffe014139a1 97384->97396 97397 7ffe01413991 CloseHandle 97384->97397 97386->97371 97400 7ffe01411702 HeapFree 97388->97400 97517 7ffe01411713 97388->97517 97632 7ffe013ece50 HeapFree 97389->97632 97574 7ffe0140f3f0 97390->97574 97391->97371 97392->97364 97666 7ffe01424130 6 API calls 97396->97666 97397->97396 97398->97371 97400->97517 97402 7ffe0140e3a0 48 API calls 97424 7ffe01411ae1 97402->97424 97404 7ffe014139a9 97405 7ffe01411f8a HeapFree 97405->97424 97409 7ffe01411cb7 SetLastError GetSystemDirectoryW 97414 7ffe01411ccf GetLastError 97409->97414 97415 7ffe01411b26 97409->97415 97410 7ffe01411806 97413 7ffe0140b9b0 49 API calls 97410->97413 97421 7ffe01411849 97413->97421 97414->97415 97422 7ffe01411fb0 GetLastError 97414->97422 97415->97409 97423 7ffe01411ce8 GetLastError 97415->97423 97427 7ffe01411dc5 97415->97427 97433 7ffe01411f9d 97415->97433 97633 7ffe013f2580 49 API calls 97415->97633 97417 7ffe014159e0 97 API calls 97417->97424 97428 7ffe0140ba50 49 API calls 97421->97428 97432 7ffe01411fe2 HeapFree 97422->97432 97480 7ffe01411e89 97422->97480 97423->97415 97429 7ffe014133ae 97423->97429 97424->97372 97424->97402 97424->97405 97424->97417 97430 7ffe01411f4a HeapFree 97424->97430 97424->97433 97439 7ffe0140ce20 51 API calls 97424->97439 97635 7ffe0140fdb0 50 API calls 97424->97635 97436 7ffe01411dce 97427->97436 97437 7ffe01413483 97427->97437 97435 7ffe01411885 97428->97435 97658 7ffe013da6d0 48 API calls 97429->97658 97430->97424 97432->97480 97433->97422 97442 7ffe0140b9b0 49 API calls 97435->97442 97449 7ffe014118a1 97435->97449 97440 7ffe013f0dd0 51 API calls 97436->97440 97662 7ffe013da360 48 API calls 97437->97662 97439->97424 97444 7ffe01411de4 97440->97444 97442->97449 97443 7ffe014127ca GetLastError 97446 7ffe014127fc HeapFree 97443->97446 97443->97517 97447 7ffe0140e3a0 48 API calls 97444->97447 97445 7ffe01411947 97450 7ffe014119a3 97445->97450 97451 7ffe01411964 97445->97451 97446->97517 97452 7ffe01411e01 97447->97452 97448 7ffe014120c7 SetLastError GetWindowsDirectoryW 97454 7ffe01411eb4 97448->97454 97455 7ffe014120df GetLastError 97448->97455 97449->97445 97456 7ffe0140b9b0 49 API calls 97449->97456 97469 7ffe01411920 97449->97469 97625 7ffe014169a0 280 API calls 97449->97625 97453 7ffe014119f7 97450->97453 97461 7ffe0140b9b0 49 API calls 97450->97461 97451->97310 97471 7ffe01411984 HeapFree 97451->97471 97459 7ffe01411e16 97452->97459 97634 7ffe0140fdb0 50 API calls 97452->97634 97466 7ffe0141221a 97453->97466 97489 7ffe01411d1a 97453->97489 97566 7ffe01411a86 97453->97566 97454->97448 97463 7ffe014120f8 GetLastError 97454->97463 97467 7ffe0141212a 97454->97467 97637 7ffe013f2580 49 API calls 97454->97637 97455->97443 97455->97454 97456->97449 97577 7ffe014159e0 97459->97577 97461->97453 97463->97454 97468 7ffe014133cb 97463->97468 97465 7ffe01411e33 97472 7ffe01411e4e 97465->97472 97473 7ffe01411e3d HeapFree 97465->97473 97474 7ffe0140b9b0 49 API calls 97466->97474 97476 7ffe01412133 97467->97476 97477 7ffe0141349a 97467->97477 97659 7ffe013da6d0 48 API calls 97468->97659 97469->97451 97478 7ffe0141192a HeapFree 97469->97478 97471->97310 97479 7ffe01411e74 HeapFree 97472->97479 97472->97480 97473->97472 97474->97566 97481 7ffe013f0dd0 51 API calls 97476->97481 97663 7ffe013da360 48 API calls 97477->97663 97478->97451 97479->97480 97480->97454 97480->97466 97636 7ffe013ece50 HeapFree 97480->97636 97485 7ffe01412149 97481->97485 97488 7ffe0140e3a0 48 API calls 97485->97488 97486 7ffe01412caf 97496 7ffe014131d4 HeapFree 97486->97496 97518 7ffe014126de 97486->97518 97492 7ffe01412166 97488->97492 97489->97486 97506 7ffe01411d4c 97489->97506 97645 7ffe01413a20 50 API calls 97489->97645 97490 7ffe01412b57 97644 7ffe01416e50 280 API calls 97490->97644 97491 7ffe01412cee 97498 7ffe0140b9b0 49 API calls 97491->97498 97491->97506 97493 7ffe0141217b 97492->97493 97638 7ffe0140fdb0 50 API calls 97492->97638 97500 7ffe014159e0 97 API calls 97493->97500 97495 7ffe014129a4 97495->97310 97505 7ffe014129a9 HeapFree 97495->97505 97496->97518 97497 7ffe01412a82 97512 7ffe01413114 97497->97512 97513 7ffe01413108 CloseHandle 97497->97513 97498->97506 97507 7ffe01412198 97500->97507 97501 7ffe01412b62 97502 7ffe01412b79 97501->97502 97508 7ffe0140b9b0 49 API calls 97501->97508 97502->97489 97502->97506 97502->97518 97503 7ffe014131f3 HeapFree 97503->97518 97504 7ffe01411d8e 97504->97497 97524 7ffe01412ab9 97504->97524 97529 7ffe01412e48 97504->97529 97545 7ffe01412d66 97504->97545 97647 7ffe01417760 56 API calls 97504->97647 97505->97310 97506->97486 97506->97504 97646 7ffe013f2620 WaitOnAddress GetLastError 97506->97646 97514 7ffe014121a2 HeapFree 97507->97514 97515 7ffe014121b3 97507->97515 97508->97502 97509 7ffe014128e7 HeapFree 97509->97517 97510 7ffe0140e3a0 48 API calls 97510->97517 97511 7ffe0141320d HeapFree 97511->97518 97520 7ffe0141311e CloseHandle 97512->97520 97521 7ffe0141312a 97512->97521 97513->97512 97514->97515 97516 7ffe014121d9 HeapFree 97515->97516 97515->97517 97516->97517 97517->97310 97517->97410 97517->97443 97517->97466 97517->97495 97517->97509 97517->97510 97525 7ffe0140ce20 51 API calls 97517->97525 97540 7ffe014159e0 97 API calls 97517->97540 97555 7ffe01412948 HeapFree 97517->97555 97559 7ffe0141298a HeapFree 97517->97559 97584 7ffe0140bcb0 97517->97584 97642 7ffe013ece50 HeapFree 97517->97642 97643 7ffe0140fdb0 50 API calls 97517->97643 97518->97305 97518->97503 97518->97511 97558 7ffe014126f3 HeapFree 97518->97558 97641 7ffe01416e50 280 API calls 97518->97641 97520->97521 97530 7ffe01413134 CloseHandle 97521->97530 97557 7ffe01413140 97521->97557 97522 7ffe01412686 97527 7ffe01412699 97522->97527 97528 7ffe0141268b HeapFree 97522->97528 97523 7ffe01412eec CreateProcessW 97531 7ffe01413074 GetLastError 97523->97531 97532 7ffe01412f3b 97523->97532 97533 7ffe014130da CloseHandle 97524->97533 97525->97517 97526 7ffe01412444 HeapFree 97526->97566 97536 7ffe014126b8 97527->97536 97537 7ffe014126aa HeapFree 97527->97537 97528->97527 97529->97523 97542 7ffe01413098 97529->97542 97530->97557 97538 7ffe014130c6 CloseHandle 97531->97538 97531->97542 97543 7ffe01412f72 97532->97543 97544 7ffe01412f85 CloseHandle CloseHandle CloseHandle 97532->97544 97533->97497 97541 7ffe014130eb CloseHandle 97533->97541 97535 7ffe01412498 memcpy 97546 7ffe014124c6 HeapFree 97535->97546 97535->97566 97547 7ffe014126d7 97536->97547 97548 7ffe014126c9 HeapFree 97536->97548 97537->97536 97549 7ffe014130d2 CloseHandle 97538->97549 97540->97517 97541->97497 97542->97538 97543->97544 97550 7ffe01412fb6 97544->97550 97551 7ffe01412faa CloseHandle 97544->97551 97545->97549 97546->97566 97547->97518 97548->97547 97549->97533 97560 7ffe01412fd3 HeapFree 97550->97560 97561 7ffe01412fe8 97550->97561 97551->97550 97552 7ffe014131a4 97552->97486 97556 7ffe014131ae HeapFree 97552->97556 97553 7ffe0141319c WakeByAddressSingle 97553->97552 97555->97517 97556->97486 97557->97552 97557->97553 97558->97518 97559->97517 97560->97561 97562 7ffe0141300e 97561->97562 97563 7ffe01412ff9 HeapFree 97561->97563 97563->97562 97566->97490 97566->97518 97566->97522 97566->97526 97566->97535 97566->97536 97569 7ffe0140ba50 49 API calls 97566->97569 97571 7ffe01412638 HeapFree 97566->97571 97572 7ffe0140b9b0 49 API calls 97566->97572 97639 7ffe014102c0 280 API calls 97566->97639 97640 7ffe013f2580 49 API calls 97566->97640 97569->97566 97571->97566 97572->97566 97573->97106 97667 7ffe013f13c0 48 API calls 97574->97667 97576 7ffe0140f417 97578 7ffe0140b160 51 API calls 97577->97578 97579 7ffe01415a07 97578->97579 97580 7ffe01415a14 97579->97580 97668 7ffe01415900 97579->97668 97583 7ffe01415a4d 97580->97583 97777 7ffe013ece50 HeapFree 97580->97777 97583->97465 97585 7ffe0140b160 51 API calls 97584->97585 97586 7ffe0140bce1 97585->97586 97587 7ffe0140bcea 97586->97587 97592 7ffe0140bcfb 97586->97592 97790 7ffe013ece50 HeapFree 97587->97790 97589 7ffe0140bcf3 97589->97517 97590 7ffe0140bdd8 SetLastError GetEnvironmentVariableW 97590->97592 97593 7ffe0140bdf8 GetLastError 97590->97593 97592->97590 97595 7ffe0140be11 GetLastError 97592->97595 97597 7ffe0140be43 97592->97597 97791 7ffe013f2580 49 API calls 97592->97791 97593->97592 97594 7ffe0140bec7 GetLastError 97593->97594 97598 7ffe0140bef6 HeapFree 97594->97598 97599 7ffe0140bea7 97594->97599 97595->97592 97596 7ffe0140bf55 97595->97596 97793 7ffe013da6d0 48 API calls 97596->97793 97601 7ffe0140bf6f 97597->97601 97602 7ffe0140be4c 97597->97602 97598->97599 97607 7ffe0140beb0 97599->97607 97792 7ffe013ece50 HeapFree 97599->97792 97794 7ffe013da360 48 API calls 97601->97794 97604 7ffe013f0dd0 51 API calls 97602->97604 97608 7ffe0140be5b 97604->97608 97607->97589 97609 7ffe0140bf2b HeapFree 97607->97609 97608->97599 97610 7ffe0140be92 HeapFree 97608->97610 97609->97589 97610->97599 97617->97364 97618->97364 97619->97371 97620->97371 97621->97348 97622->97370 97624->97305 97625->97449 97630 7ffe0140ce7c 97626->97630 97627 7ffe013f0dd0 51 API calls 97629 7ffe0140cfdd 97627->97629 97628 7ffe0140d050 97628->97424 97629->97627 97629->97628 97630->97629 97631 7ffe0140b9b0 49 API calls 97630->97631 97631->97630 97632->97415 97633->97415 97634->97459 97635->97424 97636->97454 97637->97454 97638->97493 97639->97566 97640->97566 97641->97518 97642->97517 97643->97517 97644->97501 97645->97491 97646->97504 97647->97529 97654->97301 97656->97301 97664->97337 97665->97384 97666->97404 97667->97576 97669 7ffe01415919 97668->97669 97673 7ffe0141592e 97668->97673 97669->97580 97670 7ffe01415951 97671 7ffe0140b300 61 API calls 97670->97671 97672 7ffe0141596d 97671->97672 97672->97580 97673->97670 97674 7ffe01415997 97673->97674 97679 7ffe01415989 97673->97679 97674->97670 97698 7ffe014159c7 97674->97698 97675 7ffe01419208 SetLastError GetFullPathNameW 97677 7ffe0141922a GetLastError 97675->97677 97675->97679 97678 7ffe014192f9 GetLastError 97677->97678 97677->97679 97682 7ffe01419328 HeapFree 97678->97682 97701 7ffe014192ce 97678->97701 97679->97675 97680 7ffe01419243 GetLastError 97679->97680 97681 7ffe01419275 97679->97681 97778 7ffe013f2580 49 API calls 97679->97778 97680->97679 97683 7ffe0141940e 97680->97683 97684 7ffe0141927e 97681->97684 97685 7ffe01419428 97681->97685 97682->97701 97780 7ffe013da6d0 48 API calls 97683->97780 97688 7ffe0141943f 97684->97688 97689 7ffe0141929e 97684->97689 97781 7ffe013da360 48 API calls 97685->97781 97686 7ffe0141935c 97686->97580 97782 7ffe013db6a0 48 API calls 97688->97782 97696 7ffe01419452 97689->97696 97697 7ffe014192a7 97689->97697 97690 7ffe01419608 SetLastError GetFullPathNameW 97690->97698 97699 7ffe0141962a GetLastError 97690->97699 97692 7ffe0141934e HeapFree 97692->97686 97783 7ffe013da360 48 API calls 97696->97783 97697->97701 97702 7ffe014192b0 memcmp 97697->97702 97698->97690 97706 7ffe01419643 GetLastError 97698->97706 97711 7ffe01419675 97698->97711 97784 7ffe013f2580 49 API calls 97698->97784 97699->97698 97705 7ffe01419700 GetLastError 97699->97705 97701->97686 97701->97692 97702->97701 97710 7ffe0141972f HeapFree 97705->97710 97733 7ffe014196d5 97705->97733 97706->97698 97712 7ffe01419822 97706->97712 97710->97733 97713 7ffe0141967e 97711->97713 97714 7ffe0141983c 97711->97714 97786 7ffe013da6d0 48 API calls 97712->97786 97718 7ffe0141969e 97713->97718 97719 7ffe01419853 97713->97719 97787 7ffe013da360 48 API calls 97714->97787 97729 7ffe014196a7 97718->97729 97730 7ffe01419866 97718->97730 97788 7ffe013db6a0 48 API calls 97719->97788 97729->97733 97734 7ffe014196b4 memcmp 97729->97734 97734->97733 97777->97583 97778->97679 97784->97698 97790->97589 97791->97592 97792->97607 97796 7ffe013ea568 97795->97796 97798 7ffe013d17e9 97796->97798 97799 7ffe013ea607 HeapFree 97796->97799 97800 7ffe013ea622 HeapFree 97796->97800 97801 7ffe013ea647 HeapFree 97796->97801 97802 7ffe013ea680 97796->97802 97798->97126 97798->97127 97799->97796 97800->97796 97801->97796 97807 7ffe013ea69b 97802->97807 97809 7ffe013ea73f 97802->97809 97803 7ffe013ea9ed 97817 7ffe013db710 48 API calls 97803->97817 97805 7ffe013ea7a0 HeapFree 97815 7ffe013ea738 97805->97815 97807->97803 97811 7ffe013ea9d3 HeapFree 97807->97811 97812 7ffe013ea860 HeapFree 97807->97812 97813 7ffe013ea6d5 97807->97813 97808 7ffe013ea780 HeapFree 97808->97805 97808->97808 97809->97805 97809->97808 97809->97815 97811->97813 97812->97807 97812->97813 97813->97815 97816 7ffe013db710 48 API calls 97813->97816 97815->97796 97818->97150 97828->97199 97831 2e4e737 97832 2e4e740 97831->97832 97833 2e4e749 97831->97833 97837 2e4ea30 97832->97837 97835 2e4ea30 126 API calls 97833->97835 97836 2e4e747 97835->97836 97845 2e55378 97837->97845 97839 2e4ea51 memcpy_s 97840 2e4ea64 GetLastInputInfo GetTickCount wsprintfW GetForegroundWindow 97839->97840 97841 2e4eac5 GetWindowTextW 97840->97841 97842 2e4ead8 97840->97842 97841->97842 97857 2e4ebe0 7 API calls 97842->97857 97844 2e4eb15 ctype 97844->97836 97847 2e55383 97845->97847 97848 2e5539c 97847->97848 97852 2e553a2 std::_Facet_Register 97847->97852 97876 2e552c0 97847->97876 97893 2e5c188 DecodePointer 97847->97893 97848->97839 97850 2e553f3 97895 2e551f4 42 API calls std::exception::operator= 97850->97895 97852->97850 97894 2e559f0 48 API calls _cinit 97852->97894 97853 2e55404 97896 2e5733c RaiseException ctype 97853->97896 97856 2e5541a 97858 2e4ec8c 97857->97858 97859 2e4ec99 GetSystemMetrics 97857->97859 97860 2e4ed22 8 API calls 97858->97860 97861 2e4ecb4 GetSystemMetrics 97859->97861 97862 2e4ed02 GetSystemMetrics 97859->97862 97863 2e4ee5e memcpy_s 97860->97863 97861->97860 97862->97860 97864 2e4ee6e GetDIBits 97863->97864 97865 2e4eea1 memcpy_s ctype 97864->97865 97866 2e55378 std::_Facet_Register 49 API calls 97865->97866 97867 2e4ef0b 97866->97867 97905 2e4f080 GlobalAlloc GlobalLock 97867->97905 97870 2e4ef40 DeleteObject DeleteObject ReleaseDC 97875 2e4ef67 97870->97875 97871 2e4efaa ctype 97872 2e4efe3 DeleteObject DeleteObject ReleaseDC 97871->97872 97872->97875 97873 2e54cd0 _cftof_l 8 API calls 97874 2e4f050 97873->97874 97874->97844 97875->97873 97877 2e55354 97876->97877 97878 2e552d8 97876->97878 97903 2e5c188 DecodePointer 97877->97903 97880 2e55310 HeapAlloc 97878->97880 97881 2e552f0 97878->97881 97885 2e55339 97878->97885 97890 2e5533e 97878->97890 97900 2e5c188 DecodePointer 97878->97900 97880->97878 97886 2e55349 97880->97886 97881->97880 97897 2e5c13c 42 API calls 2 library calls 97881->97897 97898 2e5bedc 42 API calls 4 library calls 97881->97898 97899 2e5bb48 GetProcAddress ExitProcess malloc 97881->97899 97882 2e55359 97904 2e55614 42 API calls _getptd 97882->97904 97901 2e55614 42 API calls _getptd 97885->97901 97886->97847 97902 2e55614 42 API calls _getptd 97890->97902 97893->97847 97894->97850 97895->97853 97896->97856 97897->97881 97898->97881 97900->97878 97901->97890 97902->97886 97903->97882 97904->97886 97936 2e54d00 97905->97936 97907 2e4f0ea GlobalUnlock CreateStreamOnHGlobal 97908 2e4f393 GlobalFree 97907->97908 97911 2e4f110 _RunAllParam 97907->97911 97931 2e4f243 97908->97931 97909 2e54cd0 _cftof_l 8 API calls 97910 2e4ef3c 97909->97910 97910->97870 97910->97871 97938 2e4c570 97911->97938 97913 2e4f16e 97914 2e4f176 GdipCreateBitmapFromStream 97913->97914 97915 2e4f2fb 97913->97915 97916 2e4f1a5 GdipDisposeImage 97914->97916 97917 2e4f1b0 97914->97917 97919 2e4f31a DeleteObject 97915->97919 97925 2e4f33e _RunAllParam 97915->97925 97916->97915 97943 2e4c830 GdipGetImagePixelFormat 97917->97943 97919->97925 97921 2e4f1d1 CreateStreamOnHGlobal 97921->97915 97922 2e4f1f0 97921->97922 97988 2e4cc50 97922->97988 97925->97908 97926 2e4f226 GlobalFree 98024 2e4c630 DeleteObject _RunAllParam 97926->98024 97927 2e4f24a GlobalSize 97930 2e4f25d ctype 97927->97930 98025 2e502a0 49 API calls 2 library calls 97930->98025 97931->97909 97933 2e4f28d 97934 2e4f2e5 GlobalUnlock 97933->97934 97935 2e4f2c1 DeleteObject 97933->97935 97934->97915 97935->97934 97937 2e54d0c 97936->97937 97937->97907 97937->97937 97939 2e4c57d 97938->97939 97940 2e4c584 _RunAllParam 97938->97940 97939->97913 97941 2e4c5a2 GdiplusStartup 97940->97941 97942 2e4c5df _RunAllParam 97940->97942 97941->97942 97942->97913 97944 2e4c879 GdipGetImageHeight 97943->97944 97946 2e4c8e7 GdipGetImageWidth 97944->97946 97947 2e4c8e2 97944->97947 97948 2e4c900 97946->97948 97947->97946 98026 2e4c6d0 97948->98026 97951 2e4c9d5 97954 2e54cd0 _cftof_l 8 API calls 97951->97954 97952 2e4c930 GdipGetImagePaletteSize 97955 2e4c946 97952->97955 97953 2e4ca69 97956 2e4cba1 GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 97953->97956 97957 2e4ca7e GdipBitmapLockBits 97953->97957 97958 2e4cc31 GdipDisposeImage 97954->97958 97959 2e4c960 97955->97959 98040 2e4c0e0 8 API calls 2 library calls 97955->98040 97961 2e4cb76 97956->97961 97960 2e4cab1 97957->97960 97975 2e4cb04 97957->97975 97958->97915 97958->97921 97964 2e4c99e 97959->97964 97965 2e4cafa 97959->97965 97977 2e4c964 _ftelli64 97959->97977 97960->97951 97969 2e55280 free 42 API calls 97960->97969 97961->97951 97970 2e55280 free 42 API calls 97961->97970 97962 2e4cb5f GdipBitmapUnlockBits 97962->97961 97966 2e552c0 malloc 42 API calls 97964->97966 98042 2e41220 DeleteCriticalSection RaiseException std::_Facet_Register 97965->98042 97966->97977 97969->97960 97970->97961 97971 2e4cb95 98046 2e41220 DeleteCriticalSection RaiseException std::_Facet_Register 97971->98046 97972 2e4c9c0 97972->97951 97981 2e55280 free 42 API calls 97972->97981 97973 2e4c9df GdipGetImagePalette 97980 2e4c9f4 97973->97980 97975->97962 97975->97971 97976 2e4cb8a 97975->97976 97983 2e4cb80 97975->97983 98043 2e567a8 42 API calls 4 library calls 97975->98043 98045 2e41220 DeleteCriticalSection RaiseException std::_Facet_Register 97976->98045 97977->97972 97977->97973 97982 2e4cada 97980->97982 97985 2e4ca13 97980->97985 97981->97972 97982->97951 97987 2e55280 free 42 API calls 97982->97987 98044 2e41220 DeleteCriticalSection RaiseException std::_Facet_Register 97983->98044 98041 2e4cf50 CreateCompatibleDC SelectObject SetDIBColorTable SelectObject DeleteDC 97985->98041 97987->97982 97989 2e4c570 GdiplusStartup 97988->97989 97990 2e4cc7e 97989->97990 97991 2e4cc86 GdipGetImageEncodersSize 97990->97991 98005 2e4cd30 97990->98005 97992 2e4cc9c 97991->97992 97991->98005 97994 2e4ccb0 97992->97994 98048 2e4c0e0 8 API calls 2 library calls 97992->98048 97993 2e54cd0 _cftof_l 8 API calls 97995 2e4cd71 GetHGlobalFromStream GlobalLock 97993->97995 97997 2e4ccf6 97994->97997 97998 2e4cf37 97994->97998 98004 2e4ccb4 _ftelli64 97994->98004 97995->97926 97995->97927 98000 2e552c0 malloc 42 API calls 97997->98000 98049 2e41220 DeleteCriticalSection RaiseException std::_Facet_Register 97998->98049 98000->98004 98002 2e4cd37 GdipGetImageEncoders 98006 2e4cd49 98002->98006 98009 2e4cd81 98002->98009 98003 2e4cd1a 98003->98005 98007 2e55280 free 42 API calls 98003->98007 98004->98002 98004->98003 98005->97993 98006->98005 98008 2e55280 free 42 API calls 98006->98008 98007->98003 98008->98006 98010 2e4ce1c 98009->98010 98011 2e4ce3a 98009->98011 98010->98005 98016 2e55280 free 42 API calls 98010->98016 98012 2e4ceba GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 98011->98012 98013 2e4ce4a GdipCreateBitmapFromScan0 GdipSaveImageToStream 98011->98013 98014 2e4cf15 GdipDisposeImage 98012->98014 98015 2e4cee9 GdipDisposeImage 98012->98015 98013->98014 98017 2e4ce96 GdipDisposeImage 98013->98017 98014->98005 98021 2e4cf20 98014->98021 98015->98005 98023 2e4cef8 98015->98023 98016->98010 98017->98005 98022 2e4cea5 98017->98022 98018 2e55280 free 42 API calls 98018->98021 98019 2e55280 free 42 API calls 98019->98022 98020 2e55280 free 42 API calls 98020->98023 98021->98005 98021->98018 98022->98005 98022->98019 98023->98005 98023->98020 98025->97933 98027 2e552c0 malloc 42 API calls 98026->98027 98028 2e4c708 98027->98028 98029 2e4c720 98028->98029 98032 2e4c73c memcpy_s 98028->98032 98030 2e4c735 98029->98030 98031 2e55280 free 42 API calls 98029->98031 98030->97951 98030->97952 98030->97953 98031->98029 98033 2e4c782 CreateDIBSection 98032->98033 98034 2e4c7c4 98033->98034 98035 2e4c7a2 98033->98035 98047 2e4d020 9 API calls _cftof_l 98034->98047 98035->98030 98037 2e55280 free 42 API calls 98035->98037 98037->98035 98038 2e4c7da 98038->98030 98039 2e55280 free 42 API calls 98038->98039 98039->98038 98040->97959 98041->97953 98043->97975 98047->98038 98048->97994 98050 2e437b0 98051 2e43823 98050->98051 98053 2e437c8 98050->98053 98052 2e437d6 Sleep 98052->98053 98053->98051 98053->98052 98054 2e437ff timeGetTime 98053->98054 98054->98053 98055 2e43830 GetCurrentThreadId 98056 2e4385c 98055->98056 98068 2e41080 98056->98068 98058 2e438a5 98059 2e41080 45 API calls 98058->98059 98060 2e438df 98059->98060 98061 2e41080 45 API calls 98060->98061 98062 2e43926 ctype 98061->98062 98076 2e43a30 98062->98076 98066 2e439f5 GetCurrentThreadId 98067 2e43a05 98066->98067 98069 2e41096 98068->98069 98070 2e4108e 98068->98070 98091 2e6ca20 98069->98091 98070->98058 98073 2e410e5 ctype 98074 2e41104 VirtualFree 98073->98074 98075 2e41112 98073->98075 98074->98075 98075->98058 98080 2e43a68 98076->98080 98081 2e43ac1 98076->98081 98077 2e439d6 98082 2e41140 98077->98082 98078 2e43a80 send 98078->98080 98079 2e43ad0 send 98079->98077 98079->98081 98080->98077 98080->98078 98080->98081 98081->98077 98081->98079 98083 2e41150 98082->98083 98084 2e4115a 98083->98084 98085 2e6ca20 43 API calls 98083->98085 98084->98066 98086 2e4117f 98085->98086 98087 2e4118c 98086->98087 98088 2e41199 VirtualAlloc 98086->98088 98087->98066 98089 2e411c3 ctype 98088->98089 98090 2e411d9 VirtualFree 98089->98090 98090->98066 98092 2e6ca5c 98091->98092 98094 2e410bd VirtualAlloc 98091->98094 98092->98094 98095 2e6cbf0 43 API calls 4 library calls 98092->98095 98094->98073 98095->98094 98096 2873390 98097 28733c7 socket 98096->98097 98099 2873418 _fltout2 98097->98099 98100 287341f 98097->98100 98101 2873499 gethostbyname 98100->98101 98102 28734b1 98101->98102 98102->98099 98103 28734ce connect 98102->98103 98103->98099 98104 2873504 setsockopt setsockopt setsockopt setsockopt 98103->98104 98105 2873607 98104->98105 98106 28735b8 WSAIoctl 98104->98106 98110 28794dc 98105->98110 98106->98105 98108 2873631 98109 28794dc 2 API calls 98108->98109 98109->98099 98111 287951c __onexitinit _getptd 98110->98111 98112 2879507 _invalid_parameter_noinfo _errno free _close_nolock 98110->98112 98111->98112 98113 287954c CreateThread 98111->98113 98112->98108 98113->98112 98114 287945c 98113->98114 98115 287946a _freefls 98114->98115 98118 2879430 RtlExitUserThread _getptd 98115->98118 98117 28794db 98118->98117 98119 2873690 98123 28736c0 _errno _cftof_l 98119->98123 98120 2873778 _fltout2 98121 2873738 recv 98121->98123 98123->98120 98123->98121 98124 2873c80 VirtualAlloc VirtualFree VirtualAlloc VirtualFree _cftof_l 98123->98124 98124->98123 98125 2873310 98126 287331f setsockopt 98125->98126 98127 287337a 98125->98127 98128 2873360 closesocket 98126->98128 98128->98127 98129 2873c10 98130 2873c26 SleepEx 98129->98130 98131 2873c46 98130->98131 98132 2d70000 98134 2d70448 98132->98134 98135 2d705b1 98134->98135 98136 2d700dc 98134->98136 98137 2d70116 98136->98137 98141 2d7032a 98136->98141 98138 2d70147 VirtualAlloc 98137->98138 98137->98141 98139 2d70168 98138->98139 98138->98141 98140 2d702b7 LoadLibraryA 98139->98140 98139->98141 98140->98139 98140->98141 98141->98135 98142 7ffe013d4790 98143 7ffe013d47a0 CloseHandle 98142->98143 98203 7ffe013d438e 98142->98203 98144 7ffe013d47b0 98143->98144 98143->98203 98317 7ffe013db610 48 API calls 98144->98317 98147 7ffe013d47b5 CloseHandle 98147->98203 98148 7ffe013d4822 SetFilePointerEx 98152 7ffe013d78d9 GetLastError 98148->98152 98148->98203 98149 7ffe013d78a5 98322 7ffe013db610 48 API calls 98149->98322 98150 7ffe013ed4a0 50 API calls 98150->98203 98191 7ffe013d713b 98152->98191 98153 7ffe013d7e29 HeapFree 98155 7ffe013d7edc 98153->98155 98154 7ffe013d7568 CloseHandle 98154->98144 98160 7ffe013d1770 63 API calls 98155->98160 98156 7ffe013d7432 CloseHandle 98159 7ffe013d743c 98156->98159 98157 7ffe013d48c3 SetFilePointerEx 98161 7ffe013d712e GetLastError 98157->98161 98157->98203 98158 7ffe013d75aa 98318 7ffe013d9a00 48 API calls 98158->98318 98314 7ffe013db610 48 API calls 98159->98314 98164 7ffe013d7ee9 98160->98164 98161->98191 98163 7ffe013d4780 98163->98147 98329 7ffe013d1660 HeapFree 98164->98329 98167 7ffe013d7f20 98169 7ffe013d7ffa HeapFree 98167->98169 98170 7ffe013d814a 98167->98170 98168 7ffe013d491a SetFilePointerEx 98168->98161 98168->98203 98169->98170 98330 7ffe013d1660 HeapFree 98170->98330 98172 7ffe013d8157 98174 7ffe013d8204 98172->98174 98177 7ffe013d81ff HeapFree 98172->98177 98173 7ffe0140e340 2 API calls 98173->98203 98175 7ffe013d8225 98174->98175 98176 7ffe013d820f HeapFree 98174->98176 98178 7ffe013d8246 98175->98178 98179 7ffe013d8230 HeapFree 98175->98179 98176->98175 98177->98174 98180 7ffe013d824f 98178->98180 98181 7ffe013d845b HeapFree 98178->98181 98179->98178 98182 7ffe013d8583 98180->98182 98183 7ffe013d859b HeapFree 98180->98183 98181->98180 98184 7ffe013d87ff 98182->98184 98185 7ffe013d87ee HeapFree 98182->98185 98183->98182 98331 7ffe013d19f0 HeapFree 98184->98331 98185->98184 98187 7ffe013d880c 98332 7ffe01424130 6 API calls 98187->98332 98189 7ffe013d8814 98190 7ffe013ebad0 51 API calls 98190->98203 98191->98156 98192 7ffe013d7925 98192->98191 98193 7ffe013d741c HeapFree 98192->98193 98193->98156 98194 7ffe013ec410 53 API calls 98194->98203 98195 7ffe013d7ad5 98327 7ffe013d8d80 48 API calls 98195->98327 98197 7ffe013d4bd9 SetFilePointerEx 98200 7ffe013d7986 GetLastError 98197->98200 98197->98203 98198 7ffe013d7955 98323 7ffe013db610 48 API calls 98198->98323 98200->98159 98201 7ffe013d5c10 HeapFree 98201->98203 98202 7ffe013ebbb0 50 API calls 98202->98203 98203->98142 98203->98144 98203->98147 98203->98148 98203->98149 98203->98150 98203->98154 98203->98157 98203->98158 98203->98159 98203->98163 98203->98168 98203->98173 98203->98190 98203->98191 98203->98192 98203->98194 98203->98195 98203->98197 98203->98198 98203->98201 98203->98202 98204 7ffe013d79ae 98203->98204 98206 7ffe013d79fd 98203->98206 98207 7ffe013d5cd7 SetFilePointerEx 98203->98207 98212 7ffe013d70d1 98203->98212 98215 7ffe013d6b90 HeapFree 98203->98215 98218 7ffe013d6bab HeapFree 98203->98218 98222 7ffe013d6bcc HeapFree 98203->98222 98223 7ffe013d6bed HeapFree 98203->98223 98224 7ffe013d6c08 HeapFree 98203->98224 98225 7ffe013d6c24 HeapFree 98203->98225 98226 7ffe013d6c45 HeapFree 98203->98226 98227 7ffe013d6c60 HeapFree 98203->98227 98228 7ffe013d6c86 HeapFree 98203->98228 98229 7ffe013d4393 HeapFree 98203->98229 98230 7ffe013d4389 HeapFree 98203->98230 98231 7ffe013d4466 SetLastError 98203->98231 98233 7ffe013d4482 GetLastError 98203->98233 98235 7ffe013d449b GetLastError 98203->98235 98237 7ffe013d71db 98203->98237 98240 7ffe013d788b 98203->98240 98242 7ffe013f0dd0 51 API calls 98203->98242 98245 7ffe013d4510 HeapFree 98203->98245 98246 7ffe013d45d8 memcpy 98203->98246 98247 7ffe013d7ab9 98203->98247 98250 7ffe013d7ac3 98203->98250 98251 7ffe013d464e HeapFree 98203->98251 98253 7ffe0140adf0 71 API calls 98203->98253 98254 7ffe013d724a 98203->98254 98256 7ffe013d7260 98203->98256 98258 7ffe014228a0 51 API calls 98203->98258 98259 7ffe013d522b memcpy 98203->98259 98260 7ffe013d5344 SetFilePointerEx 98203->98260 98261 7ffe013d90e0 52 API calls 98203->98261 98262 7ffe013d7697 98203->98262 98271 7ffe013d76c6 98203->98271 98272 7ffe013d5305 memcpy 98203->98272 98280 7ffe013d5780 SetFilePointerEx 98203->98280 98282 7ffe013d6e36 98203->98282 98283 7ffe013d5841 HeapFree 98203->98283 98284 7ffe013d5862 HeapFree 98203->98284 98286 7ffe013d701e 98203->98286 98288 7ffe013d5888 HeapFree 98203->98288 98290 7ffe013d5966 memcpy 98203->98290 98291 7ffe013d755e 98203->98291 98292 7ffe013d5752 memcpy 98203->98292 98295 7ffe0141b7d0 HeapAlloc 98203->98295 98297 7ffe013d7041 98203->98297 98299 7ffe013d754c 98203->98299 98302 7ffe013d5a5c memcmp 98203->98302 98303 7ffe013d5ae7 HeapFree 98203->98303 98304 7ffe013d4c90 memcpy 98203->98304 98305 7ffe013f2580 49 API calls 98203->98305 98306 7ffe013ece50 HeapFree 98203->98306 98307 7ffe013eb050 51 API calls 98203->98307 98324 7ffe013d99c0 48 API calls 98204->98324 98328 7ffe013db610 48 API calls 98206->98328 98207->98203 98208 7ffe013d7a0e GetLastError 98207->98208 98208->98206 98209 7ffe013d7368 98211 7ffe013d7378 HeapFree 98209->98211 98213 7ffe013d70f0 98209->98213 98211->98213 98212->98209 98212->98213 98217 7ffe013d7506 HeapFree 98212->98217 98214 7ffe013d73f0 98213->98214 98216 7ffe013d73c4 HeapFree 98213->98216 98221 7ffe013d73dd HeapFree 98213->98221 98219 7ffe013d73fb HeapFree 98214->98219 98220 7ffe013d7411 98214->98220 98215->98203 98216->98213 98217->98212 98218->98203 98219->98220 98220->98156 98220->98193 98221->98213 98222->98203 98223->98203 98224->98203 98225->98203 98226->98203 98227->98203 98228->98203 98229->98203 98230->98203 98231->98203 98233->98203 98234 7ffe013d71b5 GetLastError 98233->98234 98234->98237 98238 7ffe013d71c8 HeapFree 98234->98238 98235->98203 98236 7ffe013d7198 98235->98236 98312 7ffe013da6d0 48 API calls 98236->98312 98313 7ffe013db610 48 API calls 98237->98313 98238->98237 98321 7ffe013da360 48 API calls 98240->98321 98241 7ffe013d6e59 98241->98153 98289 7ffe013d6faa 98241->98289 98242->98203 98245->98203 98249 7ffe0140e3a0 48 API calls 98246->98249 98325 7ffe013d8da0 48 API calls 98247->98325 98249->98203 98326 7ffe013d8d80 48 API calls 98250->98326 98251->98203 98253->98203 98254->98212 98255 7ffe013d7330 HeapFree 98254->98255 98255->98212 98256->98254 98257 7ffe013d7305 HeapFree 98256->98257 98257->98254 98258->98203 98259->98203 98263 7ffe013d715d GetLastError 98260->98263 98264 7ffe013d5370 SetFilePointerEx 98260->98264 98261->98203 98319 7ffe013d8d80 48 API calls 98262->98319 98266 7ffe013d7189 98263->98266 98264->98263 98277 7ffe013d53a5 98264->98277 98267 7ffe013d72b7 98266->98267 98268 7ffe013d72a1 HeapFree 98266->98268 98269 7ffe013d7076 98267->98269 98270 7ffe013d72c2 HeapFree 98267->98270 98268->98267 98269->98256 98275 7ffe013d709d HeapFree 98269->98275 98270->98269 98320 7ffe013d8d80 48 API calls 98271->98320 98272->98260 98274 7ffe013d53e5 SetFilePointerEx 98274->98263 98274->98277 98275->98256 98276 7ffe013ebbb0 50 API calls 98276->98277 98277->98266 98277->98274 98277->98276 98278 7ffe013d54e2 DosDateTimeToFileTime 98277->98278 98278->98263 98279 7ffe013d5515 FileTimeToSystemTime 98278->98279 98279->98203 98279->98263 98280->98203 98281 7ffe013d751a GetLastError 98280->98281 98281->98212 98308 7ffe013d9a00 48 API calls 98282->98308 98283->98203 98284->98203 98309 7ffe014231e0 49 API calls 98286->98309 98288->98203 98290->98203 98316 7ffe013d8da0 48 API calls 98291->98316 98292->98203 98293 7ffe013d7043 98292->98293 98310 7ffe014231e0 49 API calls 98293->98310 98295->98203 98311 7ffe013ec530 HeapFree 98297->98311 98315 7ffe013d8d80 48 API calls 98299->98315 98302->98203 98303->98203 98304->98203 98305->98203 98306->98203 98307->98203 98308->98241 98309->98297 98310->98297 98311->98269 98318->98241 98329->98167 98330->98172 98331->98187 98332->98189 98333 7ffe0141b4b0 98334 7ffe0141b61e 98333->98334 98335 7ffe0141b4ca 98333->98335 98351 7ffe0141b640 48 API calls 98334->98351 98336 7ffe0141b4eb 98335->98336 98349 7ffe013f2440 49 API calls 98335->98349 98338 7ffe0141b601 98336->98338 98339 7ffe0141b4fa ReadFile 98336->98339 98350 7ffe013f2440 49 API calls 98338->98350 98341 7ffe0141b54b GetLastError 98339->98341 98345 7ffe0141b531 98339->98345 98340 7ffe0141b632 98346 7ffe0141b578 98341->98346 98344 7ffe0141b612 98346->98345 98348 7ffe013ece50 HeapFree 98346->98348 98348->98345 98349->98336 98350->98344 98351->98340 98352 7ffe013d5de8 98353 7ffe0141b7d0 HeapAlloc 98352->98353 98354 7ffe013d5dfc 98353->98354 98390 7ffe013d7787 98354->98390 98493 7ffe014380f0 98354->98493 98360 7ffe013d7edc 98362 7ffe013d1770 63 API calls 98360->98362 98361 7ffe013d60e8 98363 7ffe013ea430 53 API calls 98361->98363 98364 7ffe013d6204 memset 98361->98364 98365 7ffe013d638a 98361->98365 98374 7ffe013d776f 98361->98374 98382 7ffe013d70f5 98361->98382 98516 7ffe013e9d80 HeapReAlloc HeapAlloc 98361->98516 98517 7ffe013dfe90 HeapFree 98361->98517 98366 7ffe013d7ee9 98362->98366 98363->98361 98364->98361 98508 7ffe013d15b0 98365->98508 98528 7ffe013d1660 HeapFree 98366->98528 98369 7ffe013d639c 98372 7ffe0140b160 51 API calls 98369->98372 98376 7ffe013d63b6 98372->98376 98373 7ffe013d7f20 98378 7ffe013d7ffa HeapFree 98373->98378 98379 7ffe013d814a 98373->98379 98520 7ffe013da6d0 48 API calls 98374->98520 98377 7ffe013d6427 98376->98377 98381 7ffe0140b300 61 API calls 98376->98381 98385 7ffe013d7a22 98377->98385 98386 7ffe013d6433 98377->98386 98378->98379 98529 7ffe013d1660 HeapFree 98379->98529 98397 7ffe013d6404 98381->98397 98519 7ffe013db610 48 API calls 98382->98519 98384 7ffe013d8157 98389 7ffe013d8204 98384->98389 98396 7ffe013d81ff HeapFree 98384->98396 98521 7ffe013db610 48 API calls 98385->98521 98386->98390 98398 7ffe0141b7d0 HeapAlloc 98386->98398 98426 7ffe013d6468 HeapCreate HeapAlloc GetLastError 98386->98426 98388 7ffe013d7129 HeapFree 98388->98360 98392 7ffe013d8225 98389->98392 98393 7ffe013d820f HeapFree 98389->98393 98390->98388 98522 7ffe013d8d80 48 API calls 98390->98522 98400 7ffe013d8246 98392->98400 98401 7ffe013d8230 HeapFree 98392->98401 98393->98392 98394 7ffe013d6eb2 98402 7ffe013d6ebd HeapFree 98394->98402 98403 7ffe013d6ece 98394->98403 98395 7ffe013d6573 memset 98399 7ffe013d65a8 98395->98399 98422 7ffe013d675c 98395->98422 98396->98389 98397->98377 98404 7ffe013d6b5a GetLastError 98397->98404 98405 7ffe013d6b3b 98397->98405 98406 7ffe013d645f 98398->98406 98420 7ffe013d8f90 50 API calls 98399->98420 98408 7ffe013d824f 98400->98408 98414 7ffe013d845b HeapFree 98400->98414 98401->98400 98402->98403 98410 7ffe013d6ed9 HeapFree 98403->98410 98411 7ffe013d6eef 98403->98411 98404->98377 98412 7ffe013d6b72 HeapFree 98404->98412 98405->98386 98409 7ffe013d6b44 HeapFree 98405->98409 98406->98390 98406->98426 98407 7ffe013d6911 AddVectoredExceptionHandler NtQueryInformationProcess 98413 7ffe0141b7d0 HeapAlloc 98407->98413 98423 7ffe013d8583 98408->98423 98433 7ffe013d859b HeapFree 98408->98433 98409->98386 98410->98411 98518 7ffe013d1930 CloseHandle HeapFree HeapFree HeapFree HeapFree 98411->98518 98412->98377 98416 7ffe013d6a6b 98412->98416 98421 7ffe013d6979 98413->98421 98414->98408 98418 7ffe013d6cd2 HeapFree 98416->98418 98419 7ffe013d6e5e 98416->98419 98417 7ffe013d6efc 98424 7ffe013d6f1d 98417->98424 98425 7ffe013d6f07 HeapFree 98417->98425 98458 7ffe013d6d0c 98418->98458 98427 7ffe013d6de2 98419->98427 98428 7ffe013d6e70 HeapFree 98419->98428 98429 7ffe013d65ff 98420->98429 98430 7ffe013d7c0b 98421->98430 98431 7ffe013d6982 NtQuerySystemInformation 98421->98431 98422->98407 98432 7ffe013d8f90 50 API calls 98422->98432 98443 7ffe013d87ff 98423->98443 98444 7ffe013d87ee HeapFree 98423->98444 98434 7ffe013d6f2d HeapFree 98424->98434 98435 7ffe013d6f3e 98424->98435 98425->98424 98426->98394 98426->98395 98440 7ffe013d6e89 HeapFree 98427->98440 98446 7ffe013d6def 98427->98446 98428->98427 98436 7ffe013d7c27 98429->98436 98437 7ffe013d6617 GetModuleHandleA 98429->98437 98523 7ffe013d8d80 48 API calls 98430->98523 98431->98427 98492 7ffe013d69b8 98431->98492 98442 7ffe013d67cd 98432->98442 98433->98423 98434->98435 98456 7ffe013d6f84 98435->98456 98461 7ffe013d6f71 HeapFree 98435->98461 98524 7ffe013db610 48 API calls 98436->98524 98447 7ffe013d664b 98437->98447 98448 7ffe013d6637 LoadLibraryA 98437->98448 98438 7ffe013d6feb 98452 7ffe013d6ff3 HeapFree 98438->98452 98453 7ffe013d7004 98438->98453 98439 7ffe013d6d15 NtGetContextThread 98439->98427 98439->98458 98440->98446 98449 7ffe013d7cbb 98442->98449 98450 7ffe013d67e5 GetModuleHandleA 98442->98450 98530 7ffe013d19f0 HeapFree 98443->98530 98444->98443 98457 7ffe013d6ea2 memcpy 98446->98457 98467 7ffe013d8f90 50 API calls 98447->98467 98448->98427 98448->98447 98526 7ffe013db610 48 API calls 98449->98526 98459 7ffe013d6827 98450->98459 98452->98453 98453->98382 98453->98457 98454 7ffe013d880c 98531 7ffe01424130 6 API calls 98454->98531 98462 7ffe013d6fa5 98456->98462 98463 7ffe013d6f8f HeapFree 98456->98463 98457->98394 98458->98438 98458->98439 98464 7ffe013d6da2 NtSetContextThread 98458->98464 98465 7ffe013d8f90 50 API calls 98459->98465 98461->98435 98463->98462 98464->98427 98468 7ffe013d6db1 NtClose 98464->98468 98469 7ffe013d6885 98465->98469 98466 7ffe013d8814 98471 7ffe013d66d0 98467->98471 98468->98458 98472 7ffe013d689d GetProcAddress 98469->98472 98473 7ffe013d7d02 98469->98473 98470 7ffe013d6ab0 NtOpenThread 98470->98492 98474 7ffe013d66e8 GetProcAddress 98471->98474 98475 7ffe013d7c71 98471->98475 98477 7ffe013d6df4 98472->98477 98478 7ffe013d68c1 98472->98478 98473->98388 98527 7ffe013db610 48 API calls 98473->98527 98480 7ffe013d670c 98474->98480 98481 7ffe013d6dc2 98474->98481 98525 7ffe013db610 48 API calls 98475->98525 98485 7ffe013d6dfe HeapFree 98477->98485 98486 7ffe013d6e0f 98477->98486 98482 7ffe013d68ea 98478->98482 98483 7ffe013d68d9 HeapFree 98478->98483 98487 7ffe013d6724 HeapFree 98480->98487 98488 7ffe013d6735 98480->98488 98481->98427 98484 7ffe013d6dd1 HeapFree 98481->98484 98482->98407 98489 7ffe013d6900 HeapFree 98482->98489 98483->98482 98484->98427 98485->98486 98486->98440 98490 7ffe013d6e1d 98486->98490 98487->98488 98488->98422 98491 7ffe013d674b HeapFree 98488->98491 98489->98407 98490->98446 98491->98422 98492->98416 98492->98427 98492->98470 98494 7ffe013d5e57 98493->98494 98495 7ffe01438104 98493->98495 98494->98361 98497 7ffe013ea430 98494->98497 98495->98494 98496 7ffe01438147 malloc 98495->98496 98496->98494 98498 7ffe013ea482 98497->98498 98532 7ffe014220b7 98498->98532 98545 7ffe01421fe0 98498->98545 98499 7ffe013ea498 98500 7ffe013ea52c 98499->98500 98504 7ffe013ea4d4 98499->98504 98563 7ffe013da360 48 API calls 98500->98563 98501 7ffe013ea4e9 memcpy 98503 7ffe013ea50a 98501->98503 98503->98361 98504->98501 98509 7ffe013d15f4 98508->98509 98510 7ffe013d15be 98508->98510 98509->98369 98511 7ffe013d15fc 98510->98511 98512 7ffe013d15c3 98510->98512 98514 7ffe013d1603 HeapFree 98511->98514 98515 7ffe013d15e5 98511->98515 98513 7ffe013d15ca HeapFree 98512->98513 98512->98515 98513->98515 98514->98515 98515->98369 98516->98361 98517->98361 98518->98417 98528->98373 98529->98384 98530->98454 98531->98466 98533 7ffe014220df 98532->98533 98542 7ffe01422020 98532->98542 98534 7ffe01422237 98533->98534 98539 7ffe014221ac 98533->98539 98540 7ffe014221ba 98534->98540 98576 7ffe013da360 48 API calls 98534->98576 98539->98540 98574 7ffe014231e0 49 API calls 98539->98574 98540->98499 98540->98540 98542->98532 98542->98533 98542->98539 98543 7ffe014222dc 98542->98543 98564 7ffe01423950 98542->98564 98573 7ffe01437a70 memcpy memcpy memcpy 98542->98573 98575 7ffe013d99c0 48 API calls 98543->98575 98546 7ffe014220e4 98545->98546 98560 7ffe0142200b 98545->98560 98547 7ffe01423950 48 API calls 98546->98547 98549 7ffe014220f1 98547->98549 98548 7ffe01423950 48 API calls 98548->98560 98552 7ffe014221ac 98549->98552 98581 7ffe01437a70 memcpy memcpy memcpy 98549->98581 98562 7ffe014221ba 98552->98562 98582 7ffe014231e0 49 API calls 98552->98582 98553 7ffe01422137 98554 7ffe014222dc 98553->98554 98557 7ffe014220df 98553->98557 98583 7ffe013d99c0 48 API calls 98554->98583 98557->98552 98558 7ffe01422237 98557->98558 98558->98562 98584 7ffe013da360 48 API calls 98558->98584 98560->98548 98560->98552 98560->98554 98560->98557 98580 7ffe01437a70 memcpy memcpy memcpy 98560->98580 98562->98499 98562->98562 98571 7ffe01423973 98564->98571 98565 7ffe014239fd 98578 7ffe013db6a0 48 API calls 98565->98578 98567 7ffe0142399b 98567->98542 98568 7ffe01423a0c 98579 7ffe013d99c0 48 API calls 98568->98579 98571->98565 98571->98567 98571->98568 98577 7ffe013da360 48 API calls 98571->98577 98573->98542 98574->98540 98580->98560 98581->98553 98582->98562 98585 28737e0 98586 2873853 98585->98586 98588 28737f8 98585->98588 98587 2873806 SleepEx 98587->98588 98588->98586 98588->98587 98589 7ffe01417035 98594 7ffe01417c90 98589->98594 98592 7ffe01417055 98593 7ffe0141718b CloseHandle 98593->98592 98595 7ffe01417cf0 GetCurrentProcessId 98594->98595 98602 7ffe01417d04 98595->98602 98596 7ffe01417d10 ProcessPrng 98596->98596 98596->98602 98597 7ffe013d9320 49 API calls 98597->98602 98598 7ffe01417db7 HeapFree 98598->98602 98599 7ffe0141b7d0 HeapAlloc 98599->98602 98600 7ffe01418378 98634 7ffe013d8d80 48 API calls 98600->98634 98602->98595 98602->98596 98602->98597 98602->98598 98602->98599 98602->98600 98609 7ffe01418286 98602->98609 98610 7ffe01418159 GetLastError 98602->98610 98613 7ffe01418213 98602->98613 98620 7ffe013f24e0 2 API calls 98602->98620 98627 7ffe01418361 98602->98627 98631 7ffe014181b4 HeapFree 98602->98631 98632 7ffe013ece50 HeapFree 98602->98632 98614 7ffe0141828b HeapFree 98609->98614 98615 7ffe0141829c 98609->98615 98610->98602 98610->98613 98617 7ffe0141823f 98613->98617 98618 7ffe0141822e HeapFree 98613->98618 98614->98615 98621 7ffe0140adf0 71 API calls 98615->98621 98622 7ffe0141824f HeapFree 98617->98622 98623 7ffe0141825d 98617->98623 98618->98617 98620->98602 98624 7ffe014182f9 98621->98624 98622->98623 98625 7ffe01418263 CloseHandle 98623->98625 98626 7ffe01417046 98623->98626 98624->98617 98629 7ffe01418329 98624->98629 98625->98626 98626->98592 98626->98593 98633 7ffe013d8d80 48 API calls 98627->98633 98629->98626 98630 7ffe0141834e HeapFree 98629->98630 98630->98626 98631->98595 98632->98602 98635 2876860 98636 2876882 98635->98636 98647 28769fc _vsprintf_s_l _cftof_l 98635->98647 98637 2876b26 _cftof_l 98636->98637 98638 2876894 RegOpenKeyExW 98636->98638 98639 2876b3b VirtualAlloc 98637->98639 98644 28768d5 _vsprintf_s_l _cftof_l 98638->98644 98642 2876b71 _cftof_l 98639->98642 98640 28794dc 2 API calls 98641 2876c4c SleepEx 98640->98641 98641->98647 98643 2876bc0 RegCreateKeyW 98642->98643 98642->98644 98645 2876bdf RegDeleteValueW RegSetValueExW 98643->98645 98646 2876c19 RegCloseKey 98643->98646 98644->98640 98644->98647 98645->98646 98646->98644 98648 2873860 98649 2873889 98648->98649 98650 28738f8 VirtualAlloc 98649->98650 98654 2873925 _cftof_l 98649->98654 98650->98654 98652 2873a7f 98664 2873b10 98652->98664 98658 2871080 98654->98658 98657 2873ae3 98659 28710a9 98658->98659 98660 28710e2 VirtualAlloc 98659->98660 98662 2871139 _cftof_l 98659->98662 98661 287110a _cftof_l 98660->98661 98661->98662 98663 287112b VirtualFree 98661->98663 98662->98652 98662->98662 98663->98662 98665 2873b48 98664->98665 98666 2873ac4 98665->98666 98667 2873bb0 send 98665->98667 98668 28711f0 98666->98668 98667->98665 98667->98666 98669 2871200 98668->98669 98670 287120a 98669->98670 98671 2871249 VirtualAlloc 98669->98671 98670->98657 98672 2871273 _cftof_l 98671->98672 98673 2871289 VirtualFree 98672->98673 98673->98657 98674 7ffe0141b2e0 98675 7ffe0141b2f9 98674->98675 98683 7ffe0141b331 98674->98683 98677 7ffe0141b346 GetLastError 98675->98677 98678 7ffe0141b309 98675->98678 98676 7ffe0141b407 CloseHandle CloseHandle 98676->98683 98691 7ffe013ece50 HeapFree 98677->98691 98681 7ffe0141b3b1 GetLastError 98678->98681 98678->98683 98684 7ffe0141b3de 98681->98684 98682 7ffe0141b7d0 HeapAlloc 98682->98683 98683->98676 98683->98682 98686 7ffe0141b44b 98683->98686 98693 7ffe013ece50 HeapFree 98683->98693 98684->98683 98692 7ffe013ece50 HeapFree 98684->98692 98687 7ffe0141b47e CloseHandle CloseHandle HeapFree 98686->98687 98688 7ffe0141b464 HeapFree 98686->98688 98694 7ffe01424130 6 API calls 98687->98694 98688->98687 98690 7ffe0141b4a9 98691->98683 98692->98683 98693->98683 98694->98690 98695 2e472d0 CreateMutexW CreateMutexExW 98696 2e47307 98695->98696 98706 2e47339 memcpy_s 98695->98706 98697 2e47310 Sleep CreateMutexW GetLastError 98696->98697 98697->98697 98697->98706 98698 2e473b1 malloc 98699 2e473b9 GetConsoleWindow 98698->98699 98724 2e51bf0 20 API calls _cftof_l 98699->98724 98701 2e47360 lstrlenW 98713 2e48310 98701->98713 98702 2e473d8 98704 2e473f6 98702->98704 98705 2e473dc 98702->98705 98725 2e52000 37 API calls 3 library calls 98704->98725 98707 2e54cd0 _cftof_l 8 API calls 98705->98707 98706->98698 98706->98701 98709 2e47387 lstrcmpW 98706->98709 98710 2e4739d Sleep 98706->98710 98711 2e473ee 98707->98711 98709->98698 98709->98710 98710->98698 98710->98706 98726 2e57bb0 98713->98726 98716 2e48384 98717 2e483f5 RegCloseKey RegCloseKey 98716->98717 98719 2e48391 RegQueryValueExW 98716->98719 98718 2e54cd0 _cftof_l 8 API calls 98717->98718 98720 2e4841f 98718->98720 98719->98717 98721 2e483c7 lstrcmpW 98719->98721 98720->98706 98722 2e483e2 lstrcpyW 98721->98722 98723 2e4837f 98721->98723 98722->98717 98723->98717 98724->98702 98727 2e48357 RegOpenKeyExW 98726->98727 98727->98716 98727->98723 98728 7ffe013d62f9 98729 7ffe013d62ba 98728->98729 98744 7ffe013d631d 98728->98744 98746 7ffe013d612c 98729->98746 98868 7ffe013dfe90 HeapFree 98729->98868 98732 7ffe013d638a 98735 7ffe013d15b0 2 API calls 98732->98735 98733 7ffe013d776f 98871 7ffe013da6d0 48 API calls 98733->98871 98738 7ffe013d639c 98735->98738 98737 7ffe013d7edc 98739 7ffe013d1770 63 API calls 98737->98739 98740 7ffe0140b160 51 API calls 98738->98740 98741 7ffe013d7ee9 98739->98741 98742 7ffe013d63b6 98740->98742 98879 7ffe013d1660 HeapFree 98741->98879 98745 7ffe013d6427 98742->98745 98750 7ffe0140b300 61 API calls 98742->98750 98743 7ffe013ea430 53 API calls 98743->98746 98870 7ffe013db610 48 API calls 98744->98870 98752 7ffe013d7a22 98745->98752 98753 7ffe013d6433 98745->98753 98746->98732 98746->98733 98746->98743 98746->98744 98747 7ffe013d6204 memset 98746->98747 98866 7ffe013e9d80 HeapReAlloc HeapAlloc 98746->98866 98867 7ffe013dfe90 HeapFree 98746->98867 98747->98746 98763 7ffe013d6404 98750->98763 98751 7ffe013d7f20 98756 7ffe013d7ffa HeapFree 98751->98756 98757 7ffe013d814a 98751->98757 98872 7ffe013db610 48 API calls 98752->98872 98758 7ffe013d7787 98753->98758 98764 7ffe0141b7d0 HeapAlloc 98753->98764 98792 7ffe013d6468 HeapCreate HeapAlloc GetLastError 98753->98792 98756->98757 98880 7ffe013d1660 HeapFree 98757->98880 98853 7ffe013d7129 HeapFree 98758->98853 98873 7ffe013d8d80 48 API calls 98758->98873 98761 7ffe013d6eb2 98767 7ffe013d6ebd HeapFree 98761->98767 98768 7ffe013d6ece 98761->98768 98762 7ffe013d6573 memset 98766 7ffe013d65a8 98762->98766 98789 7ffe013d675c 98762->98789 98763->98745 98769 7ffe013d6b5a GetLastError 98763->98769 98770 7ffe013d6b3b 98763->98770 98771 7ffe013d645f 98764->98771 98765 7ffe013d8157 98778 7ffe013d8204 98765->98778 98786 7ffe013d81ff HeapFree 98765->98786 98787 7ffe013d8f90 50 API calls 98766->98787 98767->98768 98774 7ffe013d6ed9 HeapFree 98768->98774 98775 7ffe013d6eef 98768->98775 98769->98745 98776 7ffe013d6b72 HeapFree 98769->98776 98770->98753 98773 7ffe013d6b44 HeapFree 98770->98773 98771->98758 98771->98792 98772 7ffe013d6911 AddVectoredExceptionHandler NtQueryInformationProcess 98779 7ffe0141b7d0 HeapAlloc 98772->98779 98773->98753 98774->98775 98869 7ffe013d1930 CloseHandle HeapFree HeapFree HeapFree HeapFree 98775->98869 98776->98745 98838 7ffe013d6a6b 98776->98838 98784 7ffe013d8225 98778->98784 98785 7ffe013d820f HeapFree 98778->98785 98788 7ffe013d6979 98779->98788 98781 7ffe013d6efc 98790 7ffe013d6f1d 98781->98790 98791 7ffe013d6f07 HeapFree 98781->98791 98782 7ffe013d6cd2 HeapFree 98793 7ffe013d6d0c 98782->98793 98783 7ffe013d6e5e 98794 7ffe013d6de2 98783->98794 98795 7ffe013d6e70 HeapFree 98783->98795 98796 7ffe013d8246 98784->98796 98797 7ffe013d8230 HeapFree 98784->98797 98785->98784 98786->98778 98798 7ffe013d65ff 98787->98798 98799 7ffe013d7c0b 98788->98799 98800 7ffe013d6982 NtQuerySystemInformation 98788->98800 98789->98772 98801 7ffe013d8f90 50 API calls 98789->98801 98802 7ffe013d6f2d HeapFree 98790->98802 98803 7ffe013d6f3e 98790->98803 98791->98790 98792->98761 98792->98762 98806 7ffe013d6feb 98793->98806 98807 7ffe013d6d15 NtGetContextThread 98793->98807 98827 7ffe013d6da2 NtSetContextThread 98793->98827 98808 7ffe013d6e89 HeapFree 98794->98808 98812 7ffe013d6def 98794->98812 98795->98794 98809 7ffe013d824f 98796->98809 98814 7ffe013d845b HeapFree 98796->98814 98797->98796 98804 7ffe013d7c27 98798->98804 98805 7ffe013d6617 GetModuleHandleA 98798->98805 98874 7ffe013d8d80 48 API calls 98799->98874 98800->98794 98865 7ffe013d69b8 98800->98865 98811 7ffe013d67cd 98801->98811 98802->98803 98821 7ffe013d6f84 98803->98821 98824 7ffe013d6f71 HeapFree 98803->98824 98875 7ffe013db610 48 API calls 98804->98875 98813 7ffe013d6637 LoadLibraryA 98805->98813 98826 7ffe013d664b 98805->98826 98818 7ffe013d6ff3 HeapFree 98806->98818 98819 7ffe013d7004 98806->98819 98807->98793 98807->98794 98808->98812 98823 7ffe013d8583 98809->98823 98828 7ffe013d859b HeapFree 98809->98828 98815 7ffe013d7cbb 98811->98815 98816 7ffe013d67e5 GetModuleHandleA 98811->98816 98822 7ffe013d6ea2 memcpy 98812->98822 98813->98794 98813->98826 98814->98809 98877 7ffe013db610 48 API calls 98815->98877 98829 7ffe013d6827 98816->98829 98818->98819 98819->98744 98819->98822 98825 7ffe013d6f8f HeapFree 98821->98825 98831 7ffe013d6fa5 98821->98831 98822->98761 98834 7ffe013d87ff 98823->98834 98835 7ffe013d87ee HeapFree 98823->98835 98824->98803 98825->98831 98832 7ffe013d8f90 50 API calls 98826->98832 98827->98794 98833 7ffe013d6db1 NtClose 98827->98833 98828->98823 98830 7ffe013d8f90 50 API calls 98829->98830 98837 7ffe013d6885 98830->98837 98840 7ffe013d66d0 98832->98840 98833->98793 98881 7ffe013d19f0 HeapFree 98834->98881 98835->98834 98842 7ffe013d689d GetProcAddress 98837->98842 98843 7ffe013d7d02 98837->98843 98838->98782 98838->98783 98839 7ffe013d6ab0 NtOpenThread 98839->98865 98844 7ffe013d66e8 GetProcAddress 98840->98844 98845 7ffe013d7c71 98840->98845 98841 7ffe013d880c 98882 7ffe01424130 6 API calls 98841->98882 98848 7ffe013d6df4 98842->98848 98849 7ffe013d68c1 98842->98849 98843->98853 98878 7ffe013db610 48 API calls 98843->98878 98851 7ffe013d670c 98844->98851 98852 7ffe013d6dc2 98844->98852 98876 7ffe013db610 48 API calls 98845->98876 98858 7ffe013d6dfe HeapFree 98848->98858 98859 7ffe013d6e0f 98848->98859 98855 7ffe013d68ea 98849->98855 98856 7ffe013d68d9 HeapFree 98849->98856 98860 7ffe013d6724 HeapFree 98851->98860 98861 7ffe013d6735 98851->98861 98852->98794 98857 7ffe013d6dd1 HeapFree 98852->98857 98853->98737 98854 7ffe013d8814 98855->98772 98862 7ffe013d6900 HeapFree 98855->98862 98856->98855 98857->98794 98858->98859 98859->98808 98863 7ffe013d6e1d 98859->98863 98860->98861 98861->98789 98864 7ffe013d674b HeapFree 98861->98864 98862->98772 98863->98812 98864->98789 98865->98794 98865->98838 98865->98839 98866->98746 98867->98746 98868->98746 98869->98781 98879->98751 98880->98765 98881->98841 98882->98854 98883 28798fc 98885 2879914 98883->98885 98889 2879ec8 HeapCreate 98885->98889 98886 2879959 _cinit malloc _getptd _FF_MSGBANNER _RTC_Initialize 98891 2878580 98886->98891 98888 2879a37 98890 2879ef0 98889->98890 98890->98886 98892 2878591 PostThreadMessageA 98891->98892 98894 28785be 98892->98894 98898 28773d0 98894->98898 98896 28785c3 CreateThread 98897 28785f7 98896->98897 98903 28780e0 98896->98903 98897->98888 98901 28773e4 _vsprintf_s_l _wcsrev 98898->98901 98902 2877dbb _vsprintf_s_l 98898->98902 98899 2877d4d RegOpenKeyExW 98900 2877d8b RegQueryValueExW 98899->98900 98899->98902 98900->98902 98901->98899 98902->98896 98904 28798b0 98903->98904 98905 287810c SleepEx 98904->98905 98906 287812a 98905->98906 98908 287815e malloc 98906->98908 98911 2876f70 98906->98911 98909 2878285 SleepEx 98908->98909 98910 287832d SleepEx 98908->98910 98909->98908 98910->98908 98912 2876fb6 98911->98912 98915 2878650 HeapCreate 98912->98915 98914 2877067 98914->98908 98916 287868f free 98915->98916 98916->98914
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap
                                                                • String ID: $Could not find central directory endInvalid digital signature header$Could not read enough bytesinvalid seek to a negative or overflowing position$Support for multi-disk files is not implemented$a Display implementation returned an error unexpectedly$called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$not yet implemented
                                                                • API String ID: 3298025750-765076067
                                                                • Opcode ID: 1d7b2182e2761ad58c92f16e71d816018ba843f35fe0d732a67517d4beeda418
                                                                • Instruction ID: 7088686e016da0bfc155e754e1bafb66e8949e2001471766b6f446219e01fe1d
                                                                • Opcode Fuzzy Hash: 1d7b2182e2761ad58c92f16e71d816018ba843f35fe0d732a67517d4beeda418
                                                                • Instruction Fuzzy Hash: 07833A62A0DBC281EB718B15E8453AEB7A0FB84784F454136DACD4BBA9DF7CE445CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap$EnvironmentStrings
                                                                • String ID: .exeprogram not found$PATHlibrary\std\src\sys_common\process.rs$\?\\$]?\\$assertion failed: self.height > 0
                                                                • API String ID: 2767186067-2173948767
                                                                • Opcode ID: 5dfce2f5da29de61abe7f0af6273d13ec3530a41eacc7bf92622ec20ad482c57
                                                                • Instruction ID: 344b17b50192f5a338772b37a002f96689dc97b7486948690c3c67467fb1571e
                                                                • Opcode Fuzzy Hash: 5dfce2f5da29de61abe7f0af6273d13ec3530a41eacc7bf92622ec20ad482c57
                                                                • Instruction Fuzzy Hash: 12436A62A09BC288EB618F25D8407F927A1FB44B98F445136DE5D5FBB9DF7CA281C300
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Free$memset$AllocCreateErrorLast
                                                                • String ID: assertion failed: filled <= self.buf.init/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\core\src\io\borrowed_buf.rs$called `Result::unwrap()` on an `Err` value
                                                                • API String ID: 3318353824-3437382133
                                                                • Opcode ID: 2d39b9766449fbe861dd5c32b14cd98d66fa7b6e60d1cff0775a82d85c62fa5f
                                                                • Instruction ID: 2cdeef9845483a22c22423ccb0b7509e4b43789f305acf2feb15ca11ba49cf96
                                                                • Opcode Fuzzy Hash: 2d39b9766449fbe861dd5c32b14cd98d66fa7b6e60d1cff0775a82d85c62fa5f
                                                                • Instruction Fuzzy Hash: FCA25A62A0CBC681EB619B15F8413EAA3A1FB98784F454136DACD4BBB9DF7CE145C700

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1964 2e46790-2e4685d call 2e55378 call 2e57bb0 * 2 gethostname gethostbyname 1971 2e46901-2e46a4b MultiByteToWideChar * 2 GetLastInputInfo GetTickCount wsprintfW MultiByteToWideChar * 2 call 2e48a70 GetSystemInfo wsprintfW call 2e48180 call 2e48440 GetForegroundWindow 1964->1971 1972 2e46863-2e468ad inet_ntoa call 2e562f4 * 2 1964->1972 1985 2e46a63-2e46aa0 lstrlenW call 2e48310 1971->1985 1986 2e46a4d-2e46a5d GetWindowTextW 1971->1986 1972->1971 1982 2e468af 1972->1982 1984 2e468b2-2e468ff inet_ntoa call 2e562f4 * 2 1982->1984 1984->1971 1993 2e46aa2-2e46ab5 call 2e55560 1985->1993 1994 2e46aba-2e46af8 call 2e55560 lstrlenW call 2e48310 1985->1994 1986->1985 1993->1994 2000 2e46b12-2e46b52 call 2e6f148 GetProcAddress 1994->2000 2001 2e46afa-2e46b0d call 2e55560 1994->2001 2005 2e46b54-2e46b56 GetNativeSystemInfo 2000->2005 2006 2e46b58 GetSystemInfo 2000->2006 2001->2000 2007 2e46b5e-2e46b6b 2005->2007 2006->2007 2008 2e46b6d-2e46b75 2007->2008 2009 2e46b7b 2007->2009 2008->2009 2010 2e46b77-2e46b79 2008->2010 2011 2e46b80-2e46bde wsprintfW call 2e47f70 GetCurrentProcessId call 2e49af0 call 2e47a90 2009->2011 2010->2011 2018 2e46be7-2e46cf2 call 2e55560 call 2e47860 call 2e474f0 call 2e55a08 GetTickCount call 2e56370 call 2e562ac wsprintfW GetLocaleInfoW GetSystemDirectoryW GetCurrentHwProfileW 2011->2018 2019 2e46be0 2011->2019 2032 2e46cf4-2e46cfd 2018->2032 2033 2e46cff 2018->2033 2019->2018 2034 2e46d08-2e46d75 call 2e46d80 call 2e54cac call 2e54cd0 2032->2034 2033->2034
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Info$ByteCharMultiSystemWidewsprintf$CountCurrentTickWindow_errnoinet_ntoalstrlen$AddressDirectoryForegroundHandleInputLastLocaleModuleNativeProcProcessProfileText_invalid_parameter_noinfo_localtime64gethostbynamegethostnamemalloc
                                                                • String ID: %d min$1.0$2024.12.23$AppEvents$GROUP$GetNativeSystemInfo$Network$REMARK$X64$X64 %s$kernel32.dll$x64$x86
                                                                • API String ID: 1661628823-2134117089
                                                                • Opcode ID: 122f8fed04f656ffedd24d25d979499a4dac23aeb6196086108b6fd699c96e62
                                                                • Instruction ID: 9c18439f8d7c8a8e1d8e1aa584fd86fd468135f348bd9a931710c5654a420297
                                                                • Opcode Fuzzy Hash: 122f8fed04f656ffedd24d25d979499a4dac23aeb6196086108b6fd699c96e62
                                                                • Instruction Fuzzy Hash: 5FF19B32344A82A6EB18DF60F8483DD77B5F788788F809126DA4E53B64DF38C669C740

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 2042 2e515c0-2e51624 call 2e56498 Sleep 2045 2e51655-2e5165c 2042->2045 2046 2e51626-2e5164f call 2e55378 call 2e5576c CloseHandle 2042->2046 2047 2e51663-2e516f4 GetLocalTime wsprintfW SetUnhandledExceptionFilter call 2e5576c CloseHandle call 2e55378 2045->2047 2048 2e5165e call 2e48c80 2045->2048 2046->2045 2058 2e516f6-2e51701 call 2e43200 2047->2058 2059 2e51703 2047->2059 2048->2047 2061 2e51706-2e51718 call 2e55378 2058->2061 2059->2061 2065 2e51727 2061->2065 2066 2e5171a-2e5171d call 2e4c1a0 2061->2066 2068 2e5172a-2e5172f 2065->2068 2069 2e51722-2e51725 2066->2069 2070 2e51730-2e51748 call 2e431e0 2068->2070 2069->2068 2073 2e51777-2e5179b call 2e55560 * 2 2070->2073 2074 2e5174a-2e51775 call 2e55560 * 2 2070->2074 2083 2e517a2-2e517ca 2073->2083 2074->2083 2084 2e51816-2e51820 2083->2084 2085 2e517cc-2e5180f call 2e431e0 call 2e55560 * 2 2083->2085 2087 2e51822-2e51827 2084->2087 2088 2e5182e-2e51847 2084->2088 2085->2084 2087->2088 2090 2e51899-2e518c5 call 2e56498 2088->2090 2091 2e51849-2e51865 EnumWindows 2088->2091 2102 2e518d7-2e51997 call 2e56498 CreateEventA call 2e55560 RegOpenKeyExW 2090->2102 2103 2e518c7-2e518d2 Sleep 2090->2103 2091->2090 2095 2e51867 2091->2095 2096 2e51870-2e51897 Sleep EnumWindows 2095->2096 2096->2090 2096->2096 2109 2e519a9 2102->2109 2110 2e51999-2e519a3 call 2e4fc40 2102->2110 2103->2070 2111 2e519b0-2e519ba 2109->2111 2113 2e519a8 2110->2113 2114 2e51a36-2e51a44 call 2e46790 2111->2114 2115 2e519bc-2e519fd Sleep RegOpenKeyExW 2111->2115 2113->2109 2120 2e51a49-2e51a4c 2114->2120 2116 2e519ff-2e51a22 RegQueryValueExW 2115->2116 2117 2e51a28-2e51a2d 2115->2117 2116->2117 2117->2111 2119 2e51a2f 2117->2119 2119->2114 2121 2e51a60-2e51a67 2120->2121 2122 2e51a4e-2e51a5b 2120->2122 2123 2e51a69-2e51a88 call 2e5576c 2121->2123 2124 2e51a8b-2e51a8e 2121->2124 2131 2e51b32-2e51b48 CloseHandle 2122->2131 2123->2124 2125 2e51a90-2e51a97 2124->2125 2129 2e51aec-2e51b00 2125->2129 2130 2e51a99-2e51aa9 Sleep 2125->2130 2135 2e51b17-2e51b31 call 2e56498 Sleep 2129->2135 2136 2e51b02-2e51b11 WaitForSingleObject CloseHandle 2129->2136 2130->2125 2132 2e51aab-2e51ab2 2130->2132 2131->2070 2132->2129 2133 2e51ab4-2e51ac7 2132->2133 2140 2e51ade-2e51aea Sleep 2133->2140 2141 2e51ac9-2e51ad8 WaitForSingleObject CloseHandle 2133->2141 2135->2131 2136->2135 2140->2131 2141->2140
                                                                APIs
                                                                • Sleep.KERNEL32 ref: 02E51614
                                                                • CloseHandle.KERNEL32 ref: 02E5164F
                                                                  • Part of subcall function 02E55560: _errno.LIBCMT ref: 02E5557F
                                                                  • Part of subcall function 02E55560: _invalid_parameter_noinfo.LIBCMT ref: 02E5558B
                                                                  • Part of subcall function 02E55560: _errno.LIBCMT ref: 02E555BB
                                                                • GetLocalTime.KERNEL32 ref: 02E51668
                                                                • wsprintfW.USER32 ref: 02E516AE
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 02E516BB
                                                                • CloseHandle.KERNEL32 ref: 02E516E1
                                                                • EnumWindows.USER32 ref: 02E5185A
                                                                  • Part of subcall function 02E55378: malloc.LIBCMT ref: 02E55392
                                                                  • Part of subcall function 02E5576C: _errno.LIBCMT ref: 02E55797
                                                                  • Part of subcall function 02E5576C: _invalid_parameter_noinfo.LIBCMT ref: 02E557A2
                                                                • Sleep.KERNEL32 ref: 02E51875
                                                                • EnumWindows.USER32 ref: 02E5188C
                                                                • Sleep.KERNEL32 ref: 02E518CC
                                                                • CreateEventA.KERNEL32 ref: 02E51921
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E5198F
                                                                • Sleep.KERNEL32 ref: 02E519C1
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E519F5
                                                                • RegQueryValueExW.ADVAPI32 ref: 02E51A22
                                                                • Sleep.KERNEL32 ref: 02E51A9E
                                                                • WaitForSingleObject.KERNEL32 ref: 02E51ACF
                                                                • CloseHandle.KERNEL32 ref: 02E51AD8
                                                                • Sleep.KERNEL32 ref: 02E51AE3
                                                                  • Part of subcall function 02E5576C: _getptd.LIBCMT ref: 02E557C8
                                                                  • Part of subcall function 02E5576C: CreateThread.KERNEL32 ref: 02E5581D
                                                                  • Part of subcall function 02E5576C: GetLastError.KERNEL32 ref: 02E55828
                                                                  • Part of subcall function 02E5576C: free.LIBCMT ref: 02E55833
                                                                • WaitForSingleObject.KERNEL32 ref: 02E51B08
                                                                • CloseHandle.KERNEL32 ref: 02E51B11
                                                                • Sleep.KERNEL32 ref: 02E51B2B
                                                                • CloseHandle.KERNEL32 ref: 02E51B42
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Sleep$CloseHandle$_errno$CreateEnumObjectOpenSingleWaitWindows_invalid_parameter_noinfo$ErrorEventExceptionFilterLastLocalQueryThreadTimeUnhandledValue_getptdfreemallocwsprintf
                                                                • String ID: %4d.%2d.%2d-%2d:%2d:%2d$127.0.0.1$23.235.165.54$23.235.165.54$23.235.165.54$6666$8888$8888$Console$Console\1$IpDatespecial
                                                                • API String ID: 3428909306-2695204012
                                                                • Opcode ID: 34ca53d58691d4d6b77f75a5af062a653cd39c481d55b8bdfed8d27cbe8b0b01
                                                                • Instruction ID: a0d4e3c6df304a0661836b94616d3c4b90ce06cef530afecbceea9d1a3286b75
                                                                • Opcode Fuzzy Hash: 34ca53d58691d4d6b77f75a5af062a653cd39c481d55b8bdfed8d27cbe8b0b01
                                                                • Instruction Fuzzy Hash: 06E15C326A5BD0C6EB10DF25F84839977A5F785B89F809126EE8E47AA4DF3CC544CB10

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: MetricsSystem$Object$Delete$Release$CapsCompatibleCreateDeviceStretch$BitmapBitsDesktopModeSelectWindowmalloc
                                                                • String ID: $gfff$gfff
                                                                • API String ID: 1524144516-4202476792
                                                                • Opcode ID: 13dd4c7c1d2cbe625612e10cc7ad245c133778d1992cad39df60de0e299c626f
                                                                • Instruction ID: 6ece48d3f3415111c439134adff5c7fa7bf03dc3c3466cb2b9550cb72b90796c
                                                                • Opcode Fuzzy Hash: 13dd4c7c1d2cbe625612e10cc7ad245c133778d1992cad39df60de0e299c626f
                                                                • Instruction Fuzzy Hash: 66C1BF32714B408AE715DF72F41835D73B2BBA9B88F049226DE0A6BB58EF38D485C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap
                                                                • String ID:
                                                                • API String ID: 3298025750-0
                                                                • Opcode ID: 4d4451614b536c495e735d598b063294f968a1afea2c43f30dd8b326bb227dcc
                                                                • Instruction ID: 213033cc88fa0b59bc1c4d1984d577ca3a707a681da7899cfb3ee62efeecbe1d
                                                                • Opcode Fuzzy Hash: 4d4451614b536c495e735d598b063294f968a1afea2c43f30dd8b326bb227dcc
                                                                • Instruction Fuzzy Hash: 22427D72A0DBC681EB61DB12F8513AAA7A1FB98784F454136DACD4B7A9DF7CE044C700
                                                                APIs
                                                                Strings
                                                                • Could not find central directory endInvalid digital signature header, xrefs: 00007FFE013D487C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap$CloseHandle$FilePointer
                                                                • String ID: Could not find central directory endInvalid digital signature header
                                                                • API String ID: 3729840729-3300676640
                                                                • Opcode ID: 76405ca92ebde2537bc6a3168250b5e8723cf425ba05093c219c2f78231ca4a8
                                                                • Instruction ID: 517a7de1f2f6b93e2597894de340c6eb4b2e388a1d068bc81380af7a3e7016ef
                                                                • Opcode Fuzzy Hash: 76405ca92ebde2537bc6a3168250b5e8723cf425ba05093c219c2f78231ca4a8
                                                                • Instruction Fuzzy Hash: 5C724B62A0D7C280FB758B11E8987BEA7A0FB94784F414135DACD4ABE9EF7CD1448B00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: OpenQueryValue_wcsrev
                                                                • String ID: 1$|$|$|$|$|$|$|$|$|$|$|$|$|$|
                                                                • API String ID: 2336627112-483243098
                                                                • Opcode ID: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
                                                                • Instruction ID: 6e434ee5842435468fcce2f26e078513ad23061993502125415224742910b75c
                                                                • Opcode Fuzzy Hash: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
                                                                • Instruction Fuzzy Hash: 2F824B3C7649598BDB2D6F2899842F9B392F79130AB54C57EC487C3065EF78C486CB82

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWidelstrlen$EventResetTimeconnectgethostbynamehtonssockettime
                                                                • String ID: 0u
                                                                • API String ID: 950253168-3203441087
                                                                • Opcode ID: c675cf8a70220d83b9f5f9eeca867539601b1c5dcc2814c4a89447bde27aa509
                                                                • Instruction ID: 3a6a164535aa7db64e3114e7449182a0613150735d3283505c0830940dbf43f7
                                                                • Opcode Fuzzy Hash: c675cf8a70220d83b9f5f9eeca867539601b1c5dcc2814c4a89447bde27aa509
                                                                • Instruction Fuzzy Hash: 6D714972218BC186D720CF61F44839AB7A5F788B98F505229EB8A57F68DF3CD149CB44

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3502 7ffe013e0170-7ffe013e0182 3503 7ffe013e024c-7ffe013e0263 call 7ffe013ecbc0 TlsGetValue 3502->3503 3504 7ffe013e0188-7ffe013e0193 TlsGetValue 3502->3504 3506 7ffe013e0199 3503->3506 3513 7ffe013e0269 3503->3513 3505 7ffe013e0437-7ffe013e0441 3504->3505 3504->3506 3508 7ffe013e0245-7ffe013e0247 3506->3508 3509 7ffe013e019f-7ffe013e01c9 BCryptGenRandom 3506->3509 3508->3505 3511 7ffe013e01cb-7ffe013e01e1 SystemFunction036 3509->3511 3512 7ffe013e01ef-7ffe013e020d 3509->3512 3511->3512 3514 7ffe013e01e3-7ffe013e01e9 3511->3514 3515 7ffe013e020f-7ffe013e021c 3512->3515 3516 7ffe013e026e-7ffe013e0280 call 7ffe01420420 3512->3516 3513->3505 3514->3512 3517 7ffe013e0492-7ffe013e04a8 call 7ffe0141b7d0 3514->3517 3518 7ffe013e0282-7ffe013e0291 call 7ffe013e2a70 3515->3518 3519 7ffe013e021e-7ffe013e0243 3515->3519 3516->3518 3516->3519 3527 7ffe013e04aa-7ffe013e04b4 call 7ffe013d8de0 3517->3527 3528 7ffe013e04b9-7ffe013e0536 call 7ffe013d99c0 3517->3528 3522 7ffe013e0296-7ffe013e02cf call 7ffe0141b7d0 3518->3522 3519->3522 3532 7ffe013e02d5-7ffe013e03c3 call 7ffe0141b7d0 3522->3532 3533 7ffe013e046f-7ffe013e0479 call 7ffe013d8de0 3522->3533 3527->3528 3534 7ffe013e053b-7ffe013e0550 3528->3534 3540 7ffe013e047e-7ffe013e048d call 7ffe013d8de0 3532->3540 3541 7ffe013e03c9-7ffe013e03e2 3532->3541 3533->3540 3537 7ffe013e0557-7ffe013e055c 3534->3537 3538 7ffe013e0552 3534->3538 3542 7ffe013e057a-7ffe013e0587 call 7ffe01424130 3537->3542 3543 7ffe013e055e-7ffe013e0563 3537->3543 3538->3537 3540->3534 3545 7ffe013e0442-7ffe013e0450 call 7ffe013ecbc0 3541->3545 3546 7ffe013e03e4 3541->3546 3557 7ffe013e0589-7ffe013e058e 3542->3557 3558 7ffe013e05a5-7ffe013e05d2 call 7ffe013dbb00 call 7ffe013e0150 call 7ffe01424130 3542->3558 3547 7ffe013e0569-7ffe013e0575 HeapFree 3543->3547 3548 7ffe013e0565 3543->3548 3552 7ffe013e03e6-7ffe013e03f6 TlsGetValue 3545->3552 3546->3552 3547->3542 3548->3547 3555 7ffe013e03f8-7ffe013e0405 TlsSetValue 3552->3555 3556 7ffe013e0452-7ffe013e046b call 7ffe013ecbc0 TlsSetValue 3552->3556 3563 7ffe013e0407-7ffe013e040d 3555->3563 3564 7ffe013e0434 3555->3564 3556->3563 3570 7ffe013e046d 3556->3570 3559 7ffe013e0594-7ffe013e05a0 HeapFree 3557->3559 3560 7ffe013e0590 3557->3560 3575 7ffe013e05d8-7ffe013e05e0 call 7ffe013ecbc0 3558->3575 3576 7ffe013e05d4-7ffe013e05d6 3558->3576 3559->3558 3560->3559 3567 7ffe013e0423-7ffe013e042f HeapFree 3563->3567 3568 7ffe013e040f-7ffe013e0413 3563->3568 3564->3505 3567->3564 3568->3567 3571 7ffe013e0415-7ffe013e041e HeapFree 3568->3571 3570->3564 3571->3567 3577 7ffe013e05e2-7ffe013e05f2 TlsSetValue 3575->3577 3576->3577 3580 7ffe013e0608-7ffe013e061e HeapFree 3577->3580 3581 7ffe013e05f4-7ffe013e05f8 3577->3581 3582 7ffe013e0624-7ffe013e062c call 7ffe013ecbc0 3580->3582 3583 7ffe013e0620-7ffe013e0622 3580->3583 3581->3580 3584 7ffe013e05fa-7ffe013e0603 HeapFree 3581->3584 3585 7ffe013e062e-7ffe013e063c TlsSetValue 3582->3585 3583->3585 3584->3580
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Value$FreeHeap$CryptFunction036RandomSystem
                                                                • String ID:
                                                                • API String ID: 624231926-0
                                                                • Opcode ID: 96881aa8be81bc6c9a06c0c58ef5cacd55f85cad4fd9d0310701fa939e61b36d
                                                                • Instruction ID: daca0eadcb1decfa5d187024d5cc0bcb644c27f2ac3f7ded7a8c620cd6236d33
                                                                • Opcode Fuzzy Hash: 96881aa8be81bc6c9a06c0c58ef5cacd55f85cad4fd9d0310701fa939e61b36d
                                                                • Instruction Fuzzy Hash: 0FD19C21A0CBC281F72A9B25A4013F9A3E1FFA4754F455135EA8C1A7BAEF7CE5858700
                                                                APIs
                                                                Strings
                                                                • Could not find central directory endInvalid digital signature header, xrefs: 00007FFE013D487C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FilePointer$CloseHandleObjectSingleWait
                                                                • String ID: Could not find central directory endInvalid digital signature header
                                                                • API String ID: 3992305260-3300676640
                                                                • Opcode ID: 036b575cc89000b2fd40ffa735cc0d0fb344bb2fd8885059b496147cbebe2792
                                                                • Instruction ID: 881d3d6f381ad04254f24c61709bfabc9c6ef2b6bb665388363276645a090225
                                                                • Opcode Fuzzy Hash: 036b575cc89000b2fd40ffa735cc0d0fb344bb2fd8885059b496147cbebe2792
                                                                • Instruction Fuzzy Hash: DD523962A0D7D280FB758B11E8987BEA7A0FB94784F414135DA8C4BBE9EF7CD1458B00
                                                                APIs
                                                                Strings
                                                                • Could not find central directory endInvalid digital signature header, xrefs: 00007FFE013D487C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap$ErrorFileLastPointer$CloseHandle
                                                                • String ID: Could not find central directory endInvalid digital signature header
                                                                • API String ID: 3659737114-3300676640
                                                                • Opcode ID: 34bb2e9324b9c136921aafcc7062f9037ab6217559ecc4926c0ca6934dd32b7d
                                                                • Instruction ID: 3cc70720171d3a0450a89bbe3cf54a247b53eb9e1d9bf59f35fe0ffab2f0bce8
                                                                • Opcode Fuzzy Hash: 34bb2e9324b9c136921aafcc7062f9037ab6217559ecc4926c0ca6934dd32b7d
                                                                • Instruction Fuzzy Hash: CB523862A0D7D280FB758B11E8987BEA7A0FB94784F414135DACD0BBA9EF7CD1458B00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 4580 2e5ff94-2e5ffdc call 2e62cbc call 2e60d78 call 2e60d30 4587 2e5ffe2-2e5fff1 call 2e60cd0 4580->4587 4588 2e603ed-2e60401 call 2e5c310 4580->4588 4594 2e5fff7-2e60006 call 2e60d00 4587->4594 4595 2e603d9-2e603e8 call 2e5c310 4587->4595 4593 2e60402-2e60411 4588->4593 4599 2e603c5-2e603d4 call 2e5c310 4594->4599 4600 2e6000c-2e60043 call 2e5a770 call 2e67620 4594->4600 4595->4588 4599->4595 4606 2e600da-2e600e4 4600->4606 4607 2e60049-2e6004c 4600->4607 4609 2e600e6-2e600eb call 2e55280 4606->4609 4610 2e600f2-2e60102 GetTimeZoneInformation 4606->4610 4607->4606 4608 2e60052-2e6005c 4607->4608 4611 2e60082-2e6009d call 2e573e0 call 2e5a7e0 4608->4611 4612 2e6005e-2e6006b call 2e5b980 4608->4612 4609->4610 4614 2e60108-2e60130 4610->4614 4615 2e60229 4610->4615 4611->4615 4641 2e600a3-2e600c0 call 2e573e0 call 2e5ba30 4611->4641 4612->4615 4627 2e60071-2e6007b 4612->4627 4620 2e60132-2e60139 4614->4620 4621 2e60140-2e60148 4614->4621 4618 2e6022e-2e60264 call 2e60d70 call 2e60d60 call 2e60d68 call 2e62bbc 4615->4618 4618->4593 4653 2e6026a-2e60282 call 2e62774 4618->4653 4620->4621 4625 2e6016d-2e60175 4621->4625 4626 2e6014a-2e60152 4621->4626 4631 2e6017d-2e601b7 WideCharToMultiByte 4625->4631 4626->4625 4630 2e60154-2e6016b 4626->4630 4627->4611 4634 2e6007d call 2e55280 4627->4634 4630->4631 4632 2e601cd-2e601d1 4631->4632 4633 2e601b9-2e601c1 4631->4633 4638 2e601d4-2e6020a WideCharToMultiByte 4632->4638 4633->4632 4637 2e601c3-2e601cb 4633->4637 4634->4611 4637->4638 4642 2e60221-2e60226 4638->4642 4643 2e6020c-2e60214 4638->4643 4641->4618 4654 2e600c6-2e600d5 call 2e5c310 4641->4654 4642->4615 4643->4642 4646 2e60216-2e6021f 4643->4646 4646->4615 4658 2e603b0-2e603c4 call 2e5c310 4653->4658 4659 2e60288-2e6028e 4653->4659 4654->4606 4658->4599 4660 2e60297-2e602b3 call 2e67614 4659->4660 4661 2e60290-2e60294 4659->4661 4666 2e602b6-2e602ba 4660->4666 4661->4660 4667 2e602c0-2e602c2 4666->4667 4668 2e603a8-2e603ab 4666->4668 4669 2e602c4-2e602c7 4667->4669 4670 2e602cd-2e602d0 4667->4670 4668->4666 4669->4668 4669->4670 4671 2e60336-2e60339 4670->4671 4672 2e602d2-2e602f3 call 2e67614 4670->4672 4673 2e60346-2e60352 4671->4673 4674 2e6033b-2e6033e 4671->4674 4679 2e602fd-2e60301 4672->4679 4676 2e60354-2e6036b call 2e62774 4673->4676 4677 2e60382-2e60387 4673->4677 4674->4673 4680 2e6038a-2e603a6 call 2e60d70 call 2e60d60 4676->4680 4686 2e6036d-2e60381 call 2e5c310 4676->4686 4677->4680 4682 2e602f5-2e602f8 4679->4682 4683 2e60303-2e60306 4679->4683 4680->4593 4682->4683 4687 2e602fa 4682->4687 4683->4671 4688 2e60308-2e60326 call 2e67614 4683->4688 4686->4677 4687->4679 4696 2e60330-2e60334 4688->4696 4696->4671 4697 2e60328-2e6032b 4696->4697 4697->4671 4698 2e6032d 4697->4698 4698->4696
                                                                APIs
                                                                • _lock.LIBCMT ref: 02E5FFBF
                                                                  • Part of subcall function 02E62CBC: _amsg_exit.LIBCMT ref: 02E62CE6
                                                                • _get_daylight.LIBCMT ref: 02E5FFD5
                                                                  • Part of subcall function 02E60D30: _errno.LIBCMT ref: 02E60D39
                                                                  • Part of subcall function 02E60D30: _invalid_parameter_noinfo.LIBCMT ref: 02E60D44
                                                                • _get_daylight.LIBCMT ref: 02E5FFEA
                                                                  • Part of subcall function 02E60CD0: _errno.LIBCMT ref: 02E60CD9
                                                                  • Part of subcall function 02E60CD0: _invalid_parameter_noinfo.LIBCMT ref: 02E60CE4
                                                                • _get_daylight.LIBCMT ref: 02E5FFFF
                                                                  • Part of subcall function 02E60D00: _errno.LIBCMT ref: 02E60D09
                                                                  • Part of subcall function 02E60D00: _invalid_parameter_noinfo.LIBCMT ref: 02E60D14
                                                                • ___lc_codepage_func.LIBCMT ref: 02E6000C
                                                                  • Part of subcall function 02E5A770: _getptd.LIBCMT ref: 02E5A774
                                                                  • Part of subcall function 02E67620: __wtomb_environ.LIBCMT ref: 02E67650
                                                                • free.LIBCMT ref: 02E6007D
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                • free.LIBCMT ref: 02E600E6
                                                                • GetTimeZoneInformation.KERNEL32 ref: 02E600F9
                                                                • WideCharToMultiByte.KERNEL32 ref: 02E601AF
                                                                • WideCharToMultiByte.KERNEL32 ref: 02E60202
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_get_daylight_invalid_parameter_noinfo$ByteCharMultiWidefree$ErrorFreeHeapInformationLastTimeZone___lc_codepage_func__wtomb_environ_amsg_exit_getptd_lock
                                                                • String ID: Eastern Standard Time$Eastern Summer Time
                                                                • API String ID: 2532449802-239921721
                                                                • Opcode ID: 0c97cee6d145cff3ac5e51c77ab776f690a74dde89f2690ff405645e1eb8e359
                                                                • Instruction ID: 274903a41e6e04e656fc22af4b1bb27c0985c8753b74ef759218f627ae253abd
                                                                • Opcode Fuzzy Hash: 0c97cee6d145cff3ac5e51c77ab776f690a74dde89f2690ff405645e1eb8e359
                                                                • Instruction Fuzzy Hash: C8B1D2322D47E08ADB24DF25E49877A7BA6F7857C8F44E125AA8E53B65DF38C411CB00

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 4699 2e474f0-2e47562 call 2e57bb0 call 2e55ea4 4704 2e47564-2e4756e 4699->4704 4705 2e475e3-2e4760e CoCreateInstance 4699->4705 4706 2e47571-2e47574 call 2e47400 4704->4706 4707 2e47614-2e47664 4705->4707 4708 2e477da-2e477e5 lstrlenW 4705->4708 4714 2e47579-2e4757b 4706->4714 4719 2e477ca-2e477d2 4707->4719 4720 2e4766a-2e47682 4707->4720 4709 2e477e7-2e477f7 lstrcatW 4708->4709 4710 2e477f8-2e47800 4708->4710 4709->4710 4712 2e47802 4710->4712 4713 2e47808-2e4783a call 2e54cd0 4710->4713 4712->4713 4717 2e475c1-2e475e1 call 2e55ea4 4714->4717 4718 2e4757d-2e47587 call 2e4a550 4714->4718 4717->4705 4717->4706 4729 2e475a3-2e475bb lstrcatW * 2 4718->4729 4730 2e47589-2e47590 call 2e4a900 4718->4730 4719->4708 4724 2e477d4 4719->4724 4720->4719 4728 2e47688 4720->4728 4724->4708 4732 2e47690-2e47732 call 2e57bb0 wsprintfW RegOpenKeyExW 4728->4732 4729->4717 4730->4729 4735 2e47592-2e4759c call 2e4a600 4730->4735 4738 2e47734-2e47780 call 2e57bb0 RegQueryValueExW 4732->4738 4739 2e477ac-2e477bb 4732->4739 4735->4729 4742 2e4759e call 2e4a800 4735->4742 4746 2e477a2-2e477a6 RegCloseKey 4738->4746 4747 2e47782-2e4779c lstrcatW * 2 4738->4747 4744 2e477c2-2e477c4 4739->4744 4742->4729 4744->4719 4744->4732 4746->4739 4747->4746
                                                                APIs
                                                                • lstrcatW.KERNEL32 ref: 02E475AB
                                                                • lstrcatW.KERNEL32 ref: 02E475BB
                                                                  • Part of subcall function 02E4A900: GetCurrentProcess.KERNEL32 ref: 02E4A917
                                                                  • Part of subcall function 02E4A900: OpenProcessToken.ADVAPI32 ref: 02E4A928
                                                                  • Part of subcall function 02E4A900: LookupPrivilegeValueW.ADVAPI32 ref: 02E4A948
                                                                  • Part of subcall function 02E4A900: AdjustTokenPrivileges.ADVAPI32 ref: 02E4A970
                                                                  • Part of subcall function 02E4A900: GetLastError.KERNEL32 ref: 02E4A976
                                                                  • Part of subcall function 02E4A900: CloseHandle.KERNEL32 ref: 02E4A986
                                                                  • Part of subcall function 02E4A600: CreateToolhelp32Snapshot.KERNEL32 ref: 02E4A637
                                                                • CoCreateInstance.OLE32 ref: 02E47606
                                                                • wsprintfW.USER32 ref: 02E47703
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E4772A
                                                                • RegQueryValueExW.ADVAPI32 ref: 02E47778
                                                                • lstrcatW.KERNEL32 ref: 02E4778C
                                                                • lstrcatW.KERNEL32 ref: 02E4779C
                                                                • RegCloseKey.ADVAPI32 ref: 02E477A6
                                                                  • Part of subcall function 02E47400: CreateToolhelp32Snapshot.KERNEL32 ref: 02E47441
                                                                  • Part of subcall function 02E47400: Process32FirstW.KERNEL32 ref: 02E47460
                                                                  • Part of subcall function 02E47400: Process32NextW.KERNEL32 ref: 02E474A0
                                                                  • Part of subcall function 02E47400: CloseHandle.KERNEL32 ref: 02E474AD
                                                                • lstrlenW.KERNEL32 ref: 02E477DD
                                                                • lstrcatW.KERNEL32 ref: 02E477F1
                                                                  • Part of subcall function 02E4A550: GetModuleHandleA.KERNEL32 ref: 02E4A55D
                                                                  • Part of subcall function 02E4A550: GetProcAddress.KERNEL32 ref: 02E4A575
                                                                  • Part of subcall function 02E4A550: GetProcAddress.KERNEL32 ref: 02E4A58C
                                                                  • Part of subcall function 02E4A550: GetProcAddress.KERNEL32 ref: 02E4A5A3
                                                                Strings
                                                                • CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}, xrefs: 02E476F8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrcat$AddressCloseCreateHandleProc$OpenProcessProcess32SnapshotTokenToolhelp32Value$AdjustCurrentErrorFirstInstanceLastLookupModuleNextPrivilegePrivilegesQuerylstrlenwsprintf
                                                                • String ID: CLSID\{%.8X-%.4X-%.4X-%.2X%.2X-%.2X%.2X%.2X%.2X%.2X%.2X}
                                                                • API String ID: 1729154408-4035668053
                                                                • Opcode ID: 1d2b676108bdf634e983210c69edc8232fb219044d9aa69fb5ef76e773f646e8
                                                                • Instruction ID: db1c5d4b4e7686e3cdbc123892969e2142933b17fba82b04c6148ecc6f030451
                                                                • Opcode Fuzzy Hash: 1d2b676108bdf634e983210c69edc8232fb219044d9aa69fb5ef76e773f646e8
                                                                • Instruction Fuzzy Hash: 79917872744B808AEB10CF66E85879D7BB1FB88B98F409116DE8D5BB68DF38C505CB40

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 4748 7ffe01417c90-7ffe01417ce5 4749 7ffe01417cf0-7ffe01417d02 GetCurrentProcessId 4748->4749 4750 7ffe01417d04 4749->4750 4751 7ffe01417d38-7ffe01417db5 call 7ffe013d9320 4749->4751 4752 7ffe01417d10-7ffe01417d36 ProcessPrng 4750->4752 4755 7ffe01417db7-7ffe01417dc7 HeapFree 4751->4755 4756 7ffe01417dcc-7ffe01417df6 4751->4756 4752->4751 4752->4752 4755->4756 4757 7ffe01417e10-7ffe01417e25 4756->4757 4758 7ffe01417df8-7ffe01417dff 4756->4758 4761 7ffe01417ee4-7ffe01417ef8 call 7ffe0141b7d0 4757->4761 4759 7ffe01417e30-7ffe01417e42 4758->4759 4760 7ffe01417e01-7ffe01417e05 4758->4760 4763 7ffe01417e44-7ffe01417e55 4759->4763 4764 7ffe01417e85-7ffe01417e8e 4759->4764 4762 7ffe01417e91-7ffe01417e94 4760->4762 4770 7ffe01417efe-7ffe01417f16 4761->4770 4771 7ffe01418378-7ffe0141837d 4761->4771 4769 7ffe01417e96-7ffe01417ed6 4762->4769 4767 7ffe01417e5b-7ffe01417e7e 4763->4767 4768 7ffe014181cc-7ffe014181df 4763->4768 4764->4762 4767->4762 4772 7ffe01417e80 4767->4772 4768->4762 4775 7ffe014181e5-7ffe0141820e 4768->4775 4773 7ffe01418381-7ffe0141838b call 7ffe013d8d80 4769->4773 4774 7ffe01417edc-7ffe01417ee0 4769->4774 4776 7ffe01417f31-7ffe01417f34 4770->4776 4771->4773 4772->4775 4780 7ffe01418390-7ffe0141839b 4773->4780 4774->4761 4775->4769 4778 7ffe01417fa0-7ffe01417fa5 4776->4778 4779 7ffe01417f36-7ffe01417f3a 4776->4779 4785 7ffe01418110-7ffe01418153 call 7ffe01423d2c 4778->4785 4786 7ffe01417fab-7ffe01417fbe 4778->4786 4781 7ffe01417f80-7ffe01417f84 4779->4781 4782 7ffe01417f3c-7ffe01417f3e 4779->4782 4783 7ffe014183da-7ffe014183e8 4780->4783 4784 7ffe0141839d-7ffe014183d5 HeapFree 4780->4784 4781->4778 4792 7ffe01417f86-7ffe01417f8d 4781->4792 4788 7ffe01417f41-7ffe01417f44 4782->4788 4789 7ffe014183f8-7ffe014183fb 4783->4789 4790 7ffe014183ea-7ffe014183f3 HeapFree 4783->4790 4784->4783 4808 7ffe01418286-7ffe01418289 4785->4808 4809 7ffe01418159-7ffe01418173 GetLastError 4785->4809 4793 7ffe01418020-7ffe01418026 4786->4793 4794 7ffe01417fc0-7ffe01417fc6 4786->4794 4797 7ffe01417f20-7ffe01417f23 4788->4797 4798 7ffe01417f46-7ffe01417f74 4788->4798 4799 7ffe01418405-7ffe0141840e call 7ffe01424130 4789->4799 4800 7ffe014183fd-7ffe01418400 CloseHandle 4789->4800 4790->4789 4801 7ffe01418062-7ffe01418073 4792->4801 4802 7ffe01417f93-7ffe01417f98 4792->4802 4795 7ffe01417f26-7ffe01417f2e 4793->4795 4803 7ffe0141836f 4794->4803 4804 7ffe01417fcc-7ffe0141800e 4794->4804 4795->4776 4797->4795 4798->4794 4800->4799 4810 7ffe014180b3-7ffe014180bf 4801->4810 4811 7ffe01418075-7ffe01418085 4801->4811 4802->4788 4807 7ffe01418371-7ffe01418376 call 7ffe013d8d80 4803->4807 4805 7ffe01418010-7ffe0141801d 4804->4805 4806 7ffe0141802b 4804->4806 4813 7ffe0141802d-7ffe0141804a call 7ffe013f24e0 4805->4813 4806->4813 4807->4780 4817 7ffe0141828b-7ffe01418297 HeapFree 4808->4817 4818 7ffe0141829c-7ffe014182f4 call 7ffe0140adf0 4808->4818 4815 7ffe01418213-7ffe0141822c 4809->4815 4816 7ffe01418179-7ffe0141817c 4809->4816 4820 7ffe014180c6-7ffe014180d9 4810->4820 4819 7ffe01418087-7ffe014180aa 4811->4819 4811->4820 4839 7ffe01418361-7ffe0141836d 4813->4839 4840 7ffe01418050-7ffe0141805d 4813->4840 4822 7ffe0141823f-7ffe0141824d 4815->4822 4823 7ffe0141822e-7ffe0141823a HeapFree 4815->4823 4826 7ffe0141817e-7ffe01418184 4816->4826 4827 7ffe01418190-7ffe01418193 4816->4827 4817->4818 4836 7ffe014182f9-7ffe014182fc 4818->4836 4829 7ffe014180db-7ffe014180fc 4819->4829 4830 7ffe014180ac 4819->4830 4820->4829 4820->4830 4831 7ffe0141824f-7ffe01418258 HeapFree 4822->4831 4832 7ffe0141825d-7ffe01418261 4822->4832 4823->4822 4834 7ffe0141819d-7ffe014181ae call 7ffe013ece50 4826->4834 4827->4815 4835 7ffe01418195-7ffe0141819b 4827->4835 4829->4785 4830->4810 4831->4832 4837 7ffe01418263-7ffe01418266 CloseHandle 4832->4837 4838 7ffe0141826b-7ffe01418285 4832->4838 4834->4749 4847 7ffe014181b4-7ffe014181c7 HeapFree 4834->4847 4835->4815 4835->4834 4842 7ffe014182fe-7ffe0141831e 4836->4842 4843 7ffe01418329-7ffe01418348 4836->4843 4837->4838 4839->4807 4840->4795 4842->4831 4845 7ffe01418324 4842->4845 4843->4838 4846 7ffe0141834e-7ffe0141835c HeapFree 4843->4846 4845->4832 4846->4838 4847->4749
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentFreeHeapPrng
                                                                • String ID:
                                                                • API String ID: 2687294623-0
                                                                • Opcode ID: 51e85cc9d2bc279701434e76395c5df1d6418b4a4d3ee09d6bf8df07b93857f3
                                                                • Instruction ID: 6fb2490f705c97fad4c5cc13b5571b41d52899e2de1272b6b59cd7583a222776
                                                                • Opcode Fuzzy Hash: 51e85cc9d2bc279701434e76395c5df1d6418b4a4d3ee09d6bf8df07b93857f3
                                                                • Instruction Fuzzy Hash: 2012C322A08B8289E754CF25D8103BA3BA1FB487A8F544635EE6E4B7F5DF7CE5458340

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 4848 2e47bf0-2e47c4a call 2e466a0 * 2 4853 2e47c50-2e47c6e GetTokenInformation 4848->4853 4854 2e47d6a 4848->4854 4855 2e47ca4-2e47cc6 GetTokenInformation 4853->4855 4856 2e47c70-2e47c79 GetLastError 4853->4856 4857 2e47d6c-2e47d89 call 2e54cd0 4854->4857 4860 2e47d51-2e47d54 4855->4860 4861 2e47ccc-2e47d04 LookupAccountSidW 4855->4861 4856->4854 4858 2e47c7f-2e47c9e GetProcessHeap HeapAlloc 4856->4858 4858->4854 4858->4855 4860->4854 4862 2e47d56-2e47d64 GetProcessHeap HeapFree 4860->4862 4864 2e47d06-2e47d11 GetLastError 4861->4864 4865 2e47d2f-2e47d4c call 2e466a0 * 2 4861->4865 4862->4854 4867 2e47d13-2e47d29 call 2e55560 4864->4867 4868 2e47d2b-2e47d2d 4864->4868 4865->4860 4867->4860 4868->4857
                                                                APIs
                                                                  • Part of subcall function 02E466A0: SysFreeString.OLEAUT32 ref: 02E466FD
                                                                  • Part of subcall function 02E466A0: SysAllocString.OLEAUT32 ref: 02E46749
                                                                • GetTokenInformation.ADVAPI32 ref: 02E47C66
                                                                • GetLastError.KERNEL32 ref: 02E47C70
                                                                • GetProcessHeap.KERNEL32 ref: 02E47C83
                                                                • HeapAlloc.KERNEL32 ref: 02E47C92
                                                                • GetTokenInformation.ADVAPI32 ref: 02E47CBE
                                                                • LookupAccountSidW.ADVAPI32 ref: 02E47CFC
                                                                • GetLastError.KERNEL32 ref: 02E47D06
                                                                • GetProcessHeap.KERNEL32 ref: 02E47D56
                                                                • HeapFree.KERNEL32 ref: 02E47D64
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Heap$AllocErrorFreeInformationLastProcessStringToken$AccountLookup
                                                                • String ID: NONE_MAPPED$Network
                                                                • API String ID: 1972796461-3150097737
                                                                • Opcode ID: ac7feef6db6130654831ced217b9bb5803c1e798a4c6bdfe98388abe7cb67064
                                                                • Instruction ID: 9ffc211dc4c46ff0e2511aac6d5244ef4a8c4a001aaab9c44555fc8d11295bce
                                                                • Opcode Fuzzy Hash: ac7feef6db6130654831ced217b9bb5803c1e798a4c6bdfe98388abe7cb67064
                                                                • Instruction Fuzzy Hash: 21416032358A8186EE20DB11F84879AB365FBDAB99F849021DE4A47F54EF7CD509CB40

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 4874 2e48a70-2e48a91 LoadLibraryW 4875 2e48a97-2e48aaa GetProcAddress 4874->4875 4876 2e48bd3-2e48bda 4874->4876 4877 2e48ab0-2e48b5f call 2e5553c call 2e52694 call 2e489f0 4875->4877 4878 2e48bca-2e48bcd FreeLibrary 4875->4878 4886 2e48b67-2e48b9a RegOpenKeyExW RegQueryValueExW 4877->4886 4887 2e48b61 4877->4887 4878->4876 4888 2e48bb2-2e48bc0 RegCloseKey call 2e55860 4886->4888 4889 2e48b9c-2e48b9e 4886->4889 4887->4886 4893 2e48bc5 4888->4893 4889->4888 4890 2e48ba0-2e48bad call 2e55a08 4889->4890 4890->4888 4893->4878
                                                                APIs
                                                                • LoadLibraryW.KERNEL32 ref: 02E48A85
                                                                • GetProcAddress.KERNEL32 ref: 02E48AA1
                                                                • FreeLibrary.KERNEL32 ref: 02E48BCD
                                                                  • Part of subcall function 02E5553C: _vswprintf_s_l.LIBCMT ref: 02E55556
                                                                  • Part of subcall function 02E489F0: GetModuleHandleW.KERNEL32 ref: 02E48A1B
                                                                  • Part of subcall function 02E489F0: GetProcAddress.KERNEL32 ref: 02E48A2B
                                                                  • Part of subcall function 02E489F0: GetNativeSystemInfo.KERNEL32 ref: 02E48A3B
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E48B67
                                                                • RegQueryValueExW.ADVAPI32 ref: 02E48B92
                                                                • RegCloseKey.ADVAPI32 ref: 02E48BB7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryProc$CloseFreeHandleInfoLoadModuleNativeOpenQuerySystemValue_vswprintf_s_l
                                                                • String ID: %d.%d.%d$ProductName$RtlGetNtVersionNumbers$SOFTWARE\Microsoft\Windows NT\CurrentVersion$ntdll.dll
                                                                • API String ID: 1477497710-3190923360
                                                                • Opcode ID: 8fccf4e8e9dfffdbce54dd016b3a3e640cc6c4c560ac19f32a706210135c0e15
                                                                • Instruction ID: 2637c92e2367458ffcdaea53360567ae03c8258771a8ec76faafa6d156bcb6cf
                                                                • Opcode Fuzzy Hash: 8fccf4e8e9dfffdbce54dd016b3a3e640cc6c4c560ac19f32a706210135c0e15
                                                                • Instruction Fuzzy Hash: 0B31BE76259B8186DB60DF11F85875A7360FB89BE8F449211EE9E47B98EF3CC548CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Value$AllocCloseCreateDeleteOpenSleepVirtual
                                                                • String ID: .$l$n
                                                                • API String ID: 538739324-2376909228
                                                                • Opcode ID: a5c67e186459e04e5c83a4f6400f64a44d9b70a63a698b5ae6bb6dff010255c7
                                                                • Instruction ID: b595c2e4237d66213ee22b95380115c6b7c4523ff8ead25772b52ffaeda8002a
                                                                • Opcode Fuzzy Hash: a5c67e186459e04e5c83a4f6400f64a44d9b70a63a698b5ae6bb6dff010255c7
                                                                • Instruction Fuzzy Hash: 6AB19F38618B488FEB68EF68D8847EA73E5FB99305F00452ED44EC7251EB78D545CB42
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrcmpilstrcpy$DeviceDriveLogicalQueryStringslstrcatlstrlen
                                                                • String ID: A:\$B:\
                                                                • API String ID: 1889997506-1009255891
                                                                • Opcode ID: 5dc2d984e07fee21b3691a8fb012607491010a079a3f60e72f83a1abb6f6c642
                                                                • Instruction ID: 53516fd987d76c88f17e8fd4a4282f7973db2f1464fa9589951c4cab5ed407d7
                                                                • Opcode Fuzzy Hash: 5dc2d984e07fee21b3691a8fb012607491010a079a3f60e72f83a1abb6f6c642
                                                                • Instruction Fuzzy Hash: 10316E66258AC185EF309B11F8487AB7364F798BC9F44A116DE8E97B58EF7CC145CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: connectgethostbynamesocket
                                                                • String ID: 0u
                                                                • API String ID: 1495599467-3203441087
                                                                • Opcode ID: f3d68191761d0edfcd14420cbcb95c442383d55f4c5bb99c35229de8d27f8cd7
                                                                • Instruction ID: c1710887629bf8f057926e38be5b753781d5860a9ca710a51d922c65c4bd8b52
                                                                • Opcode Fuzzy Hash: f3d68191761d0edfcd14420cbcb95c442383d55f4c5bb99c35229de8d27f8cd7
                                                                • Instruction Fuzzy Hash: 08915D7461CB488FD758DF28E4457AAB7E1FB98704F104A2EE58AC3260DB74E406CB87
                                                                APIs
                                                                • GetDriveTypeW.KERNEL32 ref: 02E481EA
                                                                • GetDiskFreeSpaceExW.KERNEL32 ref: 02E4820E
                                                                • GlobalMemoryStatusEx.KERNEL32 ref: 02E48275
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: DiskDriveFreeGlobalMemorySpaceStatusType
                                                                • String ID: %sFree%d Gb $:$@$HDD:%d
                                                                • API String ID: 3475944273-3501811827
                                                                • Opcode ID: 76de7998e9de80cc2ded53d2e4fe325184efc08d04f63c850a58e7016f2c78a4
                                                                • Instruction ID: 4bff84a751f0f538074be6f5ec208572da9bf9a86893e2e71bdc0815b8e1ecec
                                                                • Opcode Fuzzy Hash: 76de7998e9de80cc2ded53d2e4fe325184efc08d04f63c850a58e7016f2c78a4
                                                                • Instruction Fuzzy Hash: 4E312736218B8486D760DF16F84478BB7A4F389788FA06226EECD43B18DF38C556CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateFreeInitializeInstanceStringUninitialize
                                                                • String ID: FriendlyName$Network
                                                                • API String ID: 841178590-1437807293
                                                                • Opcode ID: 84c243b931c5992d681145c8f6e0b05a35417d470a1a95b211a46464dadc8825
                                                                • Instruction ID: 9e76efc5e02d90c2dbaef5fb2e219947839e56821306b50ff72531ec70a855c7
                                                                • Opcode Fuzzy Hash: 84c243b931c5992d681145c8f6e0b05a35417d470a1a95b211a46464dadc8825
                                                                • Instruction Fuzzy Hash: 7C311C76344A86D2DB20CF79E48479AB7A1F7D4F98F559012DA8E83B24DF38C589CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoSystem$AddressHandleModuleNativeProc
                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                • API String ID: 3433367815-192647395
                                                                • Opcode ID: 89cb0620d88a823d197d8a4edb78f2da70a6a6bea98d141efa7987b94c4cb817
                                                                • Instruction ID: 012b57692cc8ecd3e3fe8fd837b7560823226a5da83a4a9c5769c708997b0ebf
                                                                • Opcode Fuzzy Hash: 89cb0620d88a823d197d8a4edb78f2da70a6a6bea98d141efa7987b94c4cb817
                                                                • Instruction Fuzzy Hash: 36F03C36659FC586DEA0EB10F85835A73A0F398B84F845129D6CF83754EF7CC2548B10
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Free$memset$AllocCreateErrorLastmalloc
                                                                • String ID:
                                                                • API String ID: 2998993497-0
                                                                • Opcode ID: 21beb2f2bf9a22f8c4a594254eb73cb50eb852875981926af0b0d6010108d291
                                                                • Instruction ID: 3159f21ee5d0cc11301d9c2ddfbb134d29d3abe08cfd84bf62999ff053f2a3e8
                                                                • Opcode Fuzzy Hash: 21beb2f2bf9a22f8c4a594254eb73cb50eb852875981926af0b0d6010108d291
                                                                • Instruction Fuzzy Hash: DDE1397290CBC581E7758B19F8453EEA3A0FBD9344F454226EACC4AA69DF7CE585CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Free$memset$AllocCreateErrorLast
                                                                • String ID:
                                                                • API String ID: 3318353824-0
                                                                • Opcode ID: 59d7772e9fab99f2178022d574e8be8db10d82b2470821197450b71fbed14ea1
                                                                • Instruction ID: 555aa0f17af898188e3f43e2cbe640f93117f1308b9ca9e3c7be6228c79d2238
                                                                • Opcode Fuzzy Hash: 59d7772e9fab99f2178022d574e8be8db10d82b2470821197450b71fbed14ea1
                                                                • Instruction Fuzzy Hash: 70D14C62A0CBC681E7358B15E8453FEA3A1FB98748F454136DACD4AAB9DF3CE545CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$recvselect
                                                                • String ID:
                                                                • API String ID: 4102763267-0
                                                                • Opcode ID: a87cada1dcbfab8d9f4ea9d1832976277f26580d7a4e36eb41945066a534f54b
                                                                • Instruction ID: c94b3631326b06ef5f4c9439c3017e73ac41a9b7338cb08cce51053a45f6e9cd
                                                                • Opcode Fuzzy Hash: a87cada1dcbfab8d9f4ea9d1832976277f26580d7a4e36eb41945066a534f54b
                                                                • Instruction Fuzzy Hash: 7B317F72264AD081EB309F25F45876E73A1F789B98F54A265DF9A47B54DF38C0008B11
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 1789362936-0
                                                                • Opcode ID: 0be9ed80d58a340915f6c32b2beb49099068b08a59c1afc760e6751da2d599d4
                                                                • Instruction ID: ccddffe8c5f2b1a8333175d3b66aea1c18536b61ade507b3bc308942438acc4f
                                                                • Opcode Fuzzy Hash: 0be9ed80d58a340915f6c32b2beb49099068b08a59c1afc760e6751da2d599d4
                                                                • Instruction Fuzzy Hash: 8421843264868085DB649B25F45C37AB7A1F7D8B98F849225DA5E46B94EF3CC504CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateFactory
                                                                • String ID: %s%s %d %d $%s%s %d*%d $vector<T> too long
                                                                • API String ID: 1145517477-257307503
                                                                • Opcode ID: 32845b5ceee2c9c9111369cf511fee31bcf8c5e9523092c1b243209fcc5ace9d
                                                                • Instruction ID: ca68c3b835976bec161dbd721fe474331251a28a2f8131bc54e5dcc77b8fa562
                                                                • Opcode Fuzzy Hash: 32845b5ceee2c9c9111369cf511fee31bcf8c5e9523092c1b243209fcc5ace9d
                                                                • Instruction Fuzzy Hash: 4FD1F472754A8486DF10CF66E8542AE7362F788BE8F54A621DF6E27B98DF38C445C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Heap$CreateInformationVersion
                                                                • String ID:
                                                                • API String ID: 3563531100-0
                                                                • Opcode ID: 90aacd7874f7576210f1b8e18ccfcd6701819cf72a36e26adf16026e4497063d
                                                                • Instruction ID: 678785947e3a26c88272a4c2065b06f4e2f56cc72ce0276193b60b4516223273
                                                                • Opcode Fuzzy Hash: 90aacd7874f7576210f1b8e18ccfcd6701819cf72a36e26adf16026e4497063d
                                                                • Instruction Fuzzy Hash: BDE0D834261AD182FB455755F80D75A3311F798389F806018EA4F43F44EF3CC0458710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorObjectSingleStatusWait
                                                                • String ID:
                                                                • API String ID: 4189389217-0
                                                                • Opcode ID: 662beb7d9e6edd52112540eca7aec0ccd9460185057df25c63a49af0507912b4
                                                                • Instruction ID: 67c5d8aecd75f2249ecb4613d5995048472c7deaca999a487bec36e8296f6ddb
                                                                • Opcode Fuzzy Hash: 662beb7d9e6edd52112540eca7aec0ccd9460185057df25c63a49af0507912b4
                                                                • Instruction Fuzzy Hash: 2E219122F18B8189F710CB74E4403ED27A1EBA8358F549231EA5D46AE9EF3CE1D18740
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: memcpy
                                                                • String ID: Invalid checksum$corrupt deflate stream
                                                                • API String ID: 3510742995-685916775
                                                                • Opcode ID: 5aab9deb5222d04c7bb8ae061be233dd5d40db04599e2760f6d483d1f2c93055
                                                                • Instruction ID: 93317a11237ca27b19784383742a5b32438aea8b9e0bab50a3df4517871f36ce
                                                                • Opcode Fuzzy Hash: 5aab9deb5222d04c7bb8ae061be233dd5d40db04599e2760f6d483d1f2c93055
                                                                • Instruction Fuzzy Hash: F481AF72A18B818ADB64CB25E440BAEB7A1FB55780F904035DB8E4BB75DF7DE085C701

                                                                Control-flow Graph

                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Global$CriticalSection$Stream$CreateEnterGdipLeave$DisposeFreeFromImageLock$AllocBitmapDeleteGdiplusObjectShutdownUnlock
                                                                • String ID:
                                                                • API String ID: 562715702-0
                                                                • Opcode ID: 1f20682f04d03fbf3385fc7b2c80d26b451ef2743fd3ada5c9c0ffae22fdbc8f
                                                                • Instruction ID: 1d1739bbfbea88671700f511778c55c9016b2c1db6f200e5f9037ee0292ba4db
                                                                • Opcode Fuzzy Hash: 1f20682f04d03fbf3385fc7b2c80d26b451ef2743fd3ada5c9c0ffae22fdbc8f
                                                                • Instruction Fuzzy Hash: A7912436784B818AEB10DBA1F85839D33B1F798BA8F005615DE9E57EA8DF38C149C750

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3252 2e4cc50-2e4cc80 call 2e4c570 3255 2e4cc86-2e4cc96 GdipGetImageEncodersSize 3252->3255 3256 2e4cd60 3252->3256 3255->3256 3258 2e4cc9c-2e4cca7 3255->3258 3257 2e4cd65-2e4cd80 call 2e54cd0 3256->3257 3260 2e4cce3-2e4ccf0 3258->3260 3261 2e4cca9-2e4ccb2 call 2e4c0e0 3258->3261 3264 2e4ccf6-2e4cd02 call 2e552c0 3260->3264 3265 2e4cf37-2e4cf41 call 2e41220 3260->3265 3270 2e4ccb4-2e4ccbe 3261->3270 3271 2e4cce0 3261->3271 3273 2e4cd04-2e4cd06 3264->3273 3274 2e4cd08-2e4cd12 3264->3274 3275 2e4ccc0 3270->3275 3276 2e4ccca-2e4ccde call 2e63da0 3270->3276 3271->3260 3277 2e4cd15-2e4cd18 3273->3277 3274->3277 3275->3276 3276->3277 3279 2e4cd37-2e4cd47 GdipGetImageEncoders 3277->3279 3280 2e4cd1a-2e4cd1d 3277->3280 3284 2e4cd81-2e4cd91 3279->3284 3285 2e4cd49-2e4cd4c 3279->3285 3282 2e4cd30-2e4cd35 3280->3282 3283 2e4cd1f 3280->3283 3282->3257 3288 2e4cd20-2e4cd2e call 2e55280 3283->3288 3286 2e4cd93 3284->3286 3287 2e4cdda 3284->3287 3285->3256 3289 2e4cd4e 3285->3289 3290 2e4cda0-2e4cdb7 3286->3290 3292 2e4cde1-2e4cdf4 3287->3292 3288->3282 3293 2e4cd50-2e4cd5e call 2e55280 3289->3293 3294 2e4cdb9-2e4cdc4 3290->3294 3295 2e4cdca-2e4cdcc 3290->3295 3297 2e4cdf6-2e4ce01 3292->3297 3298 2e4ce13-2e4ce15 3292->3298 3293->3256 3294->3295 3301 2e4cdc6-2e4cdc8 3294->3301 3302 2e4cdcf-2e4cdd1 3295->3302 3297->3298 3303 2e4ce03-2e4ce05 3297->3303 3300 2e4ce18-2e4ce1a 3298->3300 3305 2e4ce1c-2e4ce1f 3300->3305 3306 2e4ce3a-2e4ce48 3300->3306 3301->3302 3307 2e4ce07-2e4ce11 3302->3307 3308 2e4cdd3-2e4cdd8 3302->3308 3303->3300 3305->3256 3309 2e4ce25-2e4ce33 call 2e55280 3305->3309 3310 2e4ceba-2e4cee7 GdipCreateBitmapFromHBITMAP GdipSaveImageToStream 3306->3310 3311 2e4ce4a-2e4ce94 GdipCreateBitmapFromScan0 GdipSaveImageToStream 3306->3311 3307->3292 3308->3287 3308->3290 3322 2e4ce35 3309->3322 3312 2e4cf15-2e4cf1e GdipDisposeImage 3310->3312 3313 2e4cee9-2e4cef2 GdipDisposeImage 3310->3313 3311->3312 3315 2e4ce96-2e4ce9f GdipDisposeImage 3311->3315 3318 2e4cf30-2e4cf32 3312->3318 3319 2e4cf20-2e4cf2e call 2e55280 3312->3319 3313->3256 3316 2e4cef8 3313->3316 3315->3256 3320 2e4cea5-2e4ceb3 call 2e55280 3315->3320 3321 2e4cf00-2e4cf0e call 2e55280 3316->3321 3318->3257 3319->3318 3329 2e4ceb5 3320->3329 3330 2e4cf10 3321->3330 3322->3256 3329->3256 3330->3256
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Gdip$Image$free$Dispose$BitmapCreateEncodersFromSaveStream$Scan0Sizemalloc
                                                                • String ID: &
                                                                • API String ID: 1890951399-3042966939
                                                                • Opcode ID: 1b113133b1d1c7f617ae231253ae617589de5df3b5f4aa67eb334f1dad3f7bec
                                                                • Instruction ID: 112298e8a9e9222d9a5f87cb26d4a8b86b917d5e22a89a8984376d4f9a868a30
                                                                • Opcode Fuzzy Hash: 1b113133b1d1c7f617ae231253ae617589de5df3b5f4aa67eb334f1dad3f7bec
                                                                • Instruction Fuzzy Hash: 7071B022392A8096DF149F31E8047A92765F759BDCFA8F623DE1A47B94EF38D145C340

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3331 2e47f70-2e47ff3 call 2e52694 GetCurrentProcessId wsprintfW call 2e47d90 call 2e57bb0 GetVersionExW 3338 2e48124 3331->3338 3339 2e47ff9-2e47ffe 3331->3339 3341 2e4812b-2e48135 wsprintfW 3338->3341 3339->3338 3340 2e48004-2e48009 3339->3340 3340->3338 3342 2e4800f-2e4802d GetCurrentProcess OpenProcessToken 3340->3342 3343 2e4813b-2e4814e 3341->3343 3342->3338 3344 2e48033-2e48057 GetTokenInformation 3342->3344 3345 2e48150-2e48153 call 2e55860 3343->3345 3346 2e48158-2e48175 call 2e54cd0 3343->3346 3347 2e480d1-2e480de CloseHandle 3344->3347 3348 2e48059-2e48062 GetLastError 3344->3348 3345->3346 3347->3338 3351 2e480e0-2e480e6 3347->3351 3348->3347 3352 2e48064-2e4807f LocalAlloc 3348->3352 3354 2e480e8-2e480ee 3351->3354 3355 2e4811b-2e48122 3351->3355 3356 2e48081-2e480a3 GetTokenInformation 3352->3356 3357 2e480c9 3352->3357 3358 2e480f0-2e480f6 3354->3358 3359 2e48112-2e48119 3354->3359 3355->3341 3360 2e480a5-2e480be GetSidSubAuthorityCount GetSidSubAuthority 3356->3360 3361 2e480c0-2e480c3 LocalFree 3356->3361 3357->3347 3362 2e480f8-2e480fe 3358->3362 3363 2e48109-2e48110 3358->3363 3359->3341 3360->3361 3361->3357 3362->3343 3364 2e48100-2e48107 3362->3364 3363->3341 3364->3341
                                                                APIs
                                                                • GetCurrentProcessId.KERNEL32 ref: 02E47FA5
                                                                • wsprintfW.USER32 ref: 02E47FBC
                                                                  • Part of subcall function 02E47D90: GetCurrentProcessId.KERNEL32 ref: 02E47DAD
                                                                  • Part of subcall function 02E47D90: OpenProcess.KERNEL32 ref: 02E47DBD
                                                                  • Part of subcall function 02E47D90: OpenProcessToken.ADVAPI32 ref: 02E47DE5
                                                                  • Part of subcall function 02E47D90: CloseHandle.KERNEL32 ref: 02E47DF2
                                                                • GetVersionExW.KERNEL32 ref: 02E47FEB
                                                                • GetCurrentProcess.KERNEL32 ref: 02E48014
                                                                • OpenProcessToken.ADVAPI32 ref: 02E48025
                                                                • GetTokenInformation.ADVAPI32 ref: 02E4804F
                                                                • GetLastError.KERNEL32 ref: 02E48059
                                                                • LocalAlloc.KERNEL32 ref: 02E48073
                                                                • GetTokenInformation.ADVAPI32 ref: 02E4809B
                                                                • GetSidSubAuthorityCount.ADVAPI32 ref: 02E480A9
                                                                • GetSidSubAuthority.ADVAPI32 ref: 02E480B8
                                                                • LocalFree.KERNEL32 ref: 02E480C3
                                                                • CloseHandle.KERNEL32 ref: 02E480D6
                                                                • wsprintfW.USER32 ref: 02E48135
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$Token$CurrentOpen$AuthorityCloseHandleInformationLocalwsprintf$AllocCountErrorFreeLastVersion
                                                                • String ID: -N/$NO/$None/%s
                                                                • API String ID: 4155081256-3095023699
                                                                • Opcode ID: eabe9c37c142d0c42af826881d2ffa50fe86e3bf6b1343313f3b0a9839f108bd
                                                                • Instruction ID: 1a37c2f57057a4fa00898f04f18dfc21a3735241db38e42aa52936070d277666
                                                                • Opcode Fuzzy Hash: eabe9c37c142d0c42af826881d2ffa50fe86e3bf6b1343313f3b0a9839f108bd
                                                                • Instruction Fuzzy Hash: 43515F31298BC1C6EB64DF21F8987AA7361F799BC8F446026DA4B47B54DF38C549CB10

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3385 2e4c830-2e4c877 GdipGetImagePixelFormat 3386 2e4c87e-2e4c89c 3385->3386 3387 2e4c879 3385->3387 3388 2e4c8b0-2e4c8b5 3386->3388 3389 2e4c89e-2e4c8ac 3386->3389 3387->3386 3390 2e4c8b7-2e4c8c8 3388->3390 3391 2e4c8cc-2e4c8e0 GdipGetImageHeight 3388->3391 3389->3388 3390->3391 3392 2e4c8e7-2e4c8fe GdipGetImageWidth 3391->3392 3393 2e4c8e2 3391->3393 3394 2e4c905-2e4c91c call 2e4c6d0 3392->3394 3395 2e4c900 3392->3395 3393->3392 3398 2e4caf0-2e4caf5 3394->3398 3399 2e4c922-2e4c92a 3394->3399 3395->3394 3400 2e4cc22-2e4cc4a call 2e54cd0 3398->3400 3401 2e4c930-2e4c944 GdipGetImagePaletteSize 3399->3401 3402 2e4ca6d-2e4ca78 3399->3402 3404 2e4c946 3401->3404 3405 2e4c94b-2e4c956 3401->3405 3406 2e4cba1-2e4cbfe GdipCreateBitmapFromScan0 GdipGetImageGraphicsContext GdipDrawImageI GdipDeleteGraphics GdipDisposeImage 3402->3406 3407 2e4ca7e-2e4caaf GdipBitmapLockBits 3402->3407 3404->3405 3409 2e4c958-2e4c962 call 2e4c0e0 3405->3409 3410 2e4c98a-2e4c998 3405->3410 3413 2e4cc04-2e4cc07 3406->3413 3411 2e4cb05-2e4cb1e 3407->3411 3412 2e4cab1-2e4cab9 3407->3412 3409->3410 3433 2e4c964-2e4c96b 3409->3433 3421 2e4c99e-2e4c9aa call 2e552c0 3410->3421 3422 2e4cafa-2e4cb04 call 2e41220 3410->3422 3414 2e4cb20-2e4cb33 call 2e567a8 3411->3414 3415 2e4cb5f-2e4cb70 GdipBitmapUnlockBits 3411->3415 3417 2e4cad0-2e4cad5 3412->3417 3418 2e4cabb 3412->3418 3419 2e4cc20 3413->3419 3420 2e4cc09 3413->3420 3438 2e4cb35-2e4cb38 3414->3438 3439 2e4cb49-2e4cb5d 3414->3439 3415->3413 3429 2e4cb76-2e4cb7b 3415->3429 3417->3400 3427 2e4cac0-2e4cace call 2e55280 3418->3427 3419->3400 3428 2e4cc10-2e4cc1e call 2e55280 3420->3428 3436 2e4c9b1-2e4c9b7 3421->3436 3437 2e4c9ac-2e4c9af 3421->3437 3422->3411 3427->3417 3428->3419 3429->3413 3440 2e4c977-2e4c988 call 2e63da0 3433->3440 3441 2e4c96d 3433->3441 3444 2e4c9bb-2e4c9be 3436->3444 3437->3444 3445 2e4cb96-2e4cba0 call 2e41220 3438->3445 3446 2e4cb3a-2e4cb3d 3438->3446 3439->3414 3439->3415 3440->3444 3441->3440 3448 2e4c9c0-2e4c9c3 3444->3448 3449 2e4c9df-2e4c9f2 GdipGetImagePalette 3444->3449 3445->3406 3451 2e4cb3f-2e4cb42 3446->3451 3452 2e4cb8b-2e4cb95 call 2e41220 3446->3452 3455 2e4c9d5-2e4c9da 3448->3455 3456 2e4c9c5-2e4c9d3 call 2e55280 3448->3456 3458 2e4c9f4 3449->3458 3459 2e4c9f9-2e4ca02 3449->3459 3451->3452 3460 2e4cb44-2e4cb47 3451->3460 3452->3445 3455->3400 3456->3455 3458->3459 3463 2e4ca08-2e4ca0d 3459->3463 3464 2e4cada-2e4cadd 3459->3464 3460->3439 3465 2e4cb80-2e4cb8a call 2e41220 3460->3465 3463->3464 3469 2e4ca13-2e4ca18 3463->3469 3464->3398 3468 2e4cadf 3464->3468 3465->3452 3471 2e4cae0-2e4caee call 2e55280 3468->3471 3472 2e4ca1a-2e4ca25 3469->3472 3473 2e4ca5b-2e4ca69 call 2e4cf50 3469->3473 3471->3398 3474 2e4ca30-2e4ca59 3472->3474 3473->3402 3474->3473 3474->3474
                                                                APIs
                                                                • GdipGetImagePixelFormat.GDIPLUS ref: 02E4C86F
                                                                • GdipGetImageHeight.GDIPLUS ref: 02E4C8D8
                                                                • GdipGetImageWidth.GDIPLUS ref: 02E4C8F6
                                                                • GdipGetImagePaletteSize.GDIPLUS ref: 02E4C93C
                                                                • malloc.LIBCMT ref: 02E4C9A2
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                • free.LIBCMT ref: 02E4C9CB
                                                                • GdipGetImagePalette.GDIPLUS ref: 02E4C9EA
                                                                • GdipBitmapLockBits.GDIPLUS ref: 02E4CAA7
                                                                • free.LIBCMT ref: 02E4CAC6
                                                                • GdipCreateBitmapFromScan0.GDIPLUS ref: 02E4CBBF
                                                                • GdipGetImageGraphicsContext.GDIPLUS ref: 02E4CBD4
                                                                • GdipDrawImageI.GDIPLUS ref: 02E4CBEC
                                                                • GdipDeleteGraphics.GDIPLUS ref: 02E4CBF5
                                                                • GdipDisposeImage.GDIPLUS ref: 02E4CBFE
                                                                • free.LIBCMT ref: 02E4CAE6
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                • memcpy_s.LIBCMT ref: 02E4CB2C
                                                                • GdipBitmapUnlockBits.GDIPLUS ref: 02E4CB68
                                                                • free.LIBCMT ref: 02E4CC16
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Gdip$Image$free$Bitmap_errno$BitsGraphicsHeapPalette$AllocContextCreateDeleteDisposeDrawErrorFormatFreeFromHeightLastLockPixelScan0SizeUnlockWidth_callnewhmallocmemcpy_s
                                                                • String ID:
                                                                • API String ID: 1886978121-0
                                                                • Opcode ID: 42f3f85edf21d4ffff2d38a0cd1d8951f1e28ef6d88c4ef60eeee2c527c753ee
                                                                • Instruction ID: 66d91d70c9ae6863f464ed651200bde443e10df3f058c9e9072ff219df16f521
                                                                • Opcode Fuzzy Hash: 42f3f85edf21d4ffff2d38a0cd1d8951f1e28ef6d88c4ef60eeee2c527c753ee
                                                                • Instruction Fuzzy Hash: 49B1AC723816809ADB20CF25E4487A937A5F748BDCF55BA26DF1A87B54DF38C145C740

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 3479 2e472d0-2e47305 CreateMutexW CreateMutexExW 3480 2e47307 3479->3480 3481 2e47339-2e47340 3479->3481 3482 2e47310-2e47337 Sleep CreateMutexW GetLastError 3480->3482 3483 2e473b1-2e473da call 2e6f148 GetConsoleWindow call 2e51bf0 3481->3483 3484 2e47342 3481->3484 3482->3481 3482->3482 3493 2e473f6-2e473fb call 2e52000 3483->3493 3494 2e473dc-2e473f5 call 2e54cd0 3483->3494 3485 2e47350-2e47385 call 2e57bb0 lstrlenW call 2e48310 3484->3485 3498 2e47387-2e4739b lstrcmpW 3485->3498 3499 2e4739d-2e473af Sleep 3485->3499 3498->3483 3498->3499 3499->3483 3499->3485
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateMutex$Sleep$ConsoleErrorHandleLastModuleWindowlstrcmplstrlen
                                                                • String ID: 2024.12.23$key$open
                                                                • API String ID: 4141083079-12241332
                                                                • Opcode ID: 4a448574df46548b3933a1e0e783c702eebcdd2863c0193c8b969a62963df4fc
                                                                • Instruction ID: d3f97d4e5748b9fb1af2ef453e273a8e177c0dea8d9e86d6921e044534506674
                                                                • Opcode Fuzzy Hash: 4a448574df46548b3933a1e0e783c702eebcdd2863c0193c8b969a62963df4fc
                                                                • Instruction Fuzzy Hash: 1A314F316D4AC1D2EB64AB20F81C3AA7362FB94B8DF80A426D94F469A4DF3CC549C750
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: String$CloseHandleProcess$FreeOpen$CurrentToken
                                                                • String ID:
                                                                • API String ID: 3697972778-0
                                                                • Opcode ID: 250c813f0b5ac911f241f73868ced926d4be8b2829d6ef28bc566a87a8018372
                                                                • Instruction ID: 1d14ffee0c33aade91067a685cd83c8831385f2e8fa62beb41c76f1041d09981
                                                                • Opcode Fuzzy Hash: 250c813f0b5ac911f241f73868ced926d4be8b2829d6ef28bc566a87a8018372
                                                                • Instruction Fuzzy Hash: A1418426245B8082EF249F62F414369B365FB84F9CF489229DE9E4BB94DF3CC844C790
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseFreeHandleHeap$ErrorLastObjectSingleWait
                                                                • String ID:
                                                                • API String ID: 3984667017-0
                                                                • Opcode ID: ae832000e4d5b84c8e2cc288269573d7b94e1ae3fa4238091a51589e4ef0ec96
                                                                • Instruction ID: 3dd9aa1496f97a9a32e14885b6585a89c8be2718c9bf89b4ad183fc1e14238f0
                                                                • Opcode Fuzzy Hash: ae832000e4d5b84c8e2cc288269573d7b94e1ae3fa4238091a51589e4ef0ec96
                                                                • Instruction Fuzzy Hash: C6516B22A08BC588E7619F22D8553F927A0FB48798F544535EE4D4FABACF7CE189C341
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E478C9
                                                                • RegQueryInfoKeyW.ADVAPI32 ref: 02E47924
                                                                • RegEnumKeyExW.ADVAPI32 ref: 02E479B9
                                                                • lstrlenW.KERNEL32 ref: 02E479C3
                                                                • lstrlenW.KERNEL32 ref: 02E479D2
                                                                  • Part of subcall function 02E55F08: _errno.LIBCMT ref: 02E55F27
                                                                  • Part of subcall function 02E55F08: _invalid_parameter_noinfo.LIBCMT ref: 02E55F33
                                                                  • Part of subcall function 02E55F08: _errno.LIBCMT ref: 02E55F7D
                                                                • RegCloseKey.ADVAPI32 ref: 02E47A1B
                                                                • lstrlenW.KERNEL32 ref: 02E47A38
                                                                Strings
                                                                • Software\Tencent\Plugin\VAS, xrefs: 02E478AD
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$_errno$CloseEnumInfoOpenQuery_invalid_parameter_noinfo
                                                                • String ID: Software\Tencent\Plugin\VAS
                                                                • API String ID: 47975445-3343197220
                                                                • Opcode ID: 36ec62b793e39dcc94c07c2d0a1f741258fd71675ca2a9683c074fb8b423db42
                                                                • Instruction ID: 72728858919acd129b661596023f732348312c1f27ce2c6af6e32f96d956fe76
                                                                • Opcode Fuzzy Hash: 36ec62b793e39dcc94c07c2d0a1f741258fd71675ca2a9683c074fb8b423db42
                                                                • Instruction Fuzzy Hash: 00515D32658B9186EB60CF25F89439EB3A5F788748F905126EE8D53E58DF38C249CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: memcpy
                                                                • String ID: assertion failed: old_left_len + count <= CAPACITY$called `Result::unwrap()` on an `Err` value
                                                                • API String ID: 3510742995-3830370267
                                                                • Opcode ID: 0be42b2556445bb09c952e3b13c963e2539a1abc12cecaa0e440c9bddaa7ff3e
                                                                • Instruction ID: 10e9d4f69c109c95b9b271bf13ecc5d9541f0c16ac4c0127acc4f85e1d5e3f18
                                                                • Opcode Fuzzy Hash: 0be42b2556445bb09c952e3b13c963e2539a1abc12cecaa0e440c9bddaa7ff3e
                                                                • Instruction Fuzzy Hash: F4C1EF62A19BC582EB458F18E8013E97768FBA8B98F559336DE4D17371DF3CA295C300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorFreeHeapLast$FileHandle$CloseCreateInformation
                                                                • String ID:
                                                                • API String ID: 2929975209-0
                                                                • Opcode ID: b7855a69a751110b45b332f1cdd604192b24ec0a0a63d171e564b8c00f180edb
                                                                • Instruction ID: 8824eeff7a585ccfd612bc9c9bd7764fba6087cbd8d050f401c085aacfc52e9f
                                                                • Opcode Fuzzy Hash: b7855a69a751110b45b332f1cdd604192b24ec0a0a63d171e564b8c00f180edb
                                                                • Instruction Fuzzy Hash: 4661D3A1A0835246FB62CAA391503BD27A1AF48794F24453CDE4D0FAF5DF3DEC958740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$ErrorFreeHeapLast$ObjectSingleWait
                                                                • String ID:
                                                                • API String ID: 908592504-0
                                                                • Opcode ID: d47432c2f7303df1da0f5c878d0d6920ede9d163825c0ac3bba153f5b009ff54
                                                                • Instruction ID: 47076f7aa2f30509f193a15e7d6a7de5e05d64804b35a4a61a849ce61d9232a8
                                                                • Opcode Fuzzy Hash: d47432c2f7303df1da0f5c878d0d6920ede9d163825c0ac3bba153f5b009ff54
                                                                • Instruction Fuzzy Hash: 96412622A09BC688E7619F21D8543E927A0FB5879CF544536EE4D0FAB9CF7CD189C341
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Window$CountForegroundInfoInputLastTextTickmallocwsprintf
                                                                • String ID: %d min
                                                                • API String ID: 4179731349-1947832151
                                                                • Opcode ID: 40337b7360b93958c7ffefbf7603324078d7470535306a49e8a517b9f1626132
                                                                • Instruction ID: 3c907794b309fdfdcb4487a41108c101073e733f5c1c5cc082d7d2d98cb2aae7
                                                                • Opcode Fuzzy Hash: 40337b7360b93958c7ffefbf7603324078d7470535306a49e8a517b9f1626132
                                                                • Instruction Fuzzy Hash: 6341AE326546909ADB34DF26F4A839ABBA1F785B88F489429DE4E07B58DF3CC505CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandle$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 2056089037-0
                                                                • Opcode ID: ee6063b8c0c8a36d35db1be0777e42751f27219dfca506171b1c6d5839785bf6
                                                                • Instruction ID: 46bcbe1efe66cbc25e5d9f2c649257e7e05ac6ba01f71744cc0fc2c58872478a
                                                                • Opcode Fuzzy Hash: ee6063b8c0c8a36d35db1be0777e42751f27219dfca506171b1c6d5839785bf6
                                                                • Instruction Fuzzy Hash: 13417A22A08B4185EB24DB22D5513BD66B0FF98B84F448531EE9E4F7B6DF3CE5818341
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Close$OpenQueryValuelstrcmp
                                                                • String ID:
                                                                • API String ID: 4288439342-0
                                                                • Opcode ID: 43d7abf421c986796ffab67def199f110ce2357268e7baf3c27bcbaffcd6d8c5
                                                                • Instruction ID: c9e9dba66310a3fe70b796cc23a9fee80a6d358e0e4e8cf35cd46c192e7a7b6d
                                                                • Opcode Fuzzy Hash: 43d7abf421c986796ffab67def199f110ce2357268e7baf3c27bcbaffcd6d8c5
                                                                • Instruction Fuzzy Hash: 04211031358A8085EB60DF25F88875A7360FB95BD8F506225AE9E43B98DF38C445CB44
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateErrorLastThread_errno_getptd_invalid_parameter_noinfofree
                                                                • String ID:
                                                                • API String ID: 3283625137-0
                                                                • Opcode ID: ef76c9431adcd85a319d1e57cb9e2ef9ae5cf1fbd286b1b05233d4a8e7f6675d
                                                                • Instruction ID: 48b84e88f9676773e658e32e70aaeb890e587d3ba7c47b21d3cbb20002e0ae23
                                                                • Opcode Fuzzy Hash: ef76c9431adcd85a319d1e57cb9e2ef9ae5cf1fbd286b1b05233d4a8e7f6675d
                                                                • Instruction Fuzzy Hash: A521C33135479086EB14EBA6E94036EB3A5FB84BD8F849225EF6903B94CF7CC054CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateThread_errno_getptd_invalid_parameter_noinfofree
                                                                • String ID:
                                                                • API String ID: 2643549960-0
                                                                • Opcode ID: 453820257ce1fff315e0438df434a3e86e327e415de7a00954c981deddcdb116
                                                                • Instruction ID: cbcb1e075556678ad81ad20f759b8f97d758c9788f1944a245751132a3512dcd
                                                                • Opcode Fuzzy Hash: 453820257ce1fff315e0438df434a3e86e327e415de7a00954c981deddcdb116
                                                                • Instruction Fuzzy Hash: E7218338618F494FEB44FBAC984963A77D2FB98354F00062ED45DC32A1EB70D8418B93
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: OpenQueryValue
                                                                • String ID: Console$IpDatespecial
                                                                • API String ID: 4153817207-1840232981
                                                                • Opcode ID: f597642ce5486d2b0d97fa684612b1f2a97d83d6342d12bdc6a07c867f32ff83
                                                                • Instruction ID: 2ee302557798fbbb852014cb33bb75186e3420b922cd5511bfc997a6f05f6619
                                                                • Opcode Fuzzy Hash: f597642ce5486d2b0d97fa684612b1f2a97d83d6342d12bdc6a07c867f32ff83
                                                                • Instruction Fuzzy Hash: 41218E33748AA099E7618B61F848B9D7774F74879CF849122EF9813B58DF78C25ACB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Value$CloseDeleteOpen
                                                                • String ID:
                                                                • API String ID: 3183427449-0
                                                                • Opcode ID: 9eba34af8f0cbeb91a26e19318741d303626d94de1ef3866bf452a77ba39d573
                                                                • Instruction ID: 95da609d96ae522aec07ea8764e0c9ea1f9ba2638ae8a73c5f0439ef8dcb6ae2
                                                                • Opcode Fuzzy Hash: 9eba34af8f0cbeb91a26e19318741d303626d94de1ef3866bf452a77ba39d573
                                                                • Instruction Fuzzy Hash: 3331893460CB088FE748EF28D8986DA77E6FB84345F504A6DE15AC32A4EF78D545CB42
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$recv
                                                                • String ID:
                                                                • API String ID: 3923354822-0
                                                                • Opcode ID: 1f23e9d9fa7af0716f6a083ae6ddab70585528aebc875222d6f22b148e6198e8
                                                                • Instruction ID: f7677b537ecd853c093894719e7b035aa097657ce7e8bac3d74d1d7a040c49ef
                                                                • Opcode Fuzzy Hash: 1f23e9d9fa7af0716f6a083ae6ddab70585528aebc875222d6f22b148e6198e8
                                                                • Instruction Fuzzy Hash: BD316FB8218A488FDBA5EF2C848876A72E2FB88345F0546BDD44EC7290DF34C4419B57
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcess$FileImageNameOpen
                                                                • String ID:
                                                                • API String ID: 93767460-0
                                                                • Opcode ID: f4c9a00bd5335a512c6e2cdfdcb9c4e881643e77e15c2ea394c83688fc739c2e
                                                                • Instruction ID: b41bc15ccc5017aa3c5be7d8384c2a216789f7b6ac7513c8296e5757990cfd88
                                                                • Opcode Fuzzy Hash: f4c9a00bd5335a512c6e2cdfdcb9c4e881643e77e15c2ea394c83688fc739c2e
                                                                • Instruction Fuzzy Hash: 2D01256135478182EF24DB26F4AC3576391BB99BD8F44A1348E4E97B45EF3DC045C714
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CancelEventclosesocketsetsockopt
                                                                • String ID:
                                                                • API String ID: 852421847-0
                                                                • Opcode ID: 03eef7d3bc33077443603d47114998edeb02d6415146c2d3186012465a948f41
                                                                • Instruction ID: c1a5f7d032e13fe38c4d75bc28b63830402773aee4a4358cb44e638c3eddcaba
                                                                • Opcode Fuzzy Hash: 03eef7d3bc33077443603d47114998edeb02d6415146c2d3186012465a948f41
                                                                • Instruction Fuzzy Hash: 92F03736201B8183D7248F25F55C35AB331F789BA8F644325DBBA07AA4CF39C0698B40
                                                                APIs
                                                                • SleepEx.KERNEL32 ref: 02878114
                                                                  • Part of subcall function 02879128: malloc.LIBCMT ref: 02879142
                                                                • SleepEx.KERNEL32 ref: 0287828D
                                                                  • Part of subcall function 028792D0: _errno.LIBCMT ref: 028792EF
                                                                  • Part of subcall function 028792D0: _invalid_parameter_noinfo.LIBCMT ref: 028792FB
                                                                  • Part of subcall function 028792D0: _errno.LIBCMT ref: 0287932B
                                                                • SleepEx.KERNEL32 ref: 02878334
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Sleep$_errno$_invalid_parameter_noinfomalloc
                                                                • String ID:
                                                                • API String ID: 3746343157-0
                                                                • Opcode ID: ec7ef44a993b08f6b2c9ca4519243014c8a3f5e72dcfe9431d6523b78c690dc4
                                                                • Instruction ID: 35e578e6f857c5e32abb00751b690772e3fb498f9d50b0c1625de6bb5ad7c757
                                                                • Opcode Fuzzy Hash: ec7ef44a993b08f6b2c9ca4519243014c8a3f5e72dcfe9431d6523b78c690dc4
                                                                • Instruction Fuzzy Hash: E6619934228B488FE755EF28DC95AA977E5FB99300F50852AD44BC32A0DF38D941DB83
                                                                APIs
                                                                • RegQueryInfoKeyW.ADVAPI32 ref: 02E4FCB6
                                                                • RegEnumValueW.ADVAPI32 ref: 02E4FD67
                                                                  • Part of subcall function 02E55378: malloc.LIBCMT ref: 02E55392
                                                                  • Part of subcall function 02E55378: _callnewh.LIBCMT ref: 02E55386
                                                                  • Part of subcall function 02E55378: std::exception::exception.LIBCMT ref: 02E553FF
                                                                • RegCloseKey.ADVAPI32 ref: 02E4FF30
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseEnumInfoQueryValue_callnewhmallocstd::exception::exception
                                                                • String ID:
                                                                • API String ID: 1242514309-0
                                                                • Opcode ID: 3305b858c53ab821ca1a14390b6984ca58f21078f84b97f883c0325d42e4eb17
                                                                • Instruction ID: a4f15d530e429b36508bd2c04a166b9eee846b754c362e211f3b4a6c98d0a786
                                                                • Opcode Fuzzy Hash: 3305b858c53ab821ca1a14390b6984ca58f21078f84b97f883c0325d42e4eb17
                                                                • Instruction Fuzzy Hash: EE818B32751B808ADB00CF6AE89479D73E9F788BA8F419226EE5D87B64EF34C551C700
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 02E4C590
                                                                • GdiplusStartup.GDIPLUS ref: 02E4C5CC
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E4C5E6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterGdiplusLeaveStartup
                                                                • String ID:
                                                                • API String ID: 389129658-0
                                                                • Opcode ID: 95c4991dab0195ebe368ffd66680bcf302dcdb8c8965a393e09ff6184bfe9b5d
                                                                • Instruction ID: ffed8f322e10b8c2df309aa7402224604dd3ede4f9079d3d4a5351a9bf4b43ad
                                                                • Opcode Fuzzy Hash: 95c4991dab0195ebe368ffd66680bcf302dcdb8c8965a393e09ff6184bfe9b5d
                                                                • Instruction Fuzzy Hash: 9C011936688BC6C2EB109F11F94839AB3B5F7A1758F842106E6CA43AA4DF7CC159CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927463578.0000000002D70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02D70000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2d70000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AllocLibraryLoadVirtual
                                                                • String ID:
                                                                • API String ID: 3550616410-0
                                                                • Opcode ID: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
                                                                • Instruction ID: 89949764d7e9c3943acf54668169cc9d3b1b73a4f4b1ae7a9d8d7db67da49b30
                                                                • Opcode Fuzzy Hash: 22a59f860d870a6bcf201ec3191bb530606b5caa03c236b8628a20c22f198a64
                                                                • Instruction Fuzzy Hash: ADB19431614E0A8FDB28DE69C8856B5B3E0FB54316B15423DD88AC7791EB78EC92C7C1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastRead
                                                                • String ID:
                                                                • API String ID: 1948546556-0
                                                                • Opcode ID: 2226a3a8cdd80ab3fdccd84974f2e587e11cbe3bb2805e637b4f5eaf910a6f4a
                                                                • Instruction ID: df4bafc062cc0e5e5e178c5c6e90de72f6cf695decf5896195661e0fbbe3cd7a
                                                                • Opcode Fuzzy Hash: 2226a3a8cdd80ab3fdccd84974f2e587e11cbe3bb2805e637b4f5eaf910a6f4a
                                                                • Instruction Fuzzy Hash: 6D415B62B08B4189EF248F66D5503BD23B1EB58B88F548835DE5D4BBE9DF7CE8518300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: String$AllocFree
                                                                • String ID:
                                                                • API String ID: 344208780-0
                                                                • Opcode ID: 2ff8072f682cb467b12351a1f9e4afe1b1f9cbb5b4c9ea14b380adfe7e6cb5a0
                                                                • Instruction ID: 192699124c2b3737d0aaf8f92a1ff945602a31e91503484b45c031109696202b
                                                                • Opcode Fuzzy Hash: 2ff8072f682cb467b12351a1f9e4afe1b1f9cbb5b4c9ea14b380adfe7e6cb5a0
                                                                • Instruction Fuzzy Hash: DA218031282B5183EF199F25F118328B268AF86BACF18D6298E690B794EF7CC4118710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: send
                                                                • String ID:
                                                                • API String ID: 2809346765-0
                                                                • Opcode ID: 2e59fa7294a7467a9ddcbc0dceddb505d2c61d6133225b8cfaa6b415a71a6c04
                                                                • Instruction ID: dbb23479c0662876c2ef1504dfd10c7c7dc5fc6ffca6530cb73a7546fa2c55b9
                                                                • Opcode Fuzzy Hash: 2e59fa7294a7467a9ddcbc0dceddb505d2c61d6133225b8cfaa6b415a71a6c04
                                                                • Instruction Fuzzy Hash: CF113B22784B9041D7209F66F84872A7754F788BDCF24B262EF5A83F50EFB4C4428700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateHeapfree
                                                                • String ID:
                                                                • API String ID: 2345683253-0
                                                                • Opcode ID: 5d2529e43311571c4d53081da16a5924c6b544396f16fa9d2cc74c1f8e83265e
                                                                • Instruction ID: c79bdff32f5e6bc3f4ee3f254c57f9d32250817a93fb2cc683ad0faf26bf7c47
                                                                • Opcode Fuzzy Hash: 5d2529e43311571c4d53081da16a5924c6b544396f16fa9d2cc74c1f8e83265e
                                                                • Instruction Fuzzy Hash: 6C1112B4928B298FDBA4DF19E4C83117BE8FB58714F60459EA90DCB21AC770C881CBC5
                                                                APIs
                                                                • PostThreadMessageA.USER32 ref: 028785B2
                                                                  • Part of subcall function 028773D0: _wcsrev.LIBCMT ref: 02877411
                                                                • CreateThread.KERNEL32 ref: 028785DE
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Thread$CreateMessagePost_wcsrev
                                                                • String ID:
                                                                • API String ID: 4143106411-0
                                                                • Opcode ID: 152ae417eb4b62f33c842a60702934fe7b1e65802cfc5c2bd98c8d5dbe26bc31
                                                                • Instruction ID: d96d2a9ed2f4c4a091e93192685ba5f1b5aa99c4b4fffbcf36b3a712f0b10b4a
                                                                • Opcode Fuzzy Hash: 152ae417eb4b62f33c842a60702934fe7b1e65802cfc5c2bd98c8d5dbe26bc31
                                                                • Instruction Fuzzy Hash: DE0121707145058FE728EF75EC5D0397BE2FB89316B41863A9457C2DB0DF3C4401AA42
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateHeapfree
                                                                • String ID:
                                                                • API String ID: 2345683253-0
                                                                • Opcode ID: f3c853349a5c59fd3449079867ad891792ce2dd8b9137124cb1d366ba339df00
                                                                • Instruction ID: 6cfb86ee6ca5bd44e364f8fd4423e86bb5a0a5b318c4889160675fe6992ae63c
                                                                • Opcode Fuzzy Hash: f3c853349a5c59fd3449079867ad891792ce2dd8b9137124cb1d366ba339df00
                                                                • Instruction Fuzzy Hash: 63111BB25217608AEB54CF69E48031977B8F748F4CF25911AEB4957B58CB78C492CB84
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: closesocketsetsockopt
                                                                • String ID:
                                                                • API String ID: 553142124-0
                                                                • Opcode ID: 77c2693313518921cd1b9c8efffd3d9e865a5c66b2e60eb56a87be25d9ebaed2
                                                                • Instruction ID: 910e323d4daa8776be3de1b21976ded997d5479c2385cff88ddb9154c4ebd003
                                                                • Opcode Fuzzy Hash: 77c2693313518921cd1b9c8efffd3d9e865a5c66b2e60eb56a87be25d9ebaed2
                                                                • Instruction Fuzzy Hash: AA016D30218A058FD744DF68D848796B7B1FB88315F50432CE15DC72A0CB399851CB82
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: SleepTimetime
                                                                • String ID:
                                                                • API String ID: 346578373-0
                                                                • Opcode ID: a0bf3c937420c0917f34046eef8d55b82e3cbf61d4d324ed7221063299da0014
                                                                • Instruction ID: fd6f67d90746e9022c2d5a3c0bf939e7e9dc5995fac24ce852263a3d3960cf0a
                                                                • Opcode Fuzzy Hash: a0bf3c937420c0917f34046eef8d55b82e3cbf61d4d324ed7221063299da0014
                                                                • Instruction Fuzzy Hash: 2D018F3271868487D7288B64F28832D7361F348B89F14A264DB5A03AD4CFB8C0A5C741
                                                                APIs
                                                                • RtlExitUserThread.NTDLL(?,?,?,?,?,?,00000000,0287944E), ref: 02879428
                                                                • _getptd.LIBCMT ref: 02879434
                                                                  • Part of subcall function 0287BB8C: _freefls.LIBCMT ref: 0287BBBF
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ExitThreadUser_freefls_getptd
                                                                • String ID:
                                                                • API String ID: 228602417-0
                                                                • Opcode ID: 547163f4070d09373063701e410eb860625b88fe0da63c6ec4e1739c39c02e3f
                                                                • Instruction ID: e69905fb61e0ec98f88374f71f22393239f8867705bf798c92d90a9cfd0cac64
                                                                • Opcode Fuzzy Hash: 547163f4070d09373063701e410eb860625b88fe0da63c6ec4e1739c39c02e3f
                                                                • Instruction Fuzzy Hash: 27E04F2CB12A080BCE5C73BD58AC63D3297EB84209F4018B8941AC7291ED69C8548B42
                                                                APIs
                                                                  • Part of subcall function 02E5DF0C: GetLastError.KERNEL32 ref: 02E5DF16
                                                                  • Part of subcall function 02E5DF0C: FlsGetValue.KERNEL32 ref: 02E5DF24
                                                                  • Part of subcall function 02E5DF0C: FlsSetValue.KERNEL32 ref: 02E5DF50
                                                                  • Part of subcall function 02E5DF0C: GetCurrentThreadId.KERNEL32 ref: 02E5DF64
                                                                  • Part of subcall function 02E5DF0C: SetLastError.KERNEL32 ref: 02E5DF7C
                                                                • ExitThread.KERNEL32 ref: 02E556B8
                                                                • _getptd.LIBCMT ref: 02E556C4
                                                                  • Part of subcall function 02E5E0E8: FlsGetValue.KERNEL32 ref: 02E5E101
                                                                  • Part of subcall function 02E5E0E8: FlsSetValue.KERNEL32 ref: 02E5E112
                                                                  • Part of subcall function 02E5E0E8: _freefls.LIBCMT ref: 02E5E11B
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Value$ErrorLastThread$CurrentExit_freefls_getptd
                                                                • String ID:
                                                                • API String ID: 3588098115-0
                                                                • Opcode ID: 69fd6f60cbd72f61ca7718c2e2a29e064edf9474930f3cd69f06ff0a27feda29
                                                                • Instruction ID: eb3541a564176fc0513a462fcb09865ef601014920cc035e56b255cc69bdb115
                                                                • Opcode Fuzzy Hash: 69fd6f60cbd72f61ca7718c2e2a29e064edf9474930f3cd69f06ff0a27feda29
                                                                • Instruction Fuzzy Hash: 80E0EC10FA229482DE1C77B2589932C13A2AB99B44F58F878AE0B57741EE3888598B11
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorFileLastPointer
                                                                • String ID:
                                                                • API String ID: 2976181284-0
                                                                • Opcode ID: 399503a04a190bd1bb0aabaca5cbfe31e1b7b0d87cba7a2b7bf6a5cddee4c230
                                                                • Instruction ID: aeb19a95e5e7e565608e5ead8741a3fa0856a5d7b476d155844ad634b74b45e2
                                                                • Opcode Fuzzy Hash: 399503a04a190bd1bb0aabaca5cbfe31e1b7b0d87cba7a2b7bf6a5cddee4c230
                                                                • Instruction Fuzzy Hash: 3CE0EDA6F20A429AFB008BB2D0023E96760A708794F884421CE4C6B3B9DE3CD2E0C200
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateObjectSingleThreadWait
                                                                • String ID:
                                                                • API String ID: 1891408510-0
                                                                • Opcode ID: 91d2d110985bb54daf9c0b435a0f1d873197dfe1a6e7d7fc0f20f16f28882229
                                                                • Instruction ID: ea6c5a49dc150adf85110088d45d8a403e897641e9f1f0022f3bdf53e9bccad4
                                                                • Opcode Fuzzy Hash: 91d2d110985bb54daf9c0b435a0f1d873197dfe1a6e7d7fc0f20f16f28882229
                                                                • Instruction Fuzzy Hash: 7EE04831D54EC081EB609B65FC1D39533E1F795358F505225D55E8A6A0FF3C8545C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap
                                                                • String ID:
                                                                • API String ID: 3298025750-0
                                                                • Opcode ID: 322ddf701f8e41fff6379dea25fe02a973c4d35842ec94fb84da0069814e9fc6
                                                                • Instruction ID: 1bb6382d45c43691fb1f979c7babfe4177d6ddc23b6ba58e20d4094c76aa7cc3
                                                                • Opcode Fuzzy Hash: 322ddf701f8e41fff6379dea25fe02a973c4d35842ec94fb84da0069814e9fc6
                                                                • Instruction Fuzzy Hash: 7C81D612F0D78681FB168B16A9103B996E1AF94BD4F5A8431DE0D4F7F9DE3CE5868300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree
                                                                • String ID:
                                                                • API String ID: 2087232378-0
                                                                • Opcode ID: 2484a8c24aacdb5181f666071a22870bdde20e6a68149a2190386918f630d443
                                                                • Instruction ID: a7a4eff40017d42fc73c883c507e61e6bcb07b3994752dc29047ab74dec3f0a0
                                                                • Opcode Fuzzy Hash: 2484a8c24aacdb5181f666071a22870bdde20e6a68149a2190386918f630d443
                                                                • Instruction Fuzzy Hash: 97410834718B484B8B1CDE1CD896535B7D2FBC9315B1483AEE89EC764ADB30D852CB81
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree
                                                                • String ID:
                                                                • API String ID: 2087232378-0
                                                                • Opcode ID: 934c61882530ec617f1397abced9c4cebe760296fae60a1bd20dee382fa532e9
                                                                • Instruction ID: 6a3a1324893d923fd6dea635106dab494214cdfed1c49a9da2e53777e7c4f835
                                                                • Opcode Fuzzy Hash: 934c61882530ec617f1397abced9c4cebe760296fae60a1bd20dee382fa532e9
                                                                • Instruction Fuzzy Hash: 94216234618E098FDB84EF6DE448625B7E1FBA8311B54866EE45DC3614DB35DCC2CB81
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree
                                                                • String ID:
                                                                • API String ID: 2087232378-0
                                                                • Opcode ID: 530910900c37fe9613c3ff3dda4de058dcfccbb59fe36364dc77c55757d465c3
                                                                • Instruction ID: 588a263a79012b3151eb6e11e5ccd8590e11960f4aa0b7a5b2d46f4d84f76a78
                                                                • Opcode Fuzzy Hash: 530910900c37fe9613c3ff3dda4de058dcfccbb59fe36364dc77c55757d465c3
                                                                • Instruction Fuzzy Hash: 6B21A132764A908BCB45CB2AF544319B3A1F789BC4F549525EB5A97B08EF34D8E28B40
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: f861fd04a91acae02b56f211ce194db17c428f34d9c6967d206541d61889b378
                                                                • Instruction ID: d708e69508616b81b27342b6ef9e0e1225c9ed3817ca91411eaa0d4552c83cee
                                                                • Opcode Fuzzy Hash: f861fd04a91acae02b56f211ce194db17c428f34d9c6967d206541d61889b378
                                                                • Instruction Fuzzy Hash: F1119D52B0DB4681EF2ADB06A4193B992D1BF95B90F8A8531DA0D4F6FDCE3CE5918200
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree
                                                                • String ID:
                                                                • API String ID: 2087232378-0
                                                                • Opcode ID: e37b62da0ecbe8d6c4feb3876bb8c88a6cb38d412b61bd74b990c88d492ffce2
                                                                • Instruction ID: 6f2ba5c23e2718fbd71868d3dc46318fe5aa87e18e875d9560e42cb5e21bf335
                                                                • Opcode Fuzzy Hash: e37b62da0ecbe8d6c4feb3876bb8c88a6cb38d412b61bd74b990c88d492ffce2
                                                                • Instruction Fuzzy Hash: 6A11B231724B8086DB19CF36F544719B3A5EB84BC4F18E125EA4A97B58EF38C8D1CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FreeHeap
                                                                • String ID:
                                                                • API String ID: 3298025750-0
                                                                • Opcode ID: 283917e939114c9ea4e969287793e5911e7826ea4b28176277fceb9dbe71ffba
                                                                • Instruction ID: 060eee6c9199e075c5fe6215e36214be3f2b26b0c49fb5faade672b16583d427
                                                                • Opcode Fuzzy Hash: 283917e939114c9ea4e969287793e5911e7826ea4b28176277fceb9dbe71ffba
                                                                • Instruction Fuzzy Hash: AFE09250F0DB8241FF06DB5A94152B987D2BFD9B80B8A8530EA0D9E2BBCE7CE1408240
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: send
                                                                • String ID:
                                                                • API String ID: 2809346765-0
                                                                • Opcode ID: 993fe9fb8bd5cda1ffd7d49de116850fd78509aad300088003f3a940471f662b
                                                                • Instruction ID: 948ad358acb18b49eb11df4cd99a16e262080bab2376f73181e7007ed8ef2642
                                                                • Opcode Fuzzy Hash: 993fe9fb8bd5cda1ffd7d49de116850fd78509aad300088003f3a940471f662b
                                                                • Instruction Fuzzy Hash: 5E21B63850CB484FD768AA2C988677A72D0F785318F15127DD99EC3262EB70D85356C7
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: 88df6c9814dd7951e769eaa4fec861968935f3fc4ebb5d812e480bd371ef65fc
                                                                • Instruction ID: a0fe48fd8432e5d4ba1e8804061f0b72e963d0094d32bf7aeb202cddd74385c9
                                                                • Opcode Fuzzy Hash: 88df6c9814dd7951e769eaa4fec861968935f3fc4ebb5d812e480bd371ef65fc
                                                                • Instruction Fuzzy Hash: 50015E346146499FD758DB6CD088768B7E1FB48305F4416ADE05EC2191CB74D895C743
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID:
                                                                • API String ID: 3472027048-0
                                                                • Opcode ID: bc31317e1241cbe88b87a2fddbfd8f69b2015d3f2dce8f37f5b894eda6bc4ee3
                                                                • Instruction ID: 10b42ba17488e3b414c7864365416a4ecbdd30ee14c620697ce26bd59c9482f1
                                                                • Opcode Fuzzy Hash: bc31317e1241cbe88b87a2fddbfd8f69b2015d3f2dce8f37f5b894eda6bc4ee3
                                                                • Instruction Fuzzy Hash: DFF03A302109048FEB48EF79D8986A037A1FB9D322F548365A97ACA2F5CB754881CB55
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateHeap
                                                                • String ID:
                                                                • API String ID: 10892065-0
                                                                • Opcode ID: 548033a4c8ebb5abcb3e3bdf629b7b62b8a0c9b1179596de6b3cb96c9a1ceea0
                                                                • Instruction ID: 548fba2405ca45fcce85267fe2584472bfa585cbf6764252a47f72a65b9eb7ea
                                                                • Opcode Fuzzy Hash: 548033a4c8ebb5abcb3e3bdf629b7b62b8a0c9b1179596de6b3cb96c9a1ceea0
                                                                • Instruction Fuzzy Hash: D9E092342145448BFB88AB3CEC5D7A676E1F7C8300F808829F94AC2290EF7CC0818746
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CaptureContextErrorExceptionFileLastPointerRaiseUnwindabort
                                                                • String ID:
                                                                • API String ID: 664057041-0
                                                                • Opcode ID: 2d0025a280a579b495930d2286001d0d54a2ef0b72e951c8eae8ee94cd007ed2
                                                                • Instruction ID: 2477d90fdd25d111658dd0c109c28ae9589d4da938090437fcb0ed85a1d2a5bd
                                                                • Opcode Fuzzy Hash: 2d0025a280a579b495930d2286001d0d54a2ef0b72e951c8eae8ee94cd007ed2
                                                                • Instruction Fuzzy Hash: 76F0A066E197814AEB019B7190043EC7FB0EB49B84F8800A6CE4C6776ACA3CC194C301
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 161731fe925641ee5099e590e89d8e6fb90fe9e2b3f0774f8ef52276d27d0ce1
                                                                • Instruction ID: 604fb81f0137741dd58ed0e7b7de29e94bd7b98505b4fd9a594adf160b7ac0e4
                                                                • Opcode Fuzzy Hash: 161731fe925641ee5099e590e89d8e6fb90fe9e2b3f0774f8ef52276d27d0ce1
                                                                • Instruction Fuzzy Hash: 04816B34618E0A9FDB88EB38C4457A5F7E1FB58305F508269E49EC3255DB34E8A5CBC2
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: memcpy
                                                                • String ID:
                                                                • API String ID: 3510742995-0
                                                                • Opcode ID: a656798fd566d256c0ce5710320f8422d3e48f1eec68ac884756cd555b4fe646
                                                                • Instruction ID: 7d7ca329c41556ead4590de60f0637820ccbbd4507d6012b536e6b60601e34f0
                                                                • Opcode Fuzzy Hash: a656798fd566d256c0ce5710320f8422d3e48f1eec68ac884756cd555b4fe646
                                                                • Instruction Fuzzy Hash: B021C362B1874681EB24CB16E9046A9A776FF55BD4F498032DE4D1B7B5DF3CE181C300
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: malloc
                                                                • String ID:
                                                                • API String ID: 2803490479-0
                                                                • Opcode ID: 39cc25f1d1592ec38f97d23f592d6d99dd08ca8d11843fbf3b6c1325d5cfbae2
                                                                • Instruction ID: 1172a38244b51838ff773fc78e1fd96786351160ce9ed10ee9fc830ccaa93d47
                                                                • Opcode Fuzzy Hash: 39cc25f1d1592ec38f97d23f592d6d99dd08ca8d11843fbf3b6c1325d5cfbae2
                                                                • Instruction Fuzzy Hash: 45212972A0970385EB658F29984436977A0EB45718F298734EA1C4A3F4DB7D9984C780
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927951746.00007FFE013D1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFE013D0000, based on PE: true
                                                                • Associated: 00000005.00000002.2927934110.00007FFE013D0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2927993145.00007FFE01442000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01443000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928011168.00007FFE01470000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928054254.00007FFE01476000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928071715.00007FFE01477000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928088613.00007FFE01478000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                • Associated: 00000005.00000002.2928105686.00007FFE0147B000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_7ffe013d0000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseCurrentFreeHandleHeapPrng
                                                                • String ID:
                                                                • API String ID: 4199747799-0
                                                                • Opcode ID: b3c4c02a552eac96d434e527a25307d62e42745c5ac9181eca9c226ed022625f
                                                                • Instruction ID: faa845cdc87708a113fc48d7d0804a28bc2a3eb537fa4ab0ba56ae88e21a78c0
                                                                • Opcode Fuzzy Hash: b3c4c02a552eac96d434e527a25307d62e42745c5ac9181eca9c226ed022625f
                                                                • Instruction Fuzzy Hash: DFF05E2360468585E7A18F25E9003AD7295AB44FE9F188431DE1C4BBF9CE3CE8C3C300
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$AddressLibraryLoadProc$AllocCreateCurrentDirectoryFileMemoryModuleNameOpenSystemVirtualWrite
                                                                • String ID: %s%s$@$ExitProcess$Kernel32.dll$OpenProcess$WaitForSingleObject$WinExec$Windows\System32\svchost.exe$h
                                                                • API String ID: 675209239-4110464286
                                                                • Opcode ID: 0a9a7cb759e9cd70e4e7ad241d6db3e1b1dac7647f357b7e36e456aaf75e7cd7
                                                                • Instruction ID: c8c1ed88245b531543e09f7c978c3d76917bb85f94f4a3de181bfed75355dd63
                                                                • Opcode Fuzzy Hash: 0a9a7cb759e9cd70e4e7ad241d6db3e1b1dac7647f357b7e36e456aaf75e7cd7
                                                                • Instruction Fuzzy Hash: 57914931254B8186EB20DF62F81C79A73A5F799B88F805125DE4E17B68EF3CC249CB50
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrlenwsprintf$ClipboardGlobal$CountTick$CloseDataLockOpenSizeSleepStateUnlock
                                                                • String ID: [$%s%s$%s%s$%s%s$)$)$5$5$9$[esc]$f
                                                                • API String ID: 4137050888-2084089848
                                                                • Opcode ID: 1b461a56441360ce845689485ed66bb0008adf4a0547f8c3c9596193dca8de7b
                                                                • Instruction ID: e6e5c66cff2ef3e09723e00a26f12502ada78f60183f9323752abaade61463bd
                                                                • Opcode Fuzzy Hash: 1b461a56441360ce845689485ed66bb0008adf4a0547f8c3c9596193dca8de7b
                                                                • Instruction Fuzzy Hash: 7891CD352A0B9196EB14DF61F9483AA33A9F744BC8F44A025EF8E57B64DF38C145C790
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                • String ID: U
                                                                • API String ID: 3902385426-4171548499
                                                                • Opcode ID: 933f7ccd4e57a0c3640cd29298bfcbe6b8f7dd673e4b2ab9a2227a01ddb3188f
                                                                • Instruction ID: f9f94295cf770c8768fae1108bb556706b0b35d0b742b40abb28421955eca30f
                                                                • Opcode Fuzzy Hash: 933f7ccd4e57a0c3640cd29298bfcbe6b8f7dd673e4b2ab9a2227a01ddb3188f
                                                                • Instruction Fuzzy Hash: 9902DF326D4A8186DB208F29E44C37EB761F785BD8F54A116EF9A47B58DB3DC049CB10
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
                                                                • String ID: $@
                                                                • API String ID: 1084558760-1077428164
                                                                • Opcode ID: ec179a5fd378d13b2d58a736491d49f451d9c3920d36331e28fa716487c53895
                                                                • Instruction ID: 7eec543517343454f30406dc077a1e005e753f6fbd953cdb8b3abeb227446c9c
                                                                • Opcode Fuzzy Hash: ec179a5fd378d13b2d58a736491d49f451d9c3920d36331e28fa716487c53895
                                                                • Instruction Fuzzy Hash: C44236726B8AB086DF258B68E5543AE6B61F78779CF24F416DF4A47E64CB38C440CB01
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: write_multi_char$_errno_invalid_parameter_noinfowrite_char$_fileno_getptdfree
                                                                • String ID: $@
                                                                • API String ID: 1084558760-1077428164
                                                                • Opcode ID: 777b2bbc50e84923bb68a82086348877efee093c21b5f3dd8466455b5af6995b
                                                                • Instruction ID: 5bbacec71156c9828597d94ebb3b874577c334ce8e4350c612f31538189d94e0
                                                                • Opcode Fuzzy Hash: 777b2bbc50e84923bb68a82086348877efee093c21b5f3dd8466455b5af6995b
                                                                • Instruction Fuzzy Hash: F74226722B8BB085DB25CB29D9643AE6B61F74578CF28F407DF4A47A64CB78C441CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$Library$FileFree$CloseCreateHandleLoadSleepWrite
                                                                • String ID: InternetCloseHandle$InternetOpenUrlW$InternetOpenW$InternetReadFile$MSIE 6.0$wininet.dll
                                                                • API String ID: 2977986460-1099148085
                                                                • Opcode ID: 3bed2e3fed1dd97c3597bc5c297f86b790980d851acd740cd57b361686804748
                                                                • Instruction ID: 662a039c67d82f0ad46690c408a3f79fd5be6a3a627c32c439015156c4f85660
                                                                • Opcode Fuzzy Hash: 3bed2e3fed1dd97c3597bc5c297f86b790980d851acd740cd57b361686804748
                                                                • Instruction Fuzzy Hash: 5D41A022248AC182EB209F52F95876BB3B1F789BE9F445121DE5A17F55DF3CC145CB10
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcsrev
                                                                • String ID: 1$|$|$|$|$|$|$|$|$|$|$|$|$|$|
                                                                • API String ID: 257396323-483243098
                                                                • Opcode ID: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
                                                                • Instruction ID: c8d3a4a6dc24876f2a1766987b4d173e2432237fd728fcb9abb569c150eddb7a
                                                                • Opcode Fuzzy Hash: e7c24950faba3f9ac85f5f069f5f95afb0107786a1c82c81ace9b637109b25c1
                                                                • Instruction Fuzzy Hash: 82827D3C765E198BDB2E6F2899842F973A5FB9130AB44C53DC487C3266DF7484878B81
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Locale$Info$Valid$CodeDefaultPageUser_amsg_exit_getptd_itow_s
                                                                • String ID: ACP$Norwegian-Nynorsk$OCP
                                                                • API String ID: 1236750932-4064345498
                                                                • Opcode ID: 1f16e3efabc551431a5c0578b677a8b35f1afe1a9ab028db14e8eca5c82f04ed
                                                                • Instruction ID: 80050a9656912784c9b6bfd3f382d5c25394061e74d8b4d7638a232c9eae4d8f
                                                                • Opcode Fuzzy Hash: 1f16e3efabc551431a5c0578b677a8b35f1afe1a9ab028db14e8eca5c82f04ed
                                                                • Instruction Fuzzy Hash: 7E71A9722E078186EB259F21E45C3B9776AFB84BCCF08E426DE4A47A98DB7CC445C710
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateFile$Mutex$CloseCountDeleteDirectFolderHandleInput8ObjectPathReleaseSingleSizeStateTickWaitlstrcat
                                                                • String ID: <$\DisplaySessionContainers.log
                                                                • API String ID: 1095970075-1170057892
                                                                • Opcode ID: a7707feeb2605cd531d5f7e39eeb4ae4399d5209c77fcb40601b151f21c5fa34
                                                                • Instruction ID: 4d57ab9b516c2b6e54c695dc01bc84485f74361ee70d7df115f4e7be56aa6152
                                                                • Opcode Fuzzy Hash: a7707feeb2605cd531d5f7e39eeb4ae4399d5209c77fcb40601b151f21c5fa34
                                                                • Instruction Fuzzy Hash: 49514675394A8586EB14CF66F85C79A3764FB88B89F809016DE8E4BB25CF3DC049CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrcatlstrlen$CreateEnvironmentExpandProcessStringslstrcpywsprintf
                                                                • String ID: $"%1$%s\shell\open\command$WinSta0\Default$h
                                                                • API String ID: 1783372451-2159495357
                                                                • Opcode ID: 753f1e88c2c9bcdca436a99e464efae067fe74ee41da2aa91f75f24b88240b9b
                                                                • Instruction ID: 78a74d35add3e49deafbcddbbf273bb7523f926340f9372163f0ed915d79ad0a
                                                                • Opcode Fuzzy Hash: 753f1e88c2c9bcdca436a99e464efae067fe74ee41da2aa91f75f24b88240b9b
                                                                • Instruction Fuzzy Hash: 1851A172360A9595EF20DF65E8587E97365FB8878CF809025DE0E47E68EF78C205CB50
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                • String ID: U
                                                                • API String ID: 3902385426-4171548499
                                                                • Opcode ID: fd271239539acf2b13b727adbdf7d8bf5a9ea02c1789f650ce691eb56d9289ff
                                                                • Instruction ID: e4b195b4a2641c6738d159b0e69833498d3d6c04f485f613192a7d61413c2c6f
                                                                • Opcode Fuzzy Hash: fd271239539acf2b13b727adbdf7d8bf5a9ea02c1789f650ce691eb56d9289ff
                                                                • Instruction Fuzzy Hash: D022083D218A498BD719DF6CC8857BA73E2FB95714F14066DE88BC3291DB34D442CB82
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __doserrno_errno_invalid_parameter_noinfo
                                                                • String ID: U
                                                                • API String ID: 3902385426-4171548499
                                                                • Opcode ID: a53fb3a3fee9462e519b52e12cf248d97590bd87bcb355640138ed9d24c52b54
                                                                • Instruction ID: 685a2c32a30eb9a9957f273f7bef5c9601cc575faa73133b1b2f97ccecf6bd3d
                                                                • Opcode Fuzzy Hash: a53fb3a3fee9462e519b52e12cf248d97590bd87bcb355640138ed9d24c52b54
                                                                • Instruction Fuzzy Hash: 5622D439218A498FE71A9F28C8457EA77E1FF95705F94061DE88BC3351DB34E446CB82
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: DecodePointerwrite_multi_char$_errno_invalid_parameter_noinfo$_getptdfreewrite_char
                                                                • String ID:
                                                                • API String ID: 3562693915-0
                                                                • Opcode ID: e017b06b56cf3657e822e1d9cdd52de123d41ff819c9629cd0d88fe18efbce1b
                                                                • Instruction ID: 79490d2f19183f7d9e2c2c3c737b35a2bc829575c77d4e85941631c9cb23df65
                                                                • Opcode Fuzzy Hash: e017b06b56cf3657e822e1d9cdd52de123d41ff819c9629cd0d88fe18efbce1b
                                                                • Instruction Fuzzy Hash: D542DE766C868086DB268B65D4483BE6B71F7817C8F28E116EF4E8FB94DB79C441CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Close$OpenQueryValuelstrcpy
                                                                • String ID: %08X
                                                                • API String ID: 2032971926-3773563069
                                                                • Opcode ID: 0207c94b67bd13682df5198da5d4066036a53627cf85588037e8996df98b4a62
                                                                • Instruction ID: 47f3d9947ca804e56700d66679f8d63c918280ee16c3848d1bd50765f921a7eb
                                                                • Opcode Fuzzy Hash: 0207c94b67bd13682df5198da5d4066036a53627cf85588037e8996df98b4a62
                                                                • Instruction Fuzzy Hash: 64515471358A8092DB60CF55F44879AB361F7C9B94F90A226EB9E43F68DF38C145CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Thread$ContextProcess$AllocCreateDirectoryMemoryResumeSystemVirtualWrite
                                                                • String ID: %s%s$@$Windows\System32\svchost.exe$h
                                                                • API String ID: 4033188109-2160973000
                                                                • Opcode ID: f34bcb2dd40bef71e100a131e5ce0c990cbd285b2e4561fe4d7e6fc0a56b66df
                                                                • Instruction ID: 04099a16e993b4e862d509034e548f64a2118a55f1433138d7da84fc6cb83e51
                                                                • Opcode Fuzzy Hash: f34bcb2dd40bef71e100a131e5ce0c990cbd285b2e4561fe4d7e6fc0a56b66df
                                                                • Instruction Fuzzy Hash: 54416C72244BC186EB20CF62F85479AB7A5F788788F446015DB8E57A68DF7DC115CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$HandleOpenToken$AddressAdjustCloseCurrentLookupModulePrivilegePrivilegesProcValue
                                                                • String ID: NtDll.dll$NtSetInformationProcess$SeDebugPrivilege
                                                                • API String ID: 2787840106-1577477132
                                                                • Opcode ID: 006c88d0e4742fc9033daaec659e694211f69195633ac62cbb13f472629f2bb1
                                                                • Instruction ID: 755c9d81be42f740b209340ffb0e0ce6ef3cd92da712db81c30a891e70b4bdcc
                                                                • Opcode Fuzzy Hash: 006c88d0e4742fc9033daaec659e694211f69195633ac62cbb13f472629f2bb1
                                                                • Instruction Fuzzy Hash: 3E217172659B8582EB10DB61F41C39A73A0FBD9B88F801115DA4F47B54EF7CC149CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CreateEvent$CountCriticalInitializeSectionSpinTimetime
                                                                • String ID: <$<
                                                                • API String ID: 4111701721-213342407
                                                                • Opcode ID: 048dc3425349f8fc4623e606ca67483624ffdc734d22f1d365165c3f50b062b1
                                                                • Instruction ID: 41b2b69dfa526012065e03198287836b3dfb6da4ad857892230ee99fb48b8977
                                                                • Opcode Fuzzy Hash: 048dc3425349f8fc4623e606ca67483624ffdc734d22f1d365165c3f50b062b1
                                                                • Instruction Fuzzy Hash: 10817972252B9186E7489F30F85879D37A9F344F4CF18923AEE598BB98CF788051CB54
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: DecodePointerwrite_multi_char$_errno$_getptd_invalid_parameter_noinfofreewrite_char
                                                                • String ID:
                                                                • API String ID: 1806013980-0
                                                                • Opcode ID: 1552cd673f4c9009c00e4e5aebb7c2d1653934e03051cbe30d545ed572ffd0fa
                                                                • Instruction ID: ca964225cfc93eabee2f3394c4795adbf50daebf878bff8cd4e9c5f053e8331c
                                                                • Opcode Fuzzy Hash: 1552cd673f4c9009c00e4e5aebb7c2d1653934e03051cbe30d545ed572ffd0fa
                                                                • Instruction Fuzzy Hash: A94214726A86A086EB258F65DC403AE77B2F78279CF14B116DF4A97B94DB78C441CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: File_set_error_mode$HandleModuleNameWrite
                                                                • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                                • API String ID: 1085760375-4022980321
                                                                • Opcode ID: bec6e322233c2a72ef1b69bf324003f95e38173e60baee35a0643b7f6f4324e7
                                                                • Instruction ID: e0c24b97a209d0e32cf7c78882667877da3894b52845155277a16658040336bb
                                                                • Opcode Fuzzy Hash: bec6e322233c2a72ef1b69bf324003f95e38173e60baee35a0643b7f6f4324e7
                                                                • Instruction Fuzzy Hash: E151E3353A47A086EB24DB26B82875A7356FB857C8FA4B116EE5A43B54DF3CC105CA04
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _get_daylight$_errno_isindst$__getgmtimebuf__tzset_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 1457502553-0
                                                                • Opcode ID: fc98137501184263b1711a368e79b6b7fedf990296f419f9690ea9b2a4686320
                                                                • Instruction ID: ce8ac296183c590d97114ae3c941bbe29658ce5202a2a81e05317df09d370339
                                                                • Opcode Fuzzy Hash: fc98137501184263b1711a368e79b6b7fedf990296f419f9690ea9b2a4686320
                                                                • Instruction Fuzzy Hash: 7381C3B27607698BDB289F75C9557A963A6E7547C8F44E036EF0D8BB48EB38D100CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID: SeShutdownPrivilege
                                                                • API String ID: 3435690185-3733053543
                                                                • Opcode ID: 3b408c9696417f386299ba55a60d1e887952e7de7df739ea596fa54433349fd8
                                                                • Instruction ID: dcff6d3164a5393ad5fc3138d5eb15ef8876a2e63aaf5dca9864a67f7bf32b17
                                                                • Opcode Fuzzy Hash: 3b408c9696417f386299ba55a60d1e887952e7de7df739ea596fa54433349fd8
                                                                • Instruction Fuzzy Hash: 85118272668A8082EB509F25F45D35A73A0F7D8B85F806415E94F97A64DF3CC045CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo$_cftoe_l_getptd
                                                                • String ID: gfffffff
                                                                • API String ID: 1282097019-1523873471
                                                                • Opcode ID: 2ccce6238921ff669830667409cdcc1f0cb7341e5ebed707410b45c5fc83ee90
                                                                • Instruction ID: 6557aa79bbd007dcb8567cdb13701f6c84968222d83a79bad3415d96fd49312f
                                                                • Opcode Fuzzy Hash: 2ccce6238921ff669830667409cdcc1f0cb7341e5ebed707410b45c5fc83ee90
                                                                • Instruction Fuzzy Hash: 57A134637947C48ADB15CB3AC6483BD7BA5E7127E8F04E622DF590B796E7389025C310
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessVirtualWrite$AllocCreateFreeObjectRemoteSingleThreadWait
                                                                • String ID: @
                                                                • API String ID: 1392168757-2766056989
                                                                • Opcode ID: ebdf221f38e794e2455333eaf63dd99797fa0bae23e01971042895992485c932
                                                                • Instruction ID: dce939f9673aa2cf6e1e760dd6d46751a74419fa52430a8bad1d7d44b3240825
                                                                • Opcode Fuzzy Hash: ebdf221f38e794e2455333eaf63dd99797fa0bae23e01971042895992485c932
                                                                • Instruction Fuzzy Hash: 47313A32248B8486EB60CB26F91875AB7A5F799BD4F545225EACD43F58DF3CC111CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID: SeDebugPrivilege
                                                                • API String ID: 3398352648-2896544425
                                                                • Opcode ID: 4520cdda6bbee7e720759b10c361dc6be193f20f51fac45c03cbca138d1582c9
                                                                • Instruction ID: 3de038f2a76bddd1a05aa7eec06f7b94a1693520f4fa3b33e6009e7bc4fe6463
                                                                • Opcode Fuzzy Hash: 4520cdda6bbee7e720759b10c361dc6be193f20f51fac45c03cbca138d1582c9
                                                                • Instruction Fuzzy Hash: 79015272268B8582EB40DF25F84C34A77B0F798B98F802015EA8F43A24DF7CC059CB40
                                                                APIs
                                                                • RtlCaptureContext.KERNEL32 ref: 02E5B7BF
                                                                • RtlLookupFunctionEntry.KERNEL32 ref: 02E5B7DE
                                                                • RtlVirtualUnwind.KERNEL32 ref: 02E5B82A
                                                                • IsDebuggerPresent.KERNEL32 ref: 02E5B89C
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 02E5B8B4
                                                                • UnhandledExceptionFilter.KERNEL32 ref: 02E5B8C1
                                                                • GetCurrentProcess.KERNEL32 ref: 02E5B8DA
                                                                • TerminateProcess.KERNEL32 ref: 02E5B8E8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 3778485334-0
                                                                • Opcode ID: 1c94f059e661cec249e69166cae7fc2ba1f8093385c11fe141dccac600b505b7
                                                                • Instruction ID: 919d4efa7f5fd77531380ff80453aa02cd60a49406a7011f42dc62839df8aa16
                                                                • Opcode Fuzzy Hash: 1c94f059e661cec249e69166cae7fc2ba1f8093385c11fe141dccac600b505b7
                                                                • Instruction Fuzzy Hash: 72313635299BC586EB50DF51F84C39A73A4F785398F50502AEA8E43BA8EF7DC094CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoLocalefree$ErrorLastSleep
                                                                • String ID:
                                                                • API String ID: 3746651342-0
                                                                • Opcode ID: f411498c33e338e04b103db1a04ef947ba4a4d6889c3b4acdbdfe8f2a9a6c589
                                                                • Instruction ID: 9e3b2f3a5e28f4c2cc8d4ebd362c7417b3606b87e3deb95d6efb75b9a9ebbaa6
                                                                • Opcode Fuzzy Hash: f411498c33e338e04b103db1a04ef947ba4a4d6889c3b4acdbdfe8f2a9a6c589
                                                                • Instruction Fuzzy Hash: E34129227707A442EB349B62A81877A72D5BB94BCCF04F125DE0A47B45EF7DC501CB41
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Event$ClearCloseOpen
                                                                • String ID: Application$Security$System
                                                                • API String ID: 1391105993-2169399579
                                                                • Opcode ID: 3bc1dfbc75c3ebd05fd2da803e87ea6cab878e66fd4d64df736414c5c99f1579
                                                                • Instruction ID: 61fca9cb93d29aebd3bba9e6d19f7db23865b4607da6b911505e70b29bedd2d1
                                                                • Opcode Fuzzy Hash: 3bc1dfbc75c3ebd05fd2da803e87ea6cab878e66fd4d64df736414c5c99f1579
                                                                • Instruction Fuzzy Hash: 75F0363668AF80C5EB56DF25F84839573A4F758798F449136CD5E03B64EE38C155D300
                                                                APIs
                                                                • RtlCaptureContext.KERNEL32 ref: 02E5C231
                                                                • RtlLookupFunctionEntry.KERNEL32 ref: 02E5C249
                                                                • RtlVirtualUnwind.KERNEL32 ref: 02E5C283
                                                                • IsDebuggerPresent.KERNEL32 ref: 02E5C2B9
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 02E5C2C3
                                                                • UnhandledExceptionFilter.KERNEL32 ref: 02E5C2CE
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                • String ID:
                                                                • API String ID: 1239891234-0
                                                                • Opcode ID: 3d258a40fe85b90a637c04ac03ec31110b46b64e3441f59e6290187bd834b7bf
                                                                • Instruction ID: 2daf94bd0df70abb13a93d74a382cb131c9249d950c58174055d83dc7fceae3d
                                                                • Opcode Fuzzy Hash: 3d258a40fe85b90a637c04ac03ec31110b46b64e3441f59e6290187bd834b7bf
                                                                • Instruction Fuzzy Hash: 4B31BE32254F8186DB20CF65E8547AE73A4F7887A8F60622AEE9D43B58DF38C555CB00
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32 ref: 02E48E13
                                                                • OpenProcessToken.ADVAPI32 ref: 02E48E26
                                                                • LookupPrivilegeValueW.ADVAPI32 ref: 02E48E55
                                                                • AdjustTokenPrivileges.ADVAPI32 ref: 02E48E9A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                                • String ID: SeDebugPrivilege
                                                                • API String ID: 2349140579-2896544425
                                                                • Opcode ID: e89a9577fea48bf07b96b5dd8fdb992d40661bb12393655a7267710922112fa6
                                                                • Instruction ID: dd1464f403e893783824da7b23146941317362beebf706179cc3bd92bfcfa093
                                                                • Opcode Fuzzy Hash: e89a9577fea48bf07b96b5dd8fdb992d40661bb12393655a7267710922112fa6
                                                                • Instruction Fuzzy Hash: 39112176659B8182EB50DF65F84938AB3A0F7D9B88FC45016EA8E47B14DF7DC019CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree$Timetime
                                                                • String ID:
                                                                • API String ID: 3637049079-0
                                                                • Opcode ID: 315d6375471e1a4f99404568f3a68aecd704ec3ded472f731a93e9d2a0cb6b08
                                                                • Instruction ID: 16bc0dcd657cd1b15f3e7a03b0710fca728f12f066774526c2734295fac729e1
                                                                • Opcode Fuzzy Hash: 315d6375471e1a4f99404568f3a68aecd704ec3ded472f731a93e9d2a0cb6b08
                                                                • Instruction Fuzzy Hash: 5191F132310B9497CB19DF2AE154B6D77A2FB45B88F10E529DE0A87B44EF34D9A1CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocFree$Timetime
                                                                • String ID:
                                                                • API String ID: 3637049079-0
                                                                • Opcode ID: 84916634be90c530f7462dae8c686f5c956e195b309b681075306a52318ba857
                                                                • Instruction ID: 54594809eb9bf2adf31f620c69bab8d2f11672e2c451b992d1f36054abf921cb
                                                                • Opcode Fuzzy Hash: 84916634be90c530f7462dae8c686f5c956e195b309b681075306a52318ba857
                                                                • Instruction Fuzzy Hash: 30911372350A949BCB19CF29E15476D73A1F784B88F84D529DF0A87B04EF34D9A1C780
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E65D77
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                • GetLocaleInfoA.KERNEL32 ref: 02E65DAC
                                                                • GetLocaleInfoA.KERNEL32 ref: 02E65E04
                                                                • GetLocaleInfoA.KERNEL32 ref: 02E65EF8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale$_amsg_exit_getptd
                                                                • String ID:
                                                                • API String ID: 3133215516-0
                                                                • Opcode ID: f3123c2221976c618b7d76a248a557ec73608dd870584710d301b4c347307875
                                                                • Instruction ID: 4b6018aed6b444c8f50b8ac64ea1796da1ca62df4b2ee4052d0bcce946db86bd
                                                                • Opcode Fuzzy Hash: f3123c2221976c618b7d76a248a557ec73608dd870584710d301b4c347307875
                                                                • Instruction Fuzzy Hash: 53615072390AC1DBDB198F61D95C7EEB3A1F788789F84A02AD71987744DB38E464CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale$ByteCharMultiWidefree
                                                                • String ID:
                                                                • API String ID: 40707599-0
                                                                • Opcode ID: 9d849a486a771a2ba975f60ce01952f084c2181aa9eeb1ca35fe4748fd4a6f39
                                                                • Instruction ID: 7d9dc8609d1157fba21dcfb79576e987213981126c6cb05b945c5903186cbfc4
                                                                • Opcode Fuzzy Hash: 9d849a486a771a2ba975f60ce01952f084c2181aa9eeb1ca35fe4748fd4a6f39
                                                                • Instruction Fuzzy Hash: 4E318332690B808ADB109F65D8487A9BBA6F744BECF58A615EF6E47F94DB38C401C710
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E5B0F5
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                  • Part of subcall function 02E5AE80: _getptd.LIBCMT ref: 02E5AEBA
                                                                  • Part of subcall function 02E5A7E0: malloc.LIBCMT ref: 02E5A80B
                                                                  • Part of subcall function 02E5A7E0: Sleep.KERNEL32 ref: 02E5A81E
                                                                • free.LIBCMT ref: 02E5B352
                                                                • free.LIBCMT ref: 02E5B389
                                                                • free.LIBCMT ref: 02E5B396
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_getptd$Sleep_amsg_exitmalloc
                                                                • String ID:
                                                                • API String ID: 1310838139-0
                                                                • Opcode ID: 82d67bd4074a8292135078b0dbf5279acc9a43100bda11809bbff80ac0b4c86f
                                                                • Instruction ID: 54e067e6bbe36475e3c95ae28a9ed04fab8eb9a9bbb14bb0619bec9bb968cfa9
                                                                • Opcode Fuzzy Hash: 82d67bd4074a8292135078b0dbf5279acc9a43100bda11809bbff80ac0b4c86f
                                                                • Instruction Fuzzy Hash: C691DE322657949ACB24DF26E58479EB7A1F78878CF50912AEF4E47B18EF38D055CB00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                • API String ID: 0-2761157908
                                                                • Opcode ID: 88125a201e65d8ed1bd1aa500e04f75a90837a246ad31d7ce44a8951280eefc8
                                                                • Instruction ID: b7cf5a35565c4b4eb94f26ad177d75a59795434ad6ff1ae90347c8589a792ecf
                                                                • Opcode Fuzzy Hash: 88125a201e65d8ed1bd1aa500e04f75a90837a246ad31d7ce44a8951280eefc8
                                                                • Instruction Fuzzy Hash: 7652FF77BA46908BE724CFB5C018BBD37B2B75478CB50F01ADE86A7A48E7348515CB44
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2819658684-0
                                                                • Opcode ID: 5302ddf32cfdaea319d3eae1ccb86372f1c86f96e15f9b218755445e13fbde08
                                                                • Instruction ID: dbf226c8e3b284f7c65f4d5a59784a1105af7086648ff055e363a63ba6749fdb
                                                                • Opcode Fuzzy Hash: 5302ddf32cfdaea319d3eae1ccb86372f1c86f96e15f9b218755445e13fbde08
                                                                • Instruction Fuzzy Hash: 9E610AB2B5164A4BCF1C8F28DC657746656B798788F48E136EA0A8F798F73CE6018740
                                                                APIs
                                                                • _fileno.LIBCMT ref: 02E6368A
                                                                  • Part of subcall function 02E62988: _errno.LIBCMT ref: 02E62991
                                                                  • Part of subcall function 02E62988: _invalid_parameter_noinfo.LIBCMT ref: 02E6299C
                                                                • ReadFile.KERNEL32 ref: 02E63777
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: FileRead_errno_fileno_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 1416837532-0
                                                                • Opcode ID: 309e42a65739554cb7027ffa9ae403e92d91995be6d779599bdefef1943cc8b0
                                                                • Instruction ID: f2aed23356c4ca1f8ceb805a1476cfab2a204f5fc69fce97dad44459661820a6
                                                                • Opcode Fuzzy Hash: 309e42a65739554cb7027ffa9ae403e92d91995be6d779599bdefef1943cc8b0
                                                                • Instruction Fuzzy Hash: F671BB227C5A849ADB21CE25D44C3BA6B61F740FDCF48E59AEE4A07B98DB39D081C700
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E66042
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                • GetLocaleInfoA.KERNEL32 ref: 02E66077
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale_amsg_exit_getptd
                                                                • String ID:
                                                                • API String ID: 488165793-0
                                                                • Opcode ID: 7a4bdbe237ab676890a3ead7a57c4d4f21b5585354efe19da6d086acf39470f5
                                                                • Instruction ID: 38c962db6c7ea955eae8566de619373ad93480e2eb8927bf62576d9efe0335bc
                                                                • Opcode Fuzzy Hash: 7a4bdbe237ab676890a3ead7a57c4d4f21b5585354efe19da6d086acf39470f5
                                                                • Instruction Fuzzy Hash: 8121D232790AC197DB289B25E9093E9B3A6F7C8789F40A026D71E87644DF3CD464CB00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .$l$n
                                                                • API String ID: 0-2376909228
                                                                • Opcode ID: 6efd494f1771a83e1622dba27cf1971ef9d7551aafc06c164830ee9e4ee08136
                                                                • Instruction ID: fb0f80af8188e57ce9739f4a9ca1c65ed77c7e3edc9a21bf8910386ddfd8c31b
                                                                • Opcode Fuzzy Hash: 6efd494f1771a83e1622dba27cf1971ef9d7551aafc06c164830ee9e4ee08136
                                                                • Instruction Fuzzy Hash: AAB1B038618B488FEB69EF68D8847EA73E2FF99304F00452ED54EC7261DB789544CB42
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2959964966-0
                                                                • Opcode ID: ae4538f1a2572c5f67e6bc6f8f9159affb98521cd537506b2088318c8aa4d645
                                                                • Instruction ID: b8877df39918db4e51f680b4572b93e2db1763e03e20d472be8b05db29039ab3
                                                                • Opcode Fuzzy Hash: ae4538f1a2572c5f67e6bc6f8f9159affb98521cd537506b2088318c8aa4d645
                                                                • Instruction Fuzzy Hash: C322EC76BD42848AEB248F69D098BFC3766B7107CCF84A01EDE46F7A95D7398546C700
                                                                APIs
                                                                • _set_error_mode.LIBCMT ref: 0287A351
                                                                • _set_error_mode.LIBCMT ref: 0287A362
                                                                  • Part of subcall function 0287DE90: _errno.LIBCMT ref: 0287DEAF
                                                                  • Part of subcall function 0287DE90: _invalid_parameter_noinfo.LIBCMT ref: 0287DEBB
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _set_error_mode$_errno_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 1239817535-0
                                                                • Opcode ID: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
                                                                • Instruction ID: c0e95c700d8fbf74322cf6bbd6ebe93c66c05e0a958a3dcee7fba8e29f83c910
                                                                • Opcode Fuzzy Hash: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
                                                                • Instruction Fuzzy Hash: F751C13D218A484BDB6CEF28A85966E73D6EB94304F00852EE89FC3191DF35D5068A47
                                                                APIs
                                                                • _set_error_mode.LIBCMT ref: 028BAA5E
                                                                • _set_error_mode.LIBCMT ref: 028BAA6F
                                                                  • Part of subcall function 028BE59D: _errno.LIBCMT ref: 028BE5BC
                                                                  • Part of subcall function 028BE59D: _invalid_parameter_noinfo.LIBCMT ref: 028BE5C8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _set_error_mode$_errno_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 1239817535-0
                                                                • Opcode ID: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
                                                                • Instruction ID: 343f4dfd7aaa0060925a9333a7fd5d8ba7477544a26896c74f272c9bf64959dd
                                                                • Opcode Fuzzy Hash: 44de1f721c027da7a128cc94a5ad70c9ea0fd816ea6c17f66893cfbd735dff7b
                                                                • Instruction Fuzzy Hash: 5851D53D318A494FA72EEF2CA8952AE73D6EF88305F40452ED49FC3291DF34C5068A46
                                                                APIs
                                                                • _get_daylight.LIBCMT ref: 02E60686
                                                                  • Part of subcall function 02E60D00: _errno.LIBCMT ref: 02E60D09
                                                                  • Part of subcall function 02E60D00: _invalid_parameter_noinfo.LIBCMT ref: 02E60D14
                                                                • _get_daylight.LIBCMT ref: 02E6070C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _get_daylight$_errno_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 3559991230-0
                                                                • Opcode ID: 52ea9ba5fbf5ede55e2a5c23ec7a03d404610338de9f7afb62735d1d5f3e1368
                                                                • Instruction ID: 951a1928978d74b3a79b6318f063685329c41262bb29d1b2d88084d047dbf290
                                                                • Opcode Fuzzy Hash: 52ea9ba5fbf5ede55e2a5c23ec7a03d404610338de9f7afb62735d1d5f3e1368
                                                                • Instruction Fuzzy Hash: CC812872B942654BD72CCF29ED597A86756F3D8388F44E135EA06CBB94E738E600CB40
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E65BFF
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                • GetLocaleInfoA.KERNEL32 ref: 02E65C34
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale_amsg_exit_getptd
                                                                • String ID:
                                                                • API String ID: 488165793-0
                                                                • Opcode ID: a79cb05d7a59cd07edb9214c990442f87c4db8d832ef21515e078df8ae412a83
                                                                • Instruction ID: 4fcc714ff33b80ebab7d1673285cb768649a7542f07548ab53ec81a475642ea7
                                                                • Opcode Fuzzy Hash: a79cb05d7a59cd07edb9214c990442f87c4db8d832ef21515e078df8ae412a83
                                                                • Instruction Fuzzy Hash: 8911D332380BC096DB28CF25E8493EA73A2F388BC8F849122DB5D87714DB38D455CB00
                                                                APIs
                                                                  • Part of subcall function 02E48BE0: GetModuleFileNameW.KERNEL32 ref: 02E48C0B
                                                                  • Part of subcall function 02E48BE0: GetCommandLineW.KERNEL32 ref: 02E48C11
                                                                  • Part of subcall function 02E48BE0: GetStartupInfoW.KERNEL32 ref: 02E48C1F
                                                                  • Part of subcall function 02E48BE0: CreateProcessW.KERNEL32 ref: 02E48C62
                                                                  • Part of subcall function 02E48BE0: ExitProcess.KERNEL32 ref: 02E48C6B
                                                                • ExitProcess.KERNEL32 ref: 02E4E09F
                                                                  • Part of subcall function 02E492E0: GetCurrentProcess.KERNEL32 ref: 02E492F7
                                                                  • Part of subcall function 02E492E0: OpenProcessToken.ADVAPI32 ref: 02E4930A
                                                                  • Part of subcall function 02E492E0: LookupPrivilegeValueW.ADVAPI32 ref: 02E49335
                                                                  • Part of subcall function 02E492E0: AdjustTokenPrivileges.ADVAPI32 ref: 02E49358
                                                                  • Part of subcall function 02E492E0: GetLastError.KERNEL32 ref: 02E4935E
                                                                  • Part of subcall function 02E492E0: CloseHandle.KERNEL32 ref: 02E4936D
                                                                • ExitWindowsEx.USER32 ref: 02E4E0B5
                                                                  • Part of subcall function 02E492E0: CloseHandle.KERNEL32 ref: 02E49388
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$Exit$CloseHandleToken$AdjustCommandCreateCurrentErrorFileInfoLastLineLookupModuleNameOpenPrivilegePrivilegesStartupValueWindows
                                                                • String ID:
                                                                • API String ID: 2667809516-0
                                                                • Opcode ID: b3d21a28ab8203c73efd544b6153422eeffcacae9f052cfca13134f61e2c620e
                                                                • Instruction ID: 897d0e1917247f2fefb07ed0b67912273814343e3e21c74b6ce6e991cd96b1db
                                                                • Opcode Fuzzy Hash: b3d21a28ab8203c73efd544b6153422eeffcacae9f052cfca13134f61e2c620e
                                                                • Instruction Fuzzy Hash: 59E086772C844085E729B734F9597AE7211BB507E4F05D1274E5F02D85CE3CC0D6C604
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: <$<
                                                                • API String ID: 0-213342407
                                                                • Opcode ID: 77b38b1c0ac415f03eb8fc3fe946db26220d3f2080d76b3f88013ad276a94d8a
                                                                • Instruction ID: 97a10d7cc72c3ca2b7878a8389b00d20fa211c70ec47748f278e46729ef48f40
                                                                • Opcode Fuzzy Hash: 77b38b1c0ac415f03eb8fc3fe946db26220d3f2080d76b3f88013ad276a94d8a
                                                                • Instruction Fuzzy Hash: 919119B4618B198FDB98DF28D4983953BE5FB48704F1482BEAC4ECE25ADB748541CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: <$<
                                                                • API String ID: 0-213342407
                                                                • Opcode ID: ec6654cddb8ab643111ea71d0f1c34bfd98507fc68d6e29d53a69cad8ac5ae5c
                                                                • Instruction ID: 03b486865ac707b55d4f706c34fef0ded33aa6577674d160057d5575e87af8dc
                                                                • Opcode Fuzzy Hash: ec6654cddb8ab643111ea71d0f1c34bfd98507fc68d6e29d53a69cad8ac5ae5c
                                                                • Instruction Fuzzy Hash: 029128B4614B498FDBA9DF2894983953BE5FB48704F0482BEAC1ECE25ADB748541CF90
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: [RO] %ld bytes
                                                                • API String ID: 0-772938740
                                                                • Opcode ID: 0bc9ff0f179f0640927e28c222b33d2ac1d82dab54c563a82b986612fe2dcdf6
                                                                • Instruction ID: ce97a6eeb484fcbcc25e88cfb09abb9e6e6100725ae67366d05fb118d3cf04da
                                                                • Opcode Fuzzy Hash: 0bc9ff0f179f0640927e28c222b33d2ac1d82dab54c563a82b986612fe2dcdf6
                                                                • Instruction Fuzzy Hash: 7D428B736092C48BC329CF29A44079EBBA0F355B48F44D12AEFC587B45DB78E995CB50
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E5AEBA
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                  • Part of subcall function 02E5BA30: _errno.LIBCMT ref: 02E5BA48
                                                                  • Part of subcall function 02E5BA30: _invalid_parameter_noinfo.LIBCMT ref: 02E5BA54
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _amsg_exit_errno_getptd_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 1050512615-0
                                                                • Opcode ID: fedb899bdb91596af6e6ee0e969ea8dc5925a75702ece9bdec94cea29fba6568
                                                                • Instruction ID: 2c6eb9b33a3ebe870fc60d759e5a9bc9005450ab5f1eb602ce63688b80a1201a
                                                                • Opcode Fuzzy Hash: fedb899bdb91596af6e6ee0e969ea8dc5925a75702ece9bdec94cea29fba6568
                                                                • Instruction Fuzzy Hash: 4651D6623B46A186EF20DB22A55076BA756FB85BCCF44E425AF4A47B08EF38C005C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: 57db738d57153fc7c429c22cf91e7162c30465e9021a82ee78624aa2695d2ded
                                                                • Instruction ID: 546a5a13485c5a7ba8d367ce677d2e865d59ae3fe08f4dedd2b27b571ec417b7
                                                                • Opcode Fuzzy Hash: 57db738d57153fc7c429c22cf91e7162c30465e9021a82ee78624aa2695d2ded
                                                                • Instruction Fuzzy Hash: A601B5323D068186D7244B66E44C3BA3761F396BCCF99E421DF8A4B345CB34C582C740
                                                                APIs
                                                                • EnumSystemLocalesA.KERNEL32 ref: 02E661A0
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2099609381-0
                                                                • Opcode ID: a806821e78272caffabb9aa5d16819259c944b66b3d383c3c5fc35bed0f95a7c
                                                                • Instruction ID: 8e707db79669c2bef6bdbea3fe6304e7778babdbea8ad8413030a19bded9aeb7
                                                                • Opcode Fuzzy Hash: a806821e78272caffabb9aa5d16819259c944b66b3d383c3c5fc35bed0f95a7c
                                                                • Instruction Fuzzy Hash: 10018072AA07448BEB198F31D45D3BE37A5E754BCDF58A415CE0D02296CBBCC2A4CB91
                                                                APIs
                                                                • EnumSystemLocalesA.KERNEL32 ref: 02E6621D
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: EnumLocalesSystem
                                                                • String ID:
                                                                • API String ID: 2099609381-0
                                                                • Opcode ID: 877d5119e145bca4dbe67ff3c00607a04366f90a80b08fa67d988f9d8e585d44
                                                                • Instruction ID: e1429267ebba128dbe9d77a34227d7b99d913b4ae905d8b080c9bad1ab6bb212
                                                                • Opcode Fuzzy Hash: 877d5119e145bca4dbe67ff3c00607a04366f90a80b08fa67d988f9d8e585d44
                                                                • Instruction Fuzzy Hash: BDF096B2BE464487EB188B35D45D3B63796E7E4B8DF18E011CA0D42295C77CC1A18641
                                                                APIs
                                                                  • Part of subcall function 02E492E0: GetCurrentProcess.KERNEL32 ref: 02E492F7
                                                                  • Part of subcall function 02E492E0: OpenProcessToken.ADVAPI32 ref: 02E4930A
                                                                  • Part of subcall function 02E492E0: LookupPrivilegeValueW.ADVAPI32 ref: 02E49335
                                                                  • Part of subcall function 02E492E0: AdjustTokenPrivileges.ADVAPI32 ref: 02E49358
                                                                  • Part of subcall function 02E492E0: GetLastError.KERNEL32 ref: 02E4935E
                                                                  • Part of subcall function 02E492E0: CloseHandle.KERNEL32 ref: 02E4936D
                                                                • ExitWindowsEx.USER32 ref: 02E4E0F7
                                                                  • Part of subcall function 02E492E0: CloseHandle.KERNEL32 ref: 02E49388
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                • String ID:
                                                                • API String ID: 681424410-0
                                                                • Opcode ID: 7695e8de455b47fc7c4015bd84d56b1e415436a0ef6b3387a5f0b89aca7faf0b
                                                                • Instruction ID: 304c62d107f0ddb352042f8cfa5fe5db7f9a0a078ccee767f3141d253da489bd
                                                                • Opcode Fuzzy Hash: 7695e8de455b47fc7c4015bd84d56b1e415436a0ef6b3387a5f0b89aca7faf0b
                                                                • Instruction Fuzzy Hash: 66D05B372C8444C5E766A735F4057DE7211B7947A4F45D1374E5E03981CE3880D6C704
                                                                APIs
                                                                  • Part of subcall function 02E492E0: GetCurrentProcess.KERNEL32 ref: 02E492F7
                                                                  • Part of subcall function 02E492E0: OpenProcessToken.ADVAPI32 ref: 02E4930A
                                                                  • Part of subcall function 02E492E0: LookupPrivilegeValueW.ADVAPI32 ref: 02E49335
                                                                  • Part of subcall function 02E492E0: AdjustTokenPrivileges.ADVAPI32 ref: 02E49358
                                                                  • Part of subcall function 02E492E0: GetLastError.KERNEL32 ref: 02E4935E
                                                                  • Part of subcall function 02E492E0: CloseHandle.KERNEL32 ref: 02E4936D
                                                                • ExitWindowsEx.USER32 ref: 02E4E0D6
                                                                  • Part of subcall function 02E492E0: CloseHandle.KERNEL32 ref: 02E49388
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                • String ID:
                                                                • API String ID: 681424410-0
                                                                • Opcode ID: c5437afb9a504350283759be5a2e2ba688f67b11f6b02529b8aed3acffafb6b3
                                                                • Instruction ID: 7c9dbb7a597bd312125cc58d7cbba7e3df4ad6e4053f489d6e9c5dfb9b0bb986
                                                                • Opcode Fuzzy Hash: c5437afb9a504350283759be5a2e2ba688f67b11f6b02529b8aed3acffafb6b3
                                                                • Instruction Fuzzy Hash: BDD05B37288440C5E766A775F4057DEB611B7947A4F45D1374E5E03981CE3880D6C704
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0u
                                                                • API String ID: 0-3203441087
                                                                • Opcode ID: 84b7b3bca6920cc8a9683eb24846bb0459563868bb5748dfd0158d2d2b471ceb
                                                                • Instruction ID: 94e0b6adee9b0353a05a905cd3f9dd33c2e4565403b3840317d3c5982722a0f3
                                                                • Opcode Fuzzy Hash: 84b7b3bca6920cc8a9683eb24846bb0459563868bb5748dfd0158d2d2b471ceb
                                                                • Instruction Fuzzy Hash: 1B915E7461CB488FD754EF28D8457AAB7E1FF98704F104A2EE58AC3260DB78E445CB86
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: _.,
                                                                • API String ID: 0-2709443920
                                                                • Opcode ID: 47e16563c84a19cc132468bc2d642e8892c0c44d7de91b2b25675d4158cb7711
                                                                • Instruction ID: 15f2456e95176e08c8cdec68cb5c6b995a44aee428a4b1d04a0d0362c68e6d55
                                                                • Opcode Fuzzy Hash: 47e16563c84a19cc132468bc2d642e8892c0c44d7de91b2b25675d4158cb7711
                                                                • Instruction Fuzzy Hash: DF41F0322E4BA54AEF74DA71D92576A3713E384788F48E636EF4982B46EF69C140C740
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1f707a466f98fe272bde4ded02fca264932412dee6ff4484b5927f099e7d07fd
                                                                • Instruction ID: 1cd166549fd41d1197fbff1471be0d2a35c59b614067be5b27ab2531364f3e97
                                                                • Opcode Fuzzy Hash: 1f707a466f98fe272bde4ded02fca264932412dee6ff4484b5927f099e7d07fd
                                                                • Instruction Fuzzy Hash: 0B527D346187858FD729CF1C84816A9BBE0FB59700F5489AEDCCACB746D770E846CB92
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: b18e431d48e9aa25a0ba9b003567efa2638742ea5253fa4d3fbde3ac63ec74b8
                                                                • Instruction ID: 6ab8e3824f45d905a589ab3531a50e06d0d9ce6577594eb4f348556356539c7f
                                                                • Opcode Fuzzy Hash: b18e431d48e9aa25a0ba9b003567efa2638742ea5253fa4d3fbde3ac63ec74b8
                                                                • Instruction Fuzzy Hash: 7D528034618B858FD72ACF1C8481699BBE1FF59700F5489ADD8CACB742D770E846CB92
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3d0b285a1c183d9ed15233d5e90f35ef3308b6f5fd0085757d0cf32db775e372
                                                                • Instruction ID: 89367f814ef0249239a0b0094ee9b6c769cab5d2a9f62699bfdbce377b560112
                                                                • Opcode Fuzzy Hash: 3d0b285a1c183d9ed15233d5e90f35ef3308b6f5fd0085757d0cf32db775e372
                                                                • Instruction Fuzzy Hash: 9722D577B785504BD71CCB19E892FA977A2F394308749A52CEA17D3F44DA3DEA06CA00
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
                                                                • Instruction ID: 3600def51ed1a511deae8e1123363af5f8c6b0f1bf28b8f31be36afdbc53f823
                                                                • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
                                                                • Instruction Fuzzy Hash: 6171E93C7642558BCB0C9E1DD88123477D9EB8670A764E17DDADBCB207FA30E4438588
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
                                                                • Instruction ID: b6c5f4c7d1f3339cc820ed230cc9ed1e8568981b760ee445d97486d6321f95d0
                                                                • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
                                                                • Instruction Fuzzy Hash: C771A83CB646454BCB0C8E1DD892234B7D9EB8670A774E17DDADBCB246DA30D8438D89
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
                                                                • Instruction ID: 2817e87cb2c81d6078075030d33074220a3110ebe3c9318ed878e3e4f82326e4
                                                                • Opcode Fuzzy Hash: 5e1e48596fdf5ea50ef3df4a9aab293c2a7286e8955242186005ffd8a8896482
                                                                • Instruction Fuzzy Hash: FD51C373B956A18BD7288F19E41CF6C3AA9F794389B61F03ADB5297F00D776D8508B00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_errno
                                                                • String ID:
                                                                • API String ID: 2288870239-0
                                                                • Opcode ID: 60a7ffa4d2c1c72e481c1fc4b58fd09ff59adc118a18aaad8529e092a6129a8d
                                                                • Instruction ID: 1189b3482ae2aff0f5748847110999d856e3dea4ca5fb5ebcf464300ef642ef1
                                                                • Opcode Fuzzy Hash: 60a7ffa4d2c1c72e481c1fc4b58fd09ff59adc118a18aaad8529e092a6129a8d
                                                                • Instruction Fuzzy Hash: 4AA163382329898FD68DEB2DC8D4BA973B3BF48344F9441B9C84DCA1A6CE119C45CB52
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorFreeHeapLast_errno
                                                                • String ID:
                                                                • API String ID: 1012874770-0
                                                                • Opcode ID: 0020f19ff185dbff27dcfb762236250369b3a71a9d3eaf30a14737fe5e34001e
                                                                • Instruction ID: 8eb7fc7054d4d90456461afed901519586ab085b1d75a4dbb178e86664503c21
                                                                • Opcode Fuzzy Hash: 0020f19ff185dbff27dcfb762236250369b3a71a9d3eaf30a14737fe5e34001e
                                                                • Instruction Fuzzy Hash: 2781662A2B265489DB85FFF1C8A42AD2332EBD4F44FC4A132EE4D5F525CE11D84587D2
                                                                APIs
                                                                  • Part of subcall function 02E55378: malloc.LIBCMT ref: 02E55392
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E4E232
                                                                • RegDeleteValueW.ADVAPI32 ref: 02E4E243
                                                                • RegSetValueExW.ADVAPI32 ref: 02E4E26E
                                                                • RegCloseKey.ADVAPI32 ref: 02E4E2D4
                                                                • lstrlenW.KERNEL32 ref: 02E4E367
                                                                • lstrlenW.KERNEL32 ref: 02E4E377
                                                                • lstrlenW.KERNEL32 ref: 02E4E45D
                                                                • lstrlenW.KERNEL32 ref: 02E4E46D
                                                                  • Part of subcall function 02E55378: _callnewh.LIBCMT ref: 02E55386
                                                                  • Part of subcall function 02E55378: std::exception::exception.LIBCMT ref: 02E553FF
                                                                  • Part of subcall function 02E55560: _errno.LIBCMT ref: 02E5557F
                                                                  • Part of subcall function 02E55560: _invalid_parameter_noinfo.LIBCMT ref: 02E5558B
                                                                • lstrlenW.KERNEL32 ref: 02E4E54D
                                                                • lstrlenW.KERNEL32 ref: 02E4E55D
                                                                • RegCloseKey.ADVAPI32 ref: 02E4E60C
                                                                • Sleep.KERNEL32 ref: 02E4E617
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CloseValue$DeleteOpenSleep_callnewh_errno_invalid_parameter_noinfomallocstd::exception::exception
                                                                • String ID: 127.0.0.1$23.235.165.54$23.235.165.54$6666$8888$Console$IpDate$o1:$o2:$o3:$p1:$p2:$p3:$t1:$t2:$t3:
                                                                • API String ID: 2396878867-820654812
                                                                • Opcode ID: 0ba1c50f3f6f8bd47f20042370db24bb557a2b144f417de9e289bd57393602ee
                                                                • Instruction ID: 91aac7dc9375485220195e3e108f217f866fdca93596b97f7ad64732f1647a62
                                                                • Opcode Fuzzy Hash: 0ba1c50f3f6f8bd47f20042370db24bb557a2b144f417de9e289bd57393602ee
                                                                • Instruction Fuzzy Hash: 35B1DC71795A9581EB14AF25F9487AC2762F748BC9F88E016DE0E17B54EF78C18AC340
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Pointer$AddressDecodeEncodeProc$LibraryLoad
                                                                • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationW$MessageBoxW$USER32.DLL
                                                                • API String ID: 2643518689-564504941
                                                                • Opcode ID: 9b477d339a0cbf5d1fb3b709f53cc0189430c5bdffb326d61e63b17971d6259a
                                                                • Instruction ID: a8e0c5379143483e8b475a938cf6cedfbfadcd9f8923a8caf7ed725d030724a4
                                                                • Opcode Fuzzy Hash: 9b477d339a0cbf5d1fb3b709f53cc0189430c5bdffb326d61e63b17971d6259a
                                                                • Instruction Fuzzy Hash: E35107242D6B9181EE25DB52F81C36473A4AB49FE9F89A029CC5F47B24EF3EC5858310
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2315031519-0
                                                                • Opcode ID: 83821fb44c2082aa68f38fc84eff16adcc4682b38c585996f4bedfbd64328b7c
                                                                • Instruction ID: ac06c1e682b1ec285dd5cf99185a312c21ea1fb09ba98948c648f00eacc09e56
                                                                • Opcode Fuzzy Hash: 83821fb44c2082aa68f38fc84eff16adcc4682b38c585996f4bedfbd64328b7c
                                                                • Instruction Fuzzy Hash: 261257622D46C086DB129F68D8883BCBBA2F746BDCF98F605CE6A077A1D779C445C701
                                                                APIs
                                                                  • Part of subcall function 02E57488: RtlLookupFunctionEntry.KERNEL32 ref: 02E574FC
                                                                • __GetUnwindTryBlock.LIBCMT ref: 02E59778
                                                                • __SetUnwindTryBlock.LIBCMT ref: 02E5979F
                                                                  • Part of subcall function 02E5733C: RaiseException.KERNEL32 ref: 02E573B7
                                                                • __GetUnwindTryBlock.LIBCMT ref: 02E597A9
                                                                • _getptd.LIBCMT ref: 02E597FF
                                                                • _getptd.LIBCMT ref: 02E59812
                                                                • _getptd.LIBCMT ref: 02E5981E
                                                                • _SetThrowImageBase.LIBCMT ref: 02E59832
                                                                • _getptd.LIBCMT ref: 02E59882
                                                                • _getptd.LIBCMT ref: 02E59895
                                                                • _getptd.LIBCMT ref: 02E598A1
                                                                • type_info::operator==.LIBCMT ref: 02E59908
                                                                • std::exception::exception.LIBCMT ref: 02E59941
                                                                • _getptd.LIBCMT ref: 02E59B74
                                                                • std::exception::exception.LIBCMT ref: 02E59BED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$BlockUnwind$std::exception::exception$BaseEntryExceptionFunctionImageLookupRaiseThrowtype_info::operator==
                                                                • String ID: bad exception$csm$csm$csm
                                                                • API String ID: 1639654010-820278400
                                                                • Opcode ID: d9cf7963ac656a204547f84c84e07c0a39f698d544cc56fb1fb8ee67f789732f
                                                                • Instruction ID: ecbd2d2c0a466536a0e618c3cb8b0df6cf19f7b6dc165c817d1787ce43f7158b
                                                                • Opcode Fuzzy Hash: d9cf7963ac656a204547f84c84e07c0a39f698d544cc56fb1fb8ee67f789732f
                                                                • Instruction Fuzzy Hash: 8AD1D0326A0A60CADF24EF66D4443EE77A2F744B8CF44A225EF4917B05CB38C151CB95
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$BlockUnwind$std::exception::exception$BaseImageThrowtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 3798665358-393685449
                                                                • Opcode ID: 2c9889e119e4c0264914e1b215a30e701807c66576accc05f7666389a9f8a482
                                                                • Instruction ID: 969f05b4620ff1035ba6b5843e1372401e4a491df2a815a003867405dc124424
                                                                • Opcode Fuzzy Hash: 2c9889e119e4c0264914e1b215a30e701807c66576accc05f7666389a9f8a482
                                                                • Instruction Fuzzy Hash: 84E1D33D618A098FCB68BF6CD4456A9B3E2FB54705F4002AED84AD3651DB34E952CB83
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _getptd$BlockUnwind$std::exception::exception$BaseImageThrowtype_info::operator==
                                                                • String ID: csm$csm$csm
                                                                • API String ID: 3798665358-393685449
                                                                • Opcode ID: 18458f1114e23ce66089f8be90dc31260b8c4abc6b9c0a44086fbee8cbe3dec9
                                                                • Instruction ID: 5b60404b6ecee807e08f39fe0e1dfcf40492830bcf5fbf9f917e2dbd4113c7e0
                                                                • Opcode Fuzzy Hash: 18458f1114e23ce66089f8be90dc31260b8c4abc6b9c0a44086fbee8cbe3dec9
                                                                • Instruction Fuzzy Hash: D9E1E33C618A0D8FDB28EF6CC4656A973E2FF58315F64422ED84AD3655DB34E481CB82
                                                                APIs
                                                                • GetLocalTime.KERNEL32 ref: 02E4D568
                                                                • wsprintfW.USER32 ref: 02E4D5B0
                                                                  • Part of subcall function 02E49830: lstrlenW.KERNEL32 ref: 02E49862
                                                                  • Part of subcall function 02E49830: lstrlenW.KERNEL32 ref: 02E4987C
                                                                  • Part of subcall function 02E49830: lstrlenW.KERNEL32 ref: 02E49888
                                                                • lstrlenW.KERNEL32 ref: 02E4D61B
                                                                • lstrlenW.KERNEL32 ref: 02E4D62E
                                                                • CreateEventA.KERNEL32 ref: 02E4D79E
                                                                • RegOpenKeyExW.ADVAPI32 ref: 02E4D808
                                                                • CloseHandle.KERNEL32 ref: 02E4D850
                                                                • Sleep.KERNEL32 ref: 02E4D86E
                                                                • CloseHandle.KERNEL32 ref: 02E4D897
                                                                • CloseHandle.KERNEL32 ref: 02E4D8B6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CloseHandle$CreateEventLocalOpenSleepTimewsprintf
                                                                • String ID: %4d.%2d.%2d-%2d:%2d:%2d$Console\1$o1:$p1:$t1:
                                                                • API String ID: 441366266-1614091359
                                                                • Opcode ID: 2c5e8d8077fca6d9efecd33f24c60deca68b6aa5d3bb0323bb46866befe63c5a
                                                                • Instruction ID: f9180e803768761bbb4b3d9e8b66af3d0e53e1c0929281022cc6f6547565cdba
                                                                • Opcode Fuzzy Hash: 2c5e8d8077fca6d9efecd33f24c60deca68b6aa5d3bb0323bb46866befe63c5a
                                                                • Instruction Fuzzy Hash: 03919E72294B81C6DB209F26F9487AE77B5F785B88F40A115EA8E47B58DF38C245CB40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: VisibleWindow
                                                                • String ID: ApateDNS$Capsa$CurrPorts$Fiddler$Malwarebytes$Metascan$Port$Process$Sniff$TCPEye$TaskExplorer$Wireshark
                                                                • API String ID: 1208467747-3439171801
                                                                • Opcode ID: 9b8c77d6ced09ec049599edcb5e11aaf6237f5b26d3217c734fc7b2da4660954
                                                                • Instruction ID: a3860d71bc2986625d7b96e004509505f61254d521b2f0eea2fcbf0fe17a48b0
                                                                • Opcode Fuzzy Hash: 9b8c77d6ced09ec049599edcb5e11aaf6237f5b26d3217c734fc7b2da4660954
                                                                • Instruction Fuzzy Hash: 49516DA03D679281EE5AEB2BF98832453629F49798F88F475AC0E1B358EF3CD4408744
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID:
                                                                • API String ID: 1452528299-0
                                                                • Opcode ID: 77dedc7f358742ff0399e8efbd8c3910799c15a7c59c220d042ca75b07eb62eb
                                                                • Instruction ID: 84e41e8c66fdc51c38ec72c00c6faab1963ab79b66e46a657e96838f391d6a8a
                                                                • Opcode Fuzzy Hash: 77dedc7f358742ff0399e8efbd8c3910799c15a7c59c220d042ca75b07eb62eb
                                                                • Instruction Fuzzy Hash: 7DB1C136361AA08ADF14CF26EA547A933A5FB48BC8F44A529DE0E4BF44EF38D455C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWidelstrlensetsockopt$CreateEventIoctlgethostbynamesocket
                                                                • String ID:
                                                                • API String ID: 2536029566-0
                                                                • Opcode ID: cf50b05f241690f5b75512f02c6d7ffb42373bcd321a6766e23d8fdfdd69b64a
                                                                • Instruction ID: eaea14d51cd29cd340170f01da4e2c026366dcab255eb6bece59f399d000c43f
                                                                • Opcode Fuzzy Hash: cf50b05f241690f5b75512f02c6d7ffb42373bcd321a6766e23d8fdfdd69b64a
                                                                • Instruction Fuzzy Hash: B6514F76258B9086E720CF65F44875AB7A5F788BE8F105215EE9A43FA8DF3CC045CB40
                                                                APIs
                                                                • __free_lconv_mon.LIBCMT ref: 02E5F180
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E654CA
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E654DC
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E654EE
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65500
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65512
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65524
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65536
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65548
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E6555A
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E6556C
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65581
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E65596
                                                                  • Part of subcall function 02E654AC: free.LIBCMT ref: 02E655AB
                                                                • free.LIBCMT ref: 02E5F174
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                • free.LIBCMT ref: 02E5F196
                                                                • __free_lconv_num.LIBCMT ref: 02E5F1A2
                                                                • free.LIBCMT ref: 02E5F1AE
                                                                • free.LIBCMT ref: 02E5F1BA
                                                                • free.LIBCMT ref: 02E5F1DE
                                                                • free.LIBCMT ref: 02E5F1F2
                                                                • free.LIBCMT ref: 02E5F201
                                                                • free.LIBCMT ref: 02E5F20D
                                                                • free.LIBCMT ref: 02E5F23A
                                                                • free.LIBCMT ref: 02E5F262
                                                                • free.LIBCMT ref: 02E5F27C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorFreeHeapLast__free_lconv_mon__free_lconv_num_errno
                                                                • String ID:
                                                                • API String ID: 518839503-0
                                                                • Opcode ID: 793502283a8cb49350656c0ec5e5d9694461158cf1e27e4be6b183f55cf5cd15
                                                                • Instruction ID: b8f66243cc33d327ff9ea34f01471855a02cf483f0b9b654a984df88c094ef0c
                                                                • Opcode Fuzzy Hash: 793502283a8cb49350656c0ec5e5d9694461158cf1e27e4be6b183f55cf5cd15
                                                                • Instruction Fuzzy Hash: 5D312D3A6A26A088DF55DFE1C5543BD2321EB86B9CF88A431DE4D4BA54CF38C491C7A1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _fileno$_errno$_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 482796045-0
                                                                • Opcode ID: c48717b30ae9b74f7ac66b91d84a3b4c92b1bb28475cd271dfa275c582b4941c
                                                                • Instruction ID: 2d2c44f8111aaac1f77294112be2012fb3017cecc28d2df194caf2456621335b
                                                                • Opcode Fuzzy Hash: c48717b30ae9b74f7ac66b91d84a3b4c92b1bb28475cd271dfa275c582b4941c
                                                                • Instruction Fuzzy Hash: F05106622D468585CA289F39999827DA321FB82BEC758F702EF7A476D4CB2CC452C710
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$CreateFrameInfo
                                                                • String ID: csm
                                                                • API String ID: 4181383844-1018135373
                                                                • Opcode ID: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
                                                                • Instruction ID: 37054aba517f279c7e53f9036af7c6a1c8ab26483d689a0b26d3dc82c90ad395
                                                                • Opcode Fuzzy Hash: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
                                                                • Instruction Fuzzy Hash: FA417F78519B498FDBA4FF2C8449BB9B3E1FB99315F5005AED48DC3611DB30E8528B82
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _getptd$CreateFrameInfo
                                                                • String ID: csm
                                                                • API String ID: 4181383844-1018135373
                                                                • Opcode ID: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
                                                                • Instruction ID: 87c38629319c6ea7946a262838cf23a5783310f770292b72611d81200a2985fa
                                                                • Opcode Fuzzy Hash: f7c0f49ba4beedef2b7976ee9fce1622404532abdfe6423b84f5cde918012730
                                                                • Instruction Fuzzy Hash: 10412A78618B098FD6B4EF6C8455BAA73E1FF59311F64456EE18DC3611DB30E8428F82
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$CreateFrameInfo_amsg_exit
                                                                • String ID: csm
                                                                • API String ID: 2825728721-1018135373
                                                                • Opcode ID: 28f5b8f5928c2bab68e4158101839e7a7904bf0c9a5fe69cd0b7fe63bdef1c08
                                                                • Instruction ID: 25ee5bcc847b13ff7c761fee38c53a859b0206881ed6965dd817d7668c0a3055
                                                                • Opcode Fuzzy Hash: 28f5b8f5928c2bab68e4158101839e7a7904bf0c9a5fe69cd0b7fe63bdef1c08
                                                                • Instruction Fuzzy Hash: 7C41A336254BA1C6C7309F12E8403AEB7A5F788B98F059225EF9D07B54DF38C0A5CB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_errno$EnvironmentVariable__wtomb_environ_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 101574016-0
                                                                • Opcode ID: c7ab4824c20248cd77d5d216f2600469411963f07d5dc115475ca10161a63df4
                                                                • Instruction ID: 283413480f36d8528415c42e462b3c979652abf932905b69b13aa5b7c0182553
                                                                • Opcode Fuzzy Hash: c7ab4824c20248cd77d5d216f2600469411963f07d5dc115475ca10161a63df4
                                                                • Instruction Fuzzy Hash: 939103253D2B9082EF15AB26A90C37A6695FB40BDCF59E625DE5E0B795EF38C042C310
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalErrorLastSection$EnterLeave
                                                                • String ID:
                                                                • API String ID: 2124651672-0
                                                                • Opcode ID: 4efe19a53c5f1bbbb6770299ba61f7da19085229a5c567b4a8f2ec6ecf7074f0
                                                                • Instruction ID: 1d040f07ed8ca27584cedda7efee3f4292df8ab3f621ac121a00dd6628f01322
                                                                • Opcode Fuzzy Hash: 4efe19a53c5f1bbbb6770299ba61f7da19085229a5c567b4a8f2ec6ecf7074f0
                                                                • Instruction Fuzzy Hash: D841D3322846848BD754AF35F84CB1E73A9FB59BA5F45A136DA1B83B90DF38D444CB01
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 02E463C4
                                                                • WSASetLastError.WS2_32 ref: 02E463D6
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E463E0
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                • String ID:
                                                                • API String ID: 4082018349-0
                                                                • Opcode ID: 90b2d3d72562b85b932b95850fd759897480d03085588f29b6ae233e826b8c72
                                                                • Instruction ID: 4510d1f54b3251250a1fc35c35a581e068de759c88d4c7620b1a90eaaa739fdb
                                                                • Opcode Fuzzy Hash: 90b2d3d72562b85b932b95850fd759897480d03085588f29b6ae233e826b8c72
                                                                • Instruction Fuzzy Hash: E331633139468082EB24AF26F91C36A7315F786BE5F44A1319E2B87FA5DF29D495C700
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseValue$CreateDeleteOpenlstrlen
                                                                • String ID: AppEvents$Network
                                                                • API String ID: 3197061591-3733486940
                                                                • Opcode ID: df353acfe061e84203d7ac4a4d8559ebe72ca993a1af8a6bb5186c314d41c4c8
                                                                • Instruction ID: 830b6116cf4bbe77a9f213b8fb3ee9d9efae7bf291473e036e9468a70befc3a2
                                                                • Opcode Fuzzy Hash: df353acfe061e84203d7ac4a4d8559ebe72ca993a1af8a6bb5186c314d41c4c8
                                                                • Instruction Fuzzy Hash: FB112C76318A8086EB509B12F84C75AB7A1F7A4BE5F444121EE9A47FA8CF7CC149CB04
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorInfoLast
                                                                • String ID:
                                                                • API String ID: 189849726-0
                                                                • Opcode ID: b3486acb5be8b198c16fe08b771984a76368ce0ba2e95de7802cfff15c464e33
                                                                • Instruction ID: c826567517af5d063e57e874a5134cf58e793cd2277b3dc196086ab11a7aa5eb
                                                                • Opcode Fuzzy Hash: b3486acb5be8b198c16fe08b771984a76368ce0ba2e95de7802cfff15c464e33
                                                                • Instruction Fuzzy Hash: BCB1CD323657A08ACB11CF65E0547AE77A5F748B88F84923AEF9987754EF39C141CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$Info
                                                                • String ID:
                                                                • API String ID: 1775632426-0
                                                                • Opcode ID: 2d90b2b54ccd2e60352f476bd800f3d2100da5d7e85102e0396c8d6fc970bf6c
                                                                • Instruction ID: 34ecb24b5e88b35f4029d93c86f1067285707984111068dead8909a38c87172a
                                                                • Opcode Fuzzy Hash: 2d90b2b54ccd2e60352f476bd800f3d2100da5d7e85102e0396c8d6fc970bf6c
                                                                • Instruction Fuzzy Hash: D09104627C67804ADB30CF2598583BA3BA7F745BECF48E616EA6957784DB34C448C301
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32 ref: 02E59ECA
                                                                • malloc.LIBCMT ref: 02E59F33
                                                                • MultiByteToWideChar.KERNEL32 ref: 02E59F67
                                                                • LCMapStringW.KERNEL32 ref: 02E59F8E
                                                                • LCMapStringW.KERNEL32 ref: 02E59FD6
                                                                • malloc.LIBCMT ref: 02E5A033
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                • LCMapStringW.KERNEL32 ref: 02E5A068
                                                                • WideCharToMultiByte.KERNEL32 ref: 02E5A0A8
                                                                • free.LIBCMT ref: 02E5A0BC
                                                                • free.LIBCMT ref: 02E5A0CD
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiStringWide$_errnofreemalloc$AllocHeap_callnewh
                                                                • String ID:
                                                                • API String ID: 1080698880-0
                                                                • Opcode ID: 212a4c3b0deda1fbab8d7a46e28323f5a226f924b4e173925b22eeaff756e0a3
                                                                • Instruction ID: 7635308c4f16f5d10fd2dcd58ef588e186b486263485b01fd87ce01557eb0de5
                                                                • Opcode Fuzzy Hash: 212a4c3b0deda1fbab8d7a46e28323f5a226f924b4e173925b22eeaff756e0a3
                                                                • Instruction Fuzzy Hash: 5571C23236479086DB248F26D4442AAB7A5FB48BECF44A729EF5D47B94DF38C540C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                                • String ID:
                                                                • API String ID: 2295021086-0
                                                                • Opcode ID: 1d646d828de0aace6474db1b56eecb5c83fbf8c445fe68ef6d6efd0ca843a860
                                                                • Instruction ID: c44ae1d04e7db19d4e65b77755ac638ae776cfa841b3b73e4bd80b0ed80f83b8
                                                                • Opcode Fuzzy Hash: 1d646d828de0aace6474db1b56eecb5c83fbf8c445fe68ef6d6efd0ca843a860
                                                                • Instruction Fuzzy Hash: C741F7726E1B908AEB219F25C4483FC766AF741BECF18E625DE591BA94DB3C8041C711
                                                                APIs
                                                                • GetStartupInfoW.KERNEL32 ref: 02E61C91
                                                                  • Part of subcall function 02E5A860: Sleep.KERNEL32 ref: 02E5A8A5
                                                                • GetFileType.KERNEL32 ref: 02E61DFC
                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 02E61E3A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalFileInfoInitializeSectionSleepSpinStartupType
                                                                • String ID: @
                                                                • API String ID: 3473179607-2766056989
                                                                • Opcode ID: ab5030fe6963260d57b7d113dea0ca27346005c31587775712d3cdfdcbca818d
                                                                • Instruction ID: f14102ea7a614d9f3facf46349c55cbef990432b346e6b994b515593eaf8f81b
                                                                • Opcode Fuzzy Hash: ab5030fe6963260d57b7d113dea0ca27346005c31587775712d3cdfdcbca818d
                                                                • Instruction Fuzzy Hash: AB817B62280BC486DB158F25E88C3697765FB45BB8F58E329CA7E4B7E4EB78C055C310
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$HandleModule
                                                                • String ID: ZwQueryInformationProcess$ZwQueryObject$ZwQuerySystemInformation$ntdll.dll
                                                                • API String ID: 667068680-3590752221
                                                                • Opcode ID: 7eda7db14e39e4496a90eac640427b40b534a2017adf1ab763c42458caa272a6
                                                                • Instruction ID: e091d262c47da8169c581c0c0c753b5f5b86e3b6561b2335185b5d5c4736150f
                                                                • Opcode Fuzzy Hash: 7eda7db14e39e4496a90eac640427b40b534a2017adf1ab763c42458caa272a6
                                                                • Instruction Fuzzy Hash: A411C4606C6BC582FF149B11F86C35433E0E7587A8F895436C89E063A0EF7D85D9C790
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$Leave$ErrorLastTimetime$EnterEvent
                                                                • String ID:
                                                                • API String ID: 3019579578-0
                                                                • Opcode ID: 9243fe9860c2d7fa6fe3e49f17d1100e496bc96adbcf19a71ea8e46669bffbd9
                                                                • Instruction ID: 9ef7e23572bc2169a7265adec775b3e62b7304b28b3bf3b62a8bad8f94e7c77a
                                                                • Opcode Fuzzy Hash: 9243fe9860c2d7fa6fe3e49f17d1100e496bc96adbcf19a71ea8e46669bffbd9
                                                                • Instruction Fuzzy Hash: 96416A32244A808BDB309B26F40432EB765F789B58F04A116DB9A83F64DF38E495CB04
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno$_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2315031519-0
                                                                • Opcode ID: 5f53cfc1179e25de2a7bc686976dccc490792cdf04e3233ada5533c2cb284a6f
                                                                • Instruction ID: 3da3dfdacc95f8e3abd168cf283dc684dafdbf4201dda8da92ffcfd8d9b6d351
                                                                • Opcode Fuzzy Hash: 5f53cfc1179e25de2a7bc686976dccc490792cdf04e3233ada5533c2cb284a6f
                                                                • Instruction Fuzzy Hash: 5321BB713E06D089C716AF66D88863DBA92E740BE8F96F515FE250B791CBB8C441CB60
                                                                APIs
                                                                • SetLastError.KERNEL32 ref: 02E460EA
                                                                • TryEnterCriticalSection.KERNEL32 ref: 02E4610B
                                                                • TryEnterCriticalSection.KERNEL32 ref: 02E4611D
                                                                • SetLastError.KERNEL32 ref: 02E46136
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E46140
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E4614A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterErrorLastLeave
                                                                • String ID:
                                                                • API String ID: 4082018349-0
                                                                • Opcode ID: 48dac4b21eb6e7b5e3d8e5b91d253a18b64a32894f61ad1e43b8c3cea6ed7d97
                                                                • Instruction ID: fc23cf95e2f6fd33a8c50f540c3284a5af1e85f1b55c2c0ff85a048fd3d163f7
                                                                • Opcode Fuzzy Hash: 48dac4b21eb6e7b5e3d8e5b91d253a18b64a32894f61ad1e43b8c3cea6ed7d97
                                                                • Instruction Fuzzy Hash: 4F317F32A54680C7D710CF28F45836D37A9FB55F8CF546025DA1A87B65DF39C88AC710
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: File$CloseCreateHandleWritelstrlenwsprintf
                                                                • String ID: %s %s
                                                                • API String ID: 2369136734-2939940506
                                                                • Opcode ID: 5ea41a88a58f2c7f305451d4300e81fe3f17e369e3a8f1804c932f848bbce38b
                                                                • Instruction ID: 8b0ab4d792e86fc613cba6b7b20f7eb2ab6d7268c7b31d709f63d4e7f2e9cb0f
                                                                • Opcode Fuzzy Hash: 5ea41a88a58f2c7f305451d4300e81fe3f17e369e3a8f1804c932f848bbce38b
                                                                • Instruction Fuzzy Hash: 15319E3225898592EB30CF21F8587DBB361F7C4B98F849111AA5E47EA8DF3CC649CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2819658684-0
                                                                • Opcode ID: 1bfa4ce99656cd686edd839c064229dc2d40e207c6faefbcbf5901de5921f6a7
                                                                • Instruction ID: e8953e6723843caded9e04597b3d286cc07c127f1381f267647da8fdd866d27a
                                                                • Opcode Fuzzy Hash: 1bfa4ce99656cd686edd839c064229dc2d40e207c6faefbcbf5901de5921f6a7
                                                                • Instruction Fuzzy Hash: 9C51F33C514A1A9FDB25DF2DC8847BDB6A1FBA432EF184229D55DC75A0CB34C481CB52
                                                                APIs
                                                                  • Part of subcall function 02E44C70: EnterCriticalSection.KERNEL32 ref: 02E44C9E
                                                                  • Part of subcall function 02E44C70: LeaveCriticalSection.KERNEL32 ref: 02E44CF2
                                                                • send.WS2_32 ref: 02E44AC3
                                                                • EnterCriticalSection.KERNEL32 ref: 02E44AD7
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E44AEB
                                                                • HeapFree.KERNEL32 ref: 02E44B67
                                                                • WSAGetLastError.WS2_32 ref: 02E44BB4
                                                                • EnterCriticalSection.KERNEL32 ref: 02E44BC8
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E44C16
                                                                • HeapFree.KERNEL32 ref: 02E44C54
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave$FreeHeap$ErrorLastsend
                                                                • String ID:
                                                                • API String ID: 1701177279-0
                                                                • Opcode ID: b90c38a7879365d68958e5b8cc995af9841d5b1ff57e083cd5719233021dd6a7
                                                                • Instruction ID: 2daae4bc94a7dbf00063fcf7b1f46776b718d24dc99e8ab3f9d8159949ad5ae6
                                                                • Opcode Fuzzy Hash: b90c38a7879365d68958e5b8cc995af9841d5b1ff57e083cd5719233021dd6a7
                                                                • Instruction Fuzzy Hash: 16517E36340B808AEB64CF26F45439D73A1F788B98F44A125DB4A47F94DF38D5A5C740
                                                                APIs
                                                                • CreateWaitableTimerW.KERNEL32 ref: 02E43F72
                                                                  • Part of subcall function 02E41370: free.LIBCMT ref: 02E41390
                                                                  • Part of subcall function 02E41370: malloc.LIBCMT ref: 02E413BC
                                                                • setsockopt.WS2_32 ref: 02E4400D
                                                                • setsockopt.WS2_32 ref: 02E44037
                                                                • ResetEvent.KERNEL32 ref: 02E44085
                                                                • SetLastError.KERNEL32 ref: 02E440B0
                                                                • GetLastError.KERNEL32 ref: 02E440C8
                                                                  • Part of subcall function 02E44D20: GetCurrentThreadId.KERNEL32 ref: 02E44D2D
                                                                • SetLastError.KERNEL32 ref: 02E440DA
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$setsockopt$CreateCurrentEventResetThreadTimerWaitablefreemalloc
                                                                • String ID:
                                                                • API String ID: 3356772049-0
                                                                • Opcode ID: 0c4811832e00cbba20dc30ab256636ffacc8145d99394b55781261f507fde945
                                                                • Instruction ID: 36a32de0707fc1cda408b70b781ec35b8e1645d5f0991aa2b61d2ea3556d4f32
                                                                • Opcode Fuzzy Hash: 0c4811832e00cbba20dc30ab256636ffacc8145d99394b55781261f507fde945
                                                                • Instruction Fuzzy Hash: 5E414872240B809BE7148F26F94839E77A1F748788F148129EB8987B90CF7ED069CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2959964966-0
                                                                • Opcode ID: ddf155117954088a0bb4e70bdf1f4365ac3464c973803e0f49b68c972f192fe3
                                                                • Instruction ID: 08241363766b87708403f13dc74e7fb27635a759a3d8e660c15c3762b444fcf3
                                                                • Opcode Fuzzy Hash: ddf155117954088a0bb4e70bdf1f4365ac3464c973803e0f49b68c972f192fe3
                                                                • Instruction Fuzzy Hash: 9B31F4326D464186DB288B39D64C37C37A0F7857ECF24A615DFA987A90CB38C4A2CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Event$CloseCurrentSleepThreadTimeclosesocketsendshutdowntime
                                                                • String ID:
                                                                • API String ID: 929257074-0
                                                                • Opcode ID: 6c1e56b6404b1df93eb3e627f74c895b445532c7761a8052013e281b186b1800
                                                                • Instruction ID: cb2e8ee1a2e52301e0abddc820ae6775b232cf1401d40461fcbdb6f7166fc727
                                                                • Opcode Fuzzy Hash: 6c1e56b6404b1df93eb3e627f74c895b445532c7761a8052013e281b186b1800
                                                                • Instruction Fuzzy Hash: 8731523265069087D7219F75F44832C7362F794FADF946221EA6B4BA98CF38C885CB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Message$Peek$CloseDispatchErrorEventHandleLastMultipleObjectsTranslateWait
                                                                • String ID:
                                                                • API String ID: 1713936993-0
                                                                • Opcode ID: d3b14ee8f2ed008a71182c7c102088909806aed2bf3454968681f8c368bda903
                                                                • Instruction ID: ed324e8ee7ef0e9bd6eb673a7d8d6f93b993e449e31a71bef3b36b98fa85a89d
                                                                • Opcode Fuzzy Hash: d3b14ee8f2ed008a71182c7c102088909806aed2bf3454968681f8c368bda903
                                                                • Instruction Fuzzy Hash: 44219036650A8083E7208F35F45CB2D73A1FBA4748F94A625EA5A869B4DF38C449CB10
                                                                APIs
                                                                • _FF_MSGBANNER.LIBCMT ref: 02E62BFB
                                                                  • Part of subcall function 02E5C13C: _set_error_mode.LIBCMT ref: 02E5C145
                                                                  • Part of subcall function 02E5C13C: _set_error_mode.LIBCMT ref: 02E5C154
                                                                  • Part of subcall function 02E5BEDC: _set_error_mode.LIBCMT ref: 02E5BF21
                                                                  • Part of subcall function 02E5BEDC: _set_error_mode.LIBCMT ref: 02E5BF32
                                                                  • Part of subcall function 02E5BEDC: GetModuleFileNameW.KERNEL32 ref: 02E5BF94
                                                                  • Part of subcall function 02E5BB48: ExitProcess.KERNEL32 ref: 02E5BB57
                                                                  • Part of subcall function 02E5A7E0: malloc.LIBCMT ref: 02E5A80B
                                                                  • Part of subcall function 02E5A7E0: Sleep.KERNEL32 ref: 02E5A81E
                                                                • _errno.LIBCMT ref: 02E62C3D
                                                                • _lock.LIBCMT ref: 02E62C51
                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32 ref: 02E62C67
                                                                • free.LIBCMT ref: 02E62C74
                                                                • _errno.LIBCMT ref: 02E62C79
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E62C9C
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _set_error_mode$CriticalSection_errno$CountExitFileInitializeLeaveModuleNameProcessSleepSpin_lockfreemalloc
                                                                • String ID:
                                                                • API String ID: 113790786-0
                                                                • Opcode ID: 33667054d2d382180aecc97be551a92e30174e25f3312452b72f7abc52412f6f
                                                                • Instruction ID: 269f157929cec0e563b38ff43e7640078fd5a873e2e0f214e71520bdeeb19959
                                                                • Opcode Fuzzy Hash: 33667054d2d382180aecc97be551a92e30174e25f3312452b72f7abc52412f6f
                                                                • Instruction Fuzzy Hash: A321BE316E569082E625AB60E81C7BA6367FB847C8F44F528EF4A4BB84CF7CC440CB11
                                                                APIs
                                                                • free.LIBCMT ref: 02E42576
                                                                • malloc.LIBCMT ref: 02E4265D
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$AllocHeap_callnewhfreemalloc
                                                                • String ID: [RI] %d bytes$input ack: sn=%lu rtt=%ld rto=%ld$input probe$input psh: sn=%lu ts=%lu$input wins: %lu
                                                                • API String ID: 3198430600-868042568
                                                                • Opcode ID: 750ebd41106a62b2082671337faf29e5c6b948eda958e7ceff3e7b47e59073a6
                                                                • Instruction ID: ca3110baa64296bb0e29c016fa359eff61f980ea8528a1befcdf4263c985ba5c
                                                                • Opcode Fuzzy Hash: 750ebd41106a62b2082671337faf29e5c6b948eda958e7ceff3e7b47e59073a6
                                                                • Instruction Fuzzy Hash: BED19E726446808BDB748F29F45476EBBA1F784B88F14E025EF9A87B58DF38D440CB51
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: 2545b9cca8e253d8dc5762f349c41804750cab19d6113a61705cd40064087c66
                                                                • Instruction ID: bf23d20878e3b648cdb42b67337d35eed161ceeda5ef66d65dff8a68ccaa2364
                                                                • Opcode Fuzzy Hash: 2545b9cca8e253d8dc5762f349c41804750cab19d6113a61705cd40064087c66
                                                                • Instruction Fuzzy Hash: 0BC18132750B5185DB20DFA2E484AEE77A5F789788F809926DE9D83B04FF78C205CB40
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$CurrentThread$EventsMultipleTimerWaitWaitable
                                                                • String ID:
                                                                • API String ID: 3058130114-0
                                                                • Opcode ID: beb139878c52618ef897b8691ffbca13a1492810dcd6d59fbe55f6b96b8c9a26
                                                                • Instruction ID: 23a73aa33078d9b9e0c26e012b24026f0b100396d63e37ff8c629a4a63b5d1c1
                                                                • Opcode Fuzzy Hash: beb139878c52618ef897b8691ffbca13a1492810dcd6d59fbe55f6b96b8c9a26
                                                                • Instruction Fuzzy Hash: C3515B72390B8086DB249F35F85476933A5F748B9CF58A626EE5A87BD8DF39C440C710
                                                                APIs
                                                                  • Part of subcall function 02E55378: malloc.LIBCMT ref: 02E55392
                                                                  • Part of subcall function 02E55378: _callnewh.LIBCMT ref: 02E55386
                                                                  • Part of subcall function 02E55378: std::exception::exception.LIBCMT ref: 02E553FF
                                                                • RegCreateKeyW.ADVAPI32 ref: 02E4DD64
                                                                • RegDeleteValueW.ADVAPI32 ref: 02E4DDA8
                                                                • RegSetValueExW.ADVAPI32 ref: 02E4DDC8
                                                                • RegCloseKey.ADVAPI32 ref: 02E4DDDF
                                                                • CloseHandle.KERNEL32 ref: 02E4E673
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseValue$CreateDeleteHandle_callnewhmallocstd::exception::exception
                                                                • String ID: Console\1
                                                                • API String ID: 2917754286-1035756066
                                                                • Opcode ID: 2219b0c576fd3e4d0e08784fb7636a5387038700b04224bb1bd2999f53d07214
                                                                • Instruction ID: 8c25743eb27473296880fc38b904e16adadc0b2b511c5f8307ad390f7e46a64d
                                                                • Opcode Fuzzy Hash: 2219b0c576fd3e4d0e08784fb7636a5387038700b04224bb1bd2999f53d07214
                                                                • Instruction Fuzzy Hash: 0B51A936355B9082DB58DF22F9587AE73A9F789BC4F409129AE4E47B44DF38C150CB05
                                                                APIs
                                                                • _fileno.LIBCMT ref: 02E6861B
                                                                  • Part of subcall function 02E62988: _errno.LIBCMT ref: 02E62991
                                                                  • Part of subcall function 02E62988: _invalid_parameter_noinfo.LIBCMT ref: 02E6299C
                                                                • _errno.LIBCMT ref: 02E6862B
                                                                • _errno.LIBCMT ref: 02E68649
                                                                • _isatty.LIBCMT ref: 02E686AA
                                                                • _getbuf.LIBCMT ref: 02E686B6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
                                                                • String ID:
                                                                • API String ID: 2574049805-3916222277
                                                                • Opcode ID: e332a1d343aa96d4712a9f575034e96bbd1a86f49911222e96935b0e9a9d528d
                                                                • Instruction ID: e552a6a6d012f0cfda41639e5e042aad2c84074e1d3c7b993d2be04fc64d1ff8
                                                                • Opcode Fuzzy Hash: e332a1d343aa96d4712a9f575034e96bbd1a86f49911222e96935b0e9a9d528d
                                                                • Instruction Fuzzy Hash: 6541F4722C0B0086DB28DF29D48937D7761EB94BECF14E225DA65473D8EB78C455CB80
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: DecodePointer$ExitProcess_amsg_exit_lock
                                                                • String ID:
                                                                • API String ID: 3411037476-0
                                                                • Opcode ID: 996cd0f5924440a7e34d656a764d071a0c653d38d32bb3c9cf5966984726c4a8
                                                                • Instruction ID: 60b9d28b66dc62166db10f0731abb013ce668151b0528eee6d1bdfc3d260caf2
                                                                • Opcode Fuzzy Hash: 996cd0f5924440a7e34d656a764d071a0c653d38d32bb3c9cf5966984726c4a8
                                                                • Instruction Fuzzy Hash: 893191312A6BA582E610DF11FC48319B2A5F788BDCF14A029EE8E43B68EF78C451C701
                                                                APIs
                                                                  • Part of subcall function 02E5BA94: HeapCreate.KERNEL32 ref: 02E5BAAA
                                                                  • Part of subcall function 02E5BA94: GetVersion.KERNEL32 ref: 02E5BABC
                                                                  • Part of subcall function 02E5BA94: HeapSetInformation.KERNEL32 ref: 02E5BADA
                                                                • _RTC_Initialize.LIBCMT ref: 02E570BE
                                                                • GetCommandLineA.KERNEL32 ref: 02E570C3
                                                                  • Part of subcall function 02E623B0: GetEnvironmentStringsW.KERNEL32 ref: 02E623C9
                                                                  • Part of subcall function 02E623B0: WideCharToMultiByte.KERNEL32 ref: 02E62420
                                                                  • Part of subcall function 02E623B0: WideCharToMultiByte.KERNEL32 ref: 02E6245B
                                                                  • Part of subcall function 02E623B0: free.LIBCMT ref: 02E62468
                                                                  • Part of subcall function 02E623B0: FreeEnvironmentStringsW.KERNEL32 ref: 02E62473
                                                                  • Part of subcall function 02E61C70: GetStartupInfoW.KERNEL32 ref: 02E61C91
                                                                • __setargv.LIBCMT ref: 02E570EC
                                                                • _cinit.LIBCMT ref: 02E57100
                                                                  • Part of subcall function 02E5DE2C: FlsFree.KERNEL32 ref: 02E5DE3B
                                                                  • Part of subcall function 02E5DE2C: DeleteCriticalSection.KERNEL32 ref: 02E62B67
                                                                  • Part of subcall function 02E5DE2C: free.LIBCMT ref: 02E62B70
                                                                  • Part of subcall function 02E5DE2C: DeleteCriticalSection.KERNEL32 ref: 02E62B97
                                                                  • Part of subcall function 02E61F44: free.LIBCMT ref: 02E61F95
                                                                  • Part of subcall function 02E5A860: Sleep.KERNEL32 ref: 02E5A8A5
                                                                • FlsSetValue.KERNEL32 ref: 02E5719A
                                                                • GetCurrentThreadId.KERNEL32 ref: 02E571AE
                                                                • free.LIBCMT ref: 02E571BD
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$FreeHeap$ByteCharCriticalDeleteEnvironmentMultiSectionStringsWide$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValueVersion__setargv_cinit_errno
                                                                • String ID:
                                                                • API String ID: 125979975-0
                                                                • Opcode ID: 1b780d2af2d2b08c57e81dbe5f9cf27f7226efad3fa970d95da47f5686e96d3e
                                                                • Instruction ID: 3ece1ddac19f7580aa174417008d7af2f0b0a53e40c21a592ed8c3bb520f13cf
                                                                • Opcode Fuzzy Hash: 1b780d2af2d2b08c57e81dbe5f9cf27f7226efad3fa970d95da47f5686e96d3e
                                                                • Instruction Fuzzy Hash: 983193306F027389EF247B719A0837EA2979F5079DF14F169DD5685288FF38C4618A32
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: bc31ac164400ea638efb2a253a4159f9418708a92b737441d98fa66cbbbdf454
                                                                • Instruction ID: ba1ea0f44914a36267f3a19237b01de3fe19606ade5a4040046e1b23443a11a0
                                                                • Opcode Fuzzy Hash: bc31ac164400ea638efb2a253a4159f9418708a92b737441d98fa66cbbbdf454
                                                                • Instruction Fuzzy Hash: 3021373C218B484FE31DAB6CDC867B977C1EB46331F06028DE54AC72E1D664A84186B3
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: 3968a178c04b1dda016d64c80a41a5b0c5f70fe22e64b3b5d71b493b2a21061a
                                                                • Instruction ID: 3e5c592cbe35a9aafb9b3e27a6448827380680b871ecac37e867ed72b457eccd
                                                                • Opcode Fuzzy Hash: 3968a178c04b1dda016d64c80a41a5b0c5f70fe22e64b3b5d71b493b2a21061a
                                                                • Instruction Fuzzy Hash: EF21F53C618F084FE71AAB6CD8813F93BD1EF46321F45524DE54AC73A2D76468018AA3
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: 1f7af2e854afd7785fd2e0354adf99b5593f1b5f9a5b06e87902d7b45ce64cd3
                                                                • Instruction ID: 8d652a036b5aefc06df8a935eda727062268645766c380d3dcd0e8f6ca411f26
                                                                • Opcode Fuzzy Hash: 1f7af2e854afd7785fd2e0354adf99b5593f1b5f9a5b06e87902d7b45ce64cd3
                                                                • Instruction Fuzzy Hash: 3D210A3DA1C7044EE349BB6CDC867783791EF45326F050299E546C72E2D764A80186A3
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo$_fileno
                                                                • String ID: @
                                                                • API String ID: 3947385824-2766056989
                                                                • Opcode ID: af564db91ba97d0b77235dee38384f54ac06b36b1a5ed8721de6b5247343fed1
                                                                • Instruction ID: b7aefa8bfdfaf8c2e23c487f80a0fa9940bc2959f9c5da11963d3042dae8fdad
                                                                • Opcode Fuzzy Hash: af564db91ba97d0b77235dee38384f54ac06b36b1a5ed8721de6b5247343fed1
                                                                • Instruction Fuzzy Hash: 62212D722A079141CF199B35DC54338A352AB95FA8FA4F61ADE294B2D4DF38C851C310
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AttributesCreateErrorFileLastProcesslstrlen
                                                                • String ID: WinSta0\Default$h
                                                                • API String ID: 591566999-1620045033
                                                                • Opcode ID: 32a352b419bde3d174141e61f84ad47ef660ce78bc64c5ffb13d4ce8ad96e1b3
                                                                • Instruction ID: 7b292be557eea78f451831afb13f6925bd27099f170a74d18bb1e76cc4542bd4
                                                                • Opcode Fuzzy Hash: 32a352b419bde3d174141e61f84ad47ef660ce78bc64c5ffb13d4ce8ad96e1b3
                                                                • Instruction Fuzzy Hash: 8A31C53164468186DB60DB25F9143AA73A2F785BD4F449231EE5D87F98EF3CC095CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo$_fileno
                                                                • String ID: @
                                                                • API String ID: 3947385824-2766056989
                                                                • Opcode ID: a29fee2f15fe2de611211933ed3ced769d455d1257d9a970644a691804d751dc
                                                                • Instruction ID: 92b7d0755dd277ff09211baf174781646ff3c2a4b3eac83e159bb70a2c2e871a
                                                                • Opcode Fuzzy Hash: a29fee2f15fe2de611211933ed3ced769d455d1257d9a970644a691804d751dc
                                                                • Instruction Fuzzy Hash: B52127622B0A9541CF199B79DC54338A251ABC3BA8F64F612DE2E862E4DF3CC062C310
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$write_char
                                                                • String ID:
                                                                • API String ID: 1772936973-0
                                                                • Opcode ID: 3092101f4da50db01581974a644fad622e6709ebf2b60c566d43b2d692c17ccd
                                                                • Instruction ID: 2ed3b981f7e0213de2d121998709ee1d3e1b416e993862f2624dcc9cce8b6956
                                                                • Opcode Fuzzy Hash: 3092101f4da50db01581974a644fad622e6709ebf2b60c566d43b2d692c17ccd
                                                                • Instruction Fuzzy Hash: FC11BF3C918B088FDB68AF5C80857283BE0FB99311F1611AAE45DC72A1D774EC81CB93
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _errno$write_char
                                                                • String ID:
                                                                • API String ID: 1772936973-0
                                                                • Opcode ID: c71356e80ab61c116f08e0e7252ee1ba80ccbfc151ac000d77de5458481281de
                                                                • Instruction ID: b2c3e09a89b697643ec993561671d1a0d50174e204bf0e1b9524be4cced89665
                                                                • Opcode Fuzzy Hash: c71356e80ab61c116f08e0e7252ee1ba80ccbfc151ac000d77de5458481281de
                                                                • Instruction Fuzzy Hash: 53117C3C518B488FCB62AF5C80413A536E1FF5A315F1595AEDA9DC7361D3709C818B93
                                                                APIs
                                                                • std::exception::exception.LIBCMT ref: 02E4A274
                                                                • std::exception::exception.LIBCMT ref: 02E4A2C0
                                                                • std::exception::exception.LIBCMT ref: 02E4A308
                                                                  • Part of subcall function 02E5733C: RaiseException.KERNEL32 ref: 02E573B7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: std::exception::exception$ExceptionRaise
                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                • API String ID: 127205192-1866435925
                                                                • Opcode ID: d53289f82b987d99488ffd486f5e8e9424002f469d181d04e2350c7ea1fe77c1
                                                                • Instruction ID: 8257446bdac059f741d03a1679b7a3066592989e10835d73f9ed86ceabce7a61
                                                                • Opcode Fuzzy Hash: d53289f82b987d99488ffd486f5e8e9424002f469d181d04e2350c7ea1fe77c1
                                                                • Instruction Fuzzy Hash: A6313732A90B6598EB04DBA0E8442EC3375F74474CF945526DE1D57B18EF30C216C780
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_close_nolock_errno
                                                                • String ID:
                                                                • API String ID: 186997739-0
                                                                • Opcode ID: d4e42670deded1a41872dc57e652bbdc50800f1b388844c8c982070653914a45
                                                                • Instruction ID: 9ac4d96a67838c7dc5f3f29edb8a0a9825ad9d15f167574b5644e30ed738d96b
                                                                • Opcode Fuzzy Hash: d4e42670deded1a41872dc57e652bbdc50800f1b388844c8c982070653914a45
                                                                • Instruction Fuzzy Hash: CC11033D519A444EE704BB68D89936C76D2EF81324F1A062CD01FC72E1DA74C8428B63
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: 18e84dbfee4e45401bde94adaa049da0b512f4016e2074da3143f09c66c3302d
                                                                • Instruction ID: 0dbf48033c9f212fbf07cf8c42c8b1c34cd120aba2e7fd7a33013b2821225004
                                                                • Opcode Fuzzy Hash: 18e84dbfee4e45401bde94adaa049da0b512f4016e2074da3143f09c66c3302d
                                                                • Instruction Fuzzy Hash: 431106723E069046D716AF65D84C33DB752AB81BE6F8AE145EF150B3D0CBB88841CB60
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: 86a5edae899ae3c1e95562a3141e97825a2d4e34b8035855c9b3c82b72936b35
                                                                • Instruction ID: 76bc1a56ffb1883418bfe005714a85482f6c3a3597614570a8b75712b5506d2c
                                                                • Opcode Fuzzy Hash: 86a5edae899ae3c1e95562a3141e97825a2d4e34b8035855c9b3c82b72936b35
                                                                • Instruction Fuzzy Hash: 8511E4223E069045CA06AF55D95837D7752AB80FF6F4AE74AEE380B3D0CB798841CB20
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$BuffersErrorFileFlushLast__doserrno
                                                                • String ID:
                                                                • API String ID: 1845094721-0
                                                                • Opcode ID: 6cb1097625330db8c14f65dc00d311e544f89a42f5e59361ee9e46fa344e60e4
                                                                • Instruction ID: 308807bfa813213b1c6af8c78e1d3d20ca2169bf1dbe94729a02922235a31004
                                                                • Opcode Fuzzy Hash: 6cb1097625330db8c14f65dc00d311e544f89a42f5e59361ee9e46fa344e60e4
                                                                • Instruction Fuzzy Hash: 0E1100617D47C086DB05AF69E98C33D6B52AB80FD5F49B669EA260B390CF78C440CB24
                                                                APIs
                                                                • GetForegroundWindow.USER32 ref: 02E51EEF
                                                                • GetWindowTextW.USER32 ref: 02E51F0C
                                                                • lstrlenW.KERNEL32 ref: 02E51F46
                                                                • GetLocalTime.KERNEL32 ref: 02E51F55
                                                                • wsprintfW.USER32 ref: 02E51FA5
                                                                  • Part of subcall function 02E51E00: WaitForSingleObject.KERNEL32 ref: 02E51E17
                                                                  • Part of subcall function 02E51E00: CreateFileW.KERNEL32 ref: 02E51E49
                                                                  • Part of subcall function 02E51E00: SetFilePointer.KERNEL32 ref: 02E51E6E
                                                                  • Part of subcall function 02E51E00: lstrlenW.KERNEL32 ref: 02E51E77
                                                                  • Part of subcall function 02E51E00: WriteFile.KERNEL32 ref: 02E51E95
                                                                  • Part of subcall function 02E51E00: CloseHandle.KERNEL32 ref: 02E51E9E
                                                                  • Part of subcall function 02E51E00: ReleaseMutex.KERNEL32 ref: 02E51EAB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: File$Windowlstrlen$CloseCreateForegroundHandleLocalMutexObjectPointerReleaseSingleTextTimeWaitWritewsprintf
                                                                • String ID: [
                                                                • API String ID: 3163932117-4056885943
                                                                • Opcode ID: bd11379160462120774f09f7b187f9a014c50a8c89d2790cda105e9129980a75
                                                                • Instruction ID: 3512e395ee989f549437b6a1ed99a81169c577e97b60cfbcb7ec9c8976a42726
                                                                • Opcode Fuzzy Hash: bd11379160462120774f09f7b187f9a014c50a8c89d2790cda105e9129980a75
                                                                • Instruction Fuzzy Hash: BD317E31268A90C2E750DF22F85836AB7A5F784744F409016E9CE46A64EF3DC159CF90
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_close_nolock_errno
                                                                • String ID:
                                                                • API String ID: 186997739-0
                                                                • Opcode ID: 338a92123b176fe84b8433c97561ad7ed6b063f42bea373834fe5852735bb2e8
                                                                • Instruction ID: aa30b25a7900030dd426353f0b60549b28d85297b90b79f34916140c9a217298
                                                                • Opcode Fuzzy Hash: 338a92123b176fe84b8433c97561ad7ed6b063f42bea373834fe5852735bb2e8
                                                                • Instruction Fuzzy Hash: 3311E9226D06C045D6056F259D8C37C6752A780BE1F55F555BA1A077D5CB748880C734
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$write_char
                                                                • String ID:
                                                                • API String ID: 1772936973-0
                                                                • Opcode ID: 871f355d671030dc6432d9a23ab7b6e38f30107320b972de84d7d94d25281080
                                                                • Instruction ID: bcd63d69ca4eed3572de15304dcd0b8cfb982dd599fff7fe6811cc4ad314779b
                                                                • Opcode Fuzzy Hash: 871f355d671030dc6432d9a23ab7b6e38f30107320b972de84d7d94d25281080
                                                                • Instruction Fuzzy Hash: 1D1188725E0BA08ADB206F92D40837976A1F794FD4F88E025EF540B784CBB8D481CB51
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$write_char
                                                                • String ID:
                                                                • API String ID: 1772936973-0
                                                                • Opcode ID: 4e5a875947b43d510ab27010ab14576f87d5b69a94ba14807e221e2687d3d606
                                                                • Instruction ID: ea107bf0d60f93ba7eaefd55360de215d9a3555c44709678345014f13b23837f
                                                                • Opcode Fuzzy Hash: 4e5a875947b43d510ab27010ab14576f87d5b69a94ba14807e221e2687d3d606
                                                                • Instruction Fuzzy Hash: 8A11AC324B0BE0CACB206F62941036936A1F398F98F69F012EF940B744CB7CE481CB61
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process$CommandCreateExitFileInfoLineModuleNameStartup
                                                                • String ID:
                                                                • API String ID: 3421218197-3916222277
                                                                • Opcode ID: ee7650ada655a41ad3d8abafd2266b15cab2f850138d348df1a1cd45a91815c4
                                                                • Instruction ID: 611ab7eeb72cef7678e199c008cd7c9bf11200691c1a89f2b21aba1f7220f0d5
                                                                • Opcode Fuzzy Hash: ee7650ada655a41ad3d8abafd2266b15cab2f850138d348df1a1cd45a91815c4
                                                                • Instruction Fuzzy Hash: 1301EC32258BC582DB608B64F89D74AB7A4F7947D4F505526E68B43F68DF7CC1498B00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: File$CloseCreateHandleMutexObjectPointerReleaseSingleWaitWritelstrlen
                                                                • String ID:
                                                                • API String ID: 4202892810-0
                                                                • Opcode ID: e7892ef0c60a8620ab59d393f68777d807ece2b1662eb29eea33fc2896f8ec93
                                                                • Instruction ID: b386e1bb1a1d00643642920ebbe8bc203950e81d1b93e5ca7955c6c20f43f189
                                                                • Opcode Fuzzy Hash: e7892ef0c60a8620ab59d393f68777d807ece2b1662eb29eea33fc2896f8ec93
                                                                • Instruction Fuzzy Hash: 7B110972258A8082E7108F62F95C75A7760F798BF8F444211DAAB43FA4CF7CC449CB10
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Value$CloseDeleteOpen
                                                                • String ID: Console$IpDatespecial
                                                                • API String ID: 3183427449-1840232981
                                                                • Opcode ID: 1998c3c541e6b13509c0f1d0a8d7f92d98846318bf4c898897b1f07a1e6dd135
                                                                • Instruction ID: 91ffb8d555b24283b7747753dab35f6b5d350bffa8a256deb87f954444c3b0d4
                                                                • Opcode Fuzzy Hash: 1998c3c541e6b13509c0f1d0a8d7f92d98846318bf4c898897b1f07a1e6dd135
                                                                • Instruction Fuzzy Hash: 8D012C7635AA81C6EB61CB25F8587983770F799BE8F445112CE9E03A94CF38C189C704
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: MOC$RCC$csm
                                                                • API String ID: 3186804695-2671469338
                                                                • Opcode ID: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
                                                                • Instruction ID: c9d055ddf973d445f1c5ce081f96a06e7d6135efe0247922921be463d039dad0
                                                                • Opcode Fuzzy Hash: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
                                                                • Instruction Fuzzy Hash: BFE01A3C5121048EC7557B6884493B472A2FF19B0EF4A56E9984CCB221DBBC89D08F53
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: MOC$RCC$csm
                                                                • API String ID: 3186804695-2671469338
                                                                • Opcode ID: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
                                                                • Instruction ID: fd707ad0d7263315baefb51170b5b418353e1105981a1ce096c530147e347605
                                                                • Opcode Fuzzy Hash: d0c629851adb83669a1057044e1c73a61abea7eb16c4708499e842e3cc9a1464
                                                                • Instruction Fuzzy Hash: 86E0123C618105CED766776C85093F435A1FF1C30AF6A90EAC458CA220D7BD84C18F53
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E58C37
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                  • Part of subcall function 02E626F8: _getptd.LIBCMT ref: 02E626FC
                                                                • _getptd.LIBCMT ref: 02E58C49
                                                                • _getptd.LIBCMT ref: 02E58C57
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$_amsg_exit
                                                                • String ID: MOC$RCC$csm
                                                                • API String ID: 2610988583-2671469338
                                                                • Opcode ID: e672e4323665b16ea60b3fb528af4179eb2c0c48703903788b3e2e50e937f095
                                                                • Instruction ID: 12eb0481e0d9116d29e49d4729257a5806afa2af3a0563dab3dfb6f3d466dd87
                                                                • Opcode Fuzzy Hash: e672e4323665b16ea60b3fb528af4179eb2c0c48703903788b3e2e50e937f095
                                                                • Instruction Fuzzy Hash: C8E012369A2124CEC7156B6684443EC3662F79870AF86F5759A4446320C7BC44C48F23
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_errno_getptd$_lockmalloc
                                                                • String ID:
                                                                • API String ID: 1369581901-0
                                                                • Opcode ID: 46c6df5e477d7497093a289866e64b8d4491e61b26bae6d79cd5a01dca7a1c2a
                                                                • Instruction ID: bd1b3b065ac49c68eb9ebd48ec0408a34edd387738b53ad60383e4544465ed22
                                                                • Opcode Fuzzy Hash: 46c6df5e477d7497093a289866e64b8d4491e61b26bae6d79cd5a01dca7a1c2a
                                                                • Instruction Fuzzy Hash: C351A23C618A444FDB54EF2D988076977E2FB98318F2481BDC95EC7A56DB34D842CB82
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: free$_errno_getptd$_lockmalloc
                                                                • String ID:
                                                                • API String ID: 1369581901-0
                                                                • Opcode ID: a3a26e323750022a5642fc9cfd1b11b8c9e03ca5b3c3789877fa1a91f1119499
                                                                • Instruction ID: 380dc99b106918320c5c899842d47bb86fd459948e0f3397086df434f7c77415
                                                                • Opcode Fuzzy Hash: a3a26e323750022a5642fc9cfd1b11b8c9e03ca5b3c3789877fa1a91f1119499
                                                                • Instruction Fuzzy Hash: FD51053C618A484FD766DF2C98907E977E2FF58314F2041ADD99EC3B56DB3498428B42
                                                                APIs
                                                                • malloc.LIBCMT ref: 028717F5
                                                                • malloc.LIBCMT ref: 02871861
                                                                  • Part of subcall function 02879070: _FF_MSGBANNER.LIBCMT ref: 028790A0
                                                                  • Part of subcall function 02879070: _callnewh.LIBCMT ref: 028790DE
                                                                  • Part of subcall function 02879070: _errno.LIBCMT ref: 028790E9
                                                                  • Part of subcall function 02879070: _errno.LIBCMT ref: 028790F4
                                                                • free.LIBCMT ref: 0287188A
                                                                  • Part of subcall function 02879030: _errno.LIBCMT ref: 02879050
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$malloc$_callnewhfree
                                                                • String ID: d$d$d
                                                                • API String ID: 1789327305-1898527202
                                                                • Opcode ID: e9053c7a343c0b83d9d295b64127538e78e5f548f8b7e2bc9a1aaa569d59c23e
                                                                • Instruction ID: e70bcc667cc5bfb2aa385ac5f0d300747cce2b24e5dbd4a74b52dc57080baa85
                                                                • Opcode Fuzzy Hash: e9053c7a343c0b83d9d295b64127538e78e5f548f8b7e2bc9a1aaa569d59c23e
                                                                • Instruction Fuzzy Hash: D751B2B4424A198FDB90DF19D088B957BE4FB58704F5582BAD80CCB26ADB74C884CFA1
                                                                APIs
                                                                • malloc.LIBCMT ref: 028B1F02
                                                                • malloc.LIBCMT ref: 028B1F6E
                                                                  • Part of subcall function 028B977D: _FF_MSGBANNER.LIBCMT ref: 028B97AD
                                                                  • Part of subcall function 028B977D: _callnewh.LIBCMT ref: 028B97EB
                                                                  • Part of subcall function 028B977D: _errno.LIBCMT ref: 028B97F6
                                                                  • Part of subcall function 028B977D: _errno.LIBCMT ref: 028B9801
                                                                • free.LIBCMT ref: 028B1F97
                                                                  • Part of subcall function 028B973D: _errno.LIBCMT ref: 028B975D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _errno$malloc$_callnewhfree
                                                                • String ID: d$d$d
                                                                • API String ID: 1789327305-1898527202
                                                                • Opcode ID: 1f798697604a03fc75b9b18e084cac3ea39fc0a6f99398ec1fcba1ef6a5bdc0e
                                                                • Instruction ID: 2babff40f6d396eee965f287ba427bc49b102c6fcc5624f7adc14759f5030263
                                                                • Opcode Fuzzy Hash: 1f798697604a03fc75b9b18e084cac3ea39fc0a6f99398ec1fcba1ef6a5bdc0e
                                                                • Instruction Fuzzy Hash: 7651C2B4414A198FDB91DF18D088B957BE4FF58700F5582AA980CCF36ADBB4C844CFA1
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E5EE0F
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                  • Part of subcall function 02E5EA2C: _getptd.LIBCMT ref: 02E5EA36
                                                                  • Part of subcall function 02E5EA2C: _amsg_exit.LIBCMT ref: 02E5EAD3
                                                                  • Part of subcall function 02E5EAE8: GetOEMCP.KERNEL32 ref: 02E5EB12
                                                                  • Part of subcall function 02E5A7E0: malloc.LIBCMT ref: 02E5A80B
                                                                  • Part of subcall function 02E5A7E0: Sleep.KERNEL32 ref: 02E5A81E
                                                                • free.LIBCMT ref: 02E5EE9A
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                • _lock.LIBCMT ref: 02E5EECA
                                                                • free.LIBCMT ref: 02E5EF6D
                                                                • free.LIBCMT ref: 02E5EF99
                                                                • _errno.LIBCMT ref: 02E5EF9E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_amsg_exit_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
                                                                • String ID:
                                                                • API String ID: 3894533514-0
                                                                • Opcode ID: 2854a5756f7ba83f048a3981276ffac91aab162a3a0ca66450eb40d5492f030e
                                                                • Instruction ID: aba2428cfbbf846445ad5d463061ee551b17c4278748fe6e5a228f4eb54bfcfe
                                                                • Opcode Fuzzy Hash: 2854a5756f7ba83f048a3981276ffac91aab162a3a0ca66450eb40d5492f030e
                                                                • Instruction Fuzzy Hash: E0412B362A069086D714DF66E44036EB7A6F784B98F5CE116EE9E47358CF7CC542C720
                                                                APIs
                                                                • malloc.LIBCMT ref: 02E417C5
                                                                • malloc.LIBCMT ref: 02E41831
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                • free.LIBCMT ref: 02E4185A
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$Heapmalloc$AllocErrorFreeLast_callnewhfree
                                                                • String ID: d$d$d
                                                                • API String ID: 161857241-1898527202
                                                                • Opcode ID: cfde20c8cbbf88260583b06dcbb63c88aa0b5bb1562ef053c57e5ef22d106b36
                                                                • Instruction ID: d3157fa8046c2c81c7a08c3ac5f6879b6de24d8cab50395312256832a7f65c4b
                                                                • Opcode Fuzzy Hash: cfde20c8cbbf88260583b06dcbb63c88aa0b5bb1562ef053c57e5ef22d106b36
                                                                • Instruction Fuzzy Hash: D341E372151B90C9E7908F65E8443893BA8F748F88F59913AEB8C4B758EF79C494CB60
                                                                APIs
                                                                • _FF_MSGBANNER.LIBCMT ref: 0287D917
                                                                  • Part of subcall function 0287A56C: _set_error_mode.LIBCMT ref: 0287A575
                                                                  • Part of subcall function 0287A56C: _set_error_mode.LIBCMT ref: 0287A584
                                                                  • Part of subcall function 0287A30C: _set_error_mode.LIBCMT ref: 0287A351
                                                                  • Part of subcall function 0287A30C: _set_error_mode.LIBCMT ref: 0287A362
                                                                  • Part of subcall function 0287C020: malloc.LIBCMT ref: 0287C04B
                                                                • _errno.LIBCMT ref: 0287D959
                                                                • _lock.LIBCMT ref: 0287D96D
                                                                • free.LIBCMT ref: 0287D990
                                                                • _errno.LIBCMT ref: 0287D995
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _set_error_mode$_errno$_lockfreemalloc
                                                                • String ID:
                                                                • API String ID: 360200360-0
                                                                • Opcode ID: 9c2658a345bce7dce076b7d317fbf23e7a87b99cd53fc0ce5dd5aaa652460754
                                                                • Instruction ID: 570edf75c8f0a6c61c9e6d72f62f89161976eba91f5a2412a9511c3a2769ccda
                                                                • Opcode Fuzzy Hash: 9c2658a345bce7dce076b7d317fbf23e7a87b99cd53fc0ce5dd5aaa652460754
                                                                • Instruction Fuzzy Hash: D0216D3C619A0D8FEBA4BFA8D45476972E2FF89315F404429D44EC3195DB78D880CB92
                                                                APIs
                                                                • _FF_MSGBANNER.LIBCMT ref: 028BE024
                                                                  • Part of subcall function 028BAC79: _set_error_mode.LIBCMT ref: 028BAC82
                                                                  • Part of subcall function 028BAC79: _set_error_mode.LIBCMT ref: 028BAC91
                                                                  • Part of subcall function 028BAA19: _set_error_mode.LIBCMT ref: 028BAA5E
                                                                  • Part of subcall function 028BAA19: _set_error_mode.LIBCMT ref: 028BAA6F
                                                                  • Part of subcall function 028BC72D: malloc.LIBCMT ref: 028BC758
                                                                • _errno.LIBCMT ref: 028BE066
                                                                • _lock.LIBCMT ref: 028BE07A
                                                                • free.LIBCMT ref: 028BE09D
                                                                • _errno.LIBCMT ref: 028BE0A2
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _set_error_mode$_errno$_lockfreemalloc
                                                                • String ID:
                                                                • API String ID: 360200360-0
                                                                • Opcode ID: a8d1a849ba7514cffc48d6dd0af4df3d36399617e27afee878002197c3e2bd21
                                                                • Instruction ID: ce1507fbd3c420dbf59ebf3c39a9f61e696cb25dbe7e80bbef620c6cc2d9879b
                                                                • Opcode Fuzzy Hash: a8d1a849ba7514cffc48d6dd0af4df3d36399617e27afee878002197c3e2bd21
                                                                • Instruction Fuzzy Hash: 9B21803C258A0D8FE756AFA8D4547E976D1FF49304F80442DD94AC3390DB749886CF52
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 02E623C9
                                                                • WideCharToMultiByte.KERNEL32 ref: 02E62420
                                                                • WideCharToMultiByte.KERNEL32 ref: 02E6245B
                                                                • free.LIBCMT ref: 02E62468
                                                                • FreeEnvironmentStringsW.KERNEL32 ref: 02E62473
                                                                • FreeEnvironmentStringsW.KERNEL32 ref: 02E62481
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentStrings$ByteCharFreeMultiWide$free
                                                                • String ID:
                                                                • API String ID: 517548149-0
                                                                • Opcode ID: 5115370a6637f46d455a6b6ed31cd9b9a6bc26a856794a30b061c6b7729e81b1
                                                                • Instruction ID: ca27aa207b3d091b5eb347f6bfc6fddcb3cb074abcebc96974ef76872002bf18
                                                                • Opcode Fuzzy Hash: 5115370a6637f46d455a6b6ed31cd9b9a6bc26a856794a30b061c6b7729e81b1
                                                                • Instruction Fuzzy Hash: BF21627269578086DB249F62B44876A77A5F788BD8F4C9024DE8A07F18DF3CD050C744
                                                                APIs
                                                                • ResetEvent.KERNEL32 ref: 02E4530C
                                                                • ResetEvent.KERNEL32 ref: 02E45319
                                                                • timeGetTime.WINMM ref: 02E4531F
                                                                • WaitForSingleObject.KERNEL32 ref: 02E45373
                                                                • ResetEvent.KERNEL32 ref: 02E45390
                                                                  • Part of subcall function 02E44D20: GetCurrentThreadId.KERNEL32 ref: 02E44D2D
                                                                • ResetEvent.KERNEL32 ref: 02E453B7
                                                                  • Part of subcall function 02E5576C: _errno.LIBCMT ref: 02E55797
                                                                  • Part of subcall function 02E5576C: _invalid_parameter_noinfo.LIBCMT ref: 02E557A2
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: EventReset$CurrentObjectSingleThreadTimeWait_errno_invalid_parameter_noinfotime
                                                                • String ID:
                                                                • API String ID: 2543248268-0
                                                                • Opcode ID: 492e06cf4619c2e6ba0829753654616a12db9333c9bbbb47ed89defe3f5a3c1e
                                                                • Instruction ID: 8818e57b640c8f9351a648407b9a2d5dd52ca3a4d430e47e4079b3fcb4a016de
                                                                • Opcode Fuzzy Hash: 492e06cf4619c2e6ba0829753654616a12db9333c9bbbb47ed89defe3f5a3c1e
                                                                • Instruction Fuzzy Hash: E2213736244A9086DB41CF25F84835DB3A4FB98F9CF589522DE4E97B68DF38C982C740
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 02E44D2D
                                                                  • Part of subcall function 02E44100: SwitchToThread.KERNEL32 ref: 02E4413E
                                                                  • Part of subcall function 02E44100: SetLastError.KERNEL32 ref: 02E44185
                                                                • send.WS2_32 ref: 02E44D79
                                                                • SetEvent.KERNEL32 ref: 02E44D97
                                                                • WSACloseEvent.WS2_32 ref: 02E44DAB
                                                                • shutdown.WS2_32 ref: 02E44DC4
                                                                • closesocket.WS2_32 ref: 02E44DCE
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: EventThread$CloseCurrentErrorLastSwitchclosesocketsendshutdown
                                                                • String ID:
                                                                • API String ID: 779811758-0
                                                                • Opcode ID: b4979450ec0c19de12122228c918dce67c8ffdc185b34bad9865e685935668f6
                                                                • Instruction ID: fccfda234edcd2882beacd018b5ace3e5a511992cee96b070d46236ddf32d134
                                                                • Opcode Fuzzy Hash: b4979450ec0c19de12122228c918dce67c8ffdc185b34bad9865e685935668f6
                                                                • Instruction Fuzzy Hash: D321EF3275068186DB149F3AF8587197362FB99FACF546321DA3A47AD8DF34C885C740
                                                                APIs
                                                                • GetLastError.KERNEL32 ref: 02E5DF16
                                                                • FlsGetValue.KERNEL32 ref: 02E5DF24
                                                                • SetLastError.KERNEL32 ref: 02E5DF7C
                                                                  • Part of subcall function 02E5A860: Sleep.KERNEL32 ref: 02E5A8A5
                                                                • FlsSetValue.KERNEL32 ref: 02E5DF50
                                                                • free.LIBCMT ref: 02E5DF73
                                                                  • Part of subcall function 02E5DE54: _lock.LIBCMT ref: 02E5DEA8
                                                                  • Part of subcall function 02E5DE54: _lock.LIBCMT ref: 02E5DEC7
                                                                • GetCurrentThreadId.KERNEL32 ref: 02E5DF64
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                • String ID:
                                                                • API String ID: 3106088686-0
                                                                • Opcode ID: ad1fb755669453110f52bd1be8a0bd03a16cf7015427440e3a7436090f7943d3
                                                                • Instruction ID: c2b228509f0babe7d16d8833f99bfb4ca5d35d48355563d8ccc9d3598dbe6e26
                                                                • Opcode Fuzzy Hash: ad1fb755669453110f52bd1be8a0bd03a16cf7015427440e3a7436090f7943d3
                                                                • Instruction Fuzzy Hash: AD01673569074186EF049F66E85C36872A2BB58BA5F18E234DD2B03B94EF3CC405C620
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_errno
                                                                • String ID:
                                                                • API String ID: 2288870239-0
                                                                • Opcode ID: 032b138e252d8cb97ad2d4774b9f54bdca08d78cdba61d487e36b433dbb5637c
                                                                • Instruction ID: 0723cdfc8b3fa025da132299e096d90b7bb18b582aa474effcd665fd81f6dcda
                                                                • Opcode Fuzzy Hash: 032b138e252d8cb97ad2d4774b9f54bdca08d78cdba61d487e36b433dbb5637c
                                                                • Instruction Fuzzy Hash: 07915A79116A4A8FC795EF6CC088B69F7E1FF59308B1844AEC04EDB621C771E892CB51
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$CallTranslator
                                                                • String ID: MOC$RCC
                                                                • API String ID: 3569367362-2084237596
                                                                • Opcode ID: 71d4d7f3723b5425788edb4ff7159e0c2d35ca9445fe2397f069a4d9efb0fa2f
                                                                • Instruction ID: dc78a02430edc6a4c191ee18e3ec78d844d6e2c6b7d4b4e6affaa9d72bd05ea9
                                                                • Opcode Fuzzy Hash: 71d4d7f3723b5425788edb4ff7159e0c2d35ca9445fe2397f069a4d9efb0fa2f
                                                                • Instruction Fuzzy Hash: CA61A438118B0A8FD724FF58C4457E9B3E2FF80718F544AAED489C7515DBB4A692CB82
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E5950D
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                • _getptd.LIBCMT ref: 02E5952B
                                                                • _CallSETranslator.LIBCMT ref: 02E59573
                                                                  • Part of subcall function 02E577B4: _getptd.LIBCMT ref: 02E577DB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$CallTranslator_amsg_exit
                                                                • String ID: MOC$RCC
                                                                • API String ID: 1374396951-2084237596
                                                                • Opcode ID: af59dbc463a79ad219f14499a5ba5a340a132d3c24739908f5f8128250e8645e
                                                                • Instruction ID: d67df28b66ab66ce3037e0c4ef0b1c912abf66ebe9b3b522c633533121ca62b2
                                                                • Opcode Fuzzy Hash: af59dbc463a79ad219f14499a5ba5a340a132d3c24739908f5f8128250e8645e
                                                                • Instruction Fuzzy Hash: 5D51B072664AE0D5CF20DB15E0903ADB3A1FB81B8CF05A526EF5E47618DBB8C165CB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free
                                                                • String ID:
                                                                • API String ID: 1294909896-0
                                                                • Opcode ID: b55e574dcef07286ea42fa4fc00e6fe334b5dcd76448c2a0d4ff0b76fb3ee2ea
                                                                • Instruction ID: 3d37f6bce1a0119136e15cab1336acf2cc03375fbe9d14f628624ec9b9594f8d
                                                                • Opcode Fuzzy Hash: b55e574dcef07286ea42fa4fc00e6fe334b5dcd76448c2a0d4ff0b76fb3ee2ea
                                                                • Instruction Fuzzy Hash: CB51F236282B8485CE64DF99E5803ADB365F708B88F5CE012CB8E5B710DF78E4A1D325
                                                                APIs
                                                                • _fileno.LIBCMT ref: 02E57ED4
                                                                  • Part of subcall function 02E62988: _errno.LIBCMT ref: 02E62991
                                                                  • Part of subcall function 02E62988: _invalid_parameter_noinfo.LIBCMT ref: 02E6299C
                                                                • _errno.LIBCMT ref: 02E57F3D
                                                                • _invalid_parameter_noinfo.LIBCMT ref: 02E57F48
                                                                • _getbuf.LIBCMT ref: 02E57F7C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo$_fileno_getbuf
                                                                • String ID: @
                                                                • API String ID: 3036866907-2766056989
                                                                • Opcode ID: 92bb1f8a3983eb5cf48ea023ccb70438d663d5b0186222f9965649d0791287cf
                                                                • Instruction ID: d54efacdcbe1d4f95143e4519c3eca480ad046b0c817a6bdb62de6cac0defaf1
                                                                • Opcode Fuzzy Hash: 92bb1f8a3983eb5cf48ea023ccb70438d663d5b0186222f9965649d0791287cf
                                                                • Instruction Fuzzy Hash: E731BB63170BA485CF29CF3AD444328B651E751BACF58F245DF6A062E5CB78C4A1C3A1
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$ExceptionRaise_amsg_exit
                                                                • String ID: csm
                                                                • API String ID: 4155239085-1018135373
                                                                • Opcode ID: 553b0e037f61d14c01cc02cf9b2f8149e3dae0138a7a1939c678450fe90a323b
                                                                • Instruction ID: 91e206e07dd4506a64a88e02ef2fa2ffa38ffd7a789deb842bd8c86071ed2041
                                                                • Opcode Fuzzy Hash: 553b0e037f61d14c01cc02cf9b2f8149e3dae0138a7a1939c678450fe90a323b
                                                                • Instruction Fuzzy Hash: B2217C362546A0C7C730DF12E04479EB361F789BA9F059226DF9A07B55CB3AD886CB60
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseDeleteOpenValue
                                                                • String ID: Console$IpDatespecial
                                                                • API String ID: 849931509-1840232981
                                                                • Opcode ID: fe9ff08b8168959544f01ab8a0301821abe9536671df0fbfa079717db41a1f95
                                                                • Instruction ID: 4d60a9891d840af294a29e03bc8e242bcf6d07e5fea829d0973a45f7324f9b97
                                                                • Opcode Fuzzy Hash: fe9ff08b8168959544f01ab8a0301821abe9536671df0fbfa079717db41a1f95
                                                                • Instruction Fuzzy Hash: EBF05E37759981C6EB60DB65F808B89B334F794BACF005111CE5D13A98DF38C189C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$__free_lconv_num
                                                                • String ID:
                                                                • API String ID: 1547021563-0
                                                                • Opcode ID: 3af7023e6504110db29df3efcdcc5bcf3b4445538e5297c523f39fa9476b72f6
                                                                • Instruction ID: fb8528b545e0bc340c18f964a3762f58863f447352d0bb1accc758e6bf21b813
                                                                • Opcode Fuzzy Hash: 3af7023e6504110db29df3efcdcc5bcf3b4445538e5297c523f39fa9476b72f6
                                                                • Instruction Fuzzy Hash: 7B51C232395B848ACB60DF66E4447AA77A1F788BC8F94A526EF8E47714DF78C142C740
                                                                APIs
                                                                • _fileno.LIBCMT ref: 02E5C655
                                                                  • Part of subcall function 02E62988: _errno.LIBCMT ref: 02E62991
                                                                  • Part of subcall function 02E62988: _invalid_parameter_noinfo.LIBCMT ref: 02E6299C
                                                                • _errno.LIBCMT ref: 02E5C665
                                                                • _errno.LIBCMT ref: 02E5C681
                                                                • _isatty.LIBCMT ref: 02E5C6E2
                                                                • _getbuf.LIBCMT ref: 02E5C6EE
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_fileno_getbuf_invalid_parameter_noinfo_isatty
                                                                • String ID:
                                                                • API String ID: 2574049805-0
                                                                • Opcode ID: 954e8c99a8900c331c29789858b1bedd508e20dff7a8ac605596c6e7a6fc1fdf
                                                                • Instruction ID: 761d74b2e7db0263f99a7006d9d302dc0037cf93ddd6c8da471405887c7fccae
                                                                • Opcode Fuzzy Hash: 954e8c99a8900c331c29789858b1bedd508e20dff7a8ac605596c6e7a6fc1fdf
                                                                • Instruction Fuzzy Hash: B441E5726A0B6486DB189F38C46032D77A0E784F98F24F216DF6A477D4DBB8C591CB80
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast
                                                                • String ID: Main
                                                                • API String ID: 1452528299-521822810
                                                                • Opcode ID: b2a94ced38afb3e22c07dba05b3cc46be14585edf82a77f9e8eff251cf469d4b
                                                                • Instruction ID: bcced76132d3a52a7c9a6be3d792ddac651d40b3ac6dcad9324b6b3272bbc830
                                                                • Opcode Fuzzy Hash: b2a94ced38afb3e22c07dba05b3cc46be14585edf82a77f9e8eff251cf469d4b
                                                                • Instruction Fuzzy Hash: 29416A76760A60CADB14CF15E05476D73A1F748B88F459125DF8D4BB48DB38E852CB44
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastRead$mallocrealloc
                                                                • String ID:
                                                                • API String ID: 3638135368-0
                                                                • Opcode ID: 10d6ceea749d552203bf34d92a345c17516fdb6c7073bfd954073bc12734bd9a
                                                                • Instruction ID: 017e5f0036f52b167040ffe7868e9269af01c067ca65888646cdf895bf0253d4
                                                                • Opcode Fuzzy Hash: 10d6ceea749d552203bf34d92a345c17516fdb6c7073bfd954073bc12734bd9a
                                                                • Instruction Fuzzy Hash: DD413836251B94CBDF248F16F8547AAB7A0FB48B98F489425EF8A07B24DF78E045C710
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _lock$_errno_getptd_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2808128820-0
                                                                • Opcode ID: 87a3bca82977cd9d54f1f39a71e6bafcd63422e4aa423f7f8be8756c9ddb47b7
                                                                • Instruction ID: d04546df8e94e13ce64bb3754a621b663296256e868f5b00980884d917f51ce6
                                                                • Opcode Fuzzy Hash: 87a3bca82977cd9d54f1f39a71e6bafcd63422e4aa423f7f8be8756c9ddb47b7
                                                                • Instruction Fuzzy Hash: 4041C5352A56A085EB04EB22D95477A73A2FB45BCCF04E229EE4D47798DF79C041CB10
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$StringTypefreemalloc
                                                                • String ID:
                                                                • API String ID: 307345228-0
                                                                • Opcode ID: 82f0262a8cecbef224ca61b156e5a0f0d612a4380812b26c100bd67c1e5a9d7b
                                                                • Instruction ID: a59d50ee0f1d6393fe7082df25f6d4abebe9688f2d24ce78af15367f0b69650d
                                                                • Opcode Fuzzy Hash: 82f0262a8cecbef224ca61b156e5a0f0d612a4380812b26c100bd67c1e5a9d7b
                                                                • Instruction Fuzzy Hash: A1318372290B809ADB109F26D8047A973A6FB48FFCF589656EE6D47BD4DF38C0418740
                                                                APIs
                                                                • malloc.LIBCMT ref: 02E4C703
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                • free.LIBCMT ref: 02E4C72B
                                                                • CreateDIBSection.GDI32 ref: 02E4C797
                                                                • free.LIBCMT ref: 02E4C7B6
                                                                  • Part of subcall function 02E4D020: GetObjectW.GDI32 ref: 02E4D052
                                                                • free.LIBCMT ref: 02E4C7F6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$_errno$AllocCreateHeapObjectSection_callnewhmalloc
                                                                • String ID:
                                                                • API String ID: 2034203143-0
                                                                • Opcode ID: 909639d14f8662df755ceb05cb6a705d2a69ecb05bda05ce9b7b934898073f82
                                                                • Instruction ID: b481d0266d225aab12e3f58a950d6268f964ba9c48dc0b3b5d1fa0321dc9b9cf
                                                                • Opcode Fuzzy Hash: 909639d14f8662df755ceb05cb6a705d2a69ecb05bda05ce9b7b934898073f82
                                                                • Instruction Fuzzy Hash: BB31923634678087DB259F22E40076AB6A5FB88BC8F5CE426DF8957B24EF38D011CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$recv
                                                                • String ID:
                                                                • API String ID: 316788870-0
                                                                • Opcode ID: be8605be28e57c5448ca43f127e085b1cff2f5d855780fd9c761576df26d9ebe
                                                                • Instruction ID: 3466b948ba3b86da744dd7c428db47732f73c6971a764cddd56ab2099dbc9770
                                                                • Opcode Fuzzy Hash: be8605be28e57c5448ca43f127e085b1cff2f5d855780fd9c761576df26d9ebe
                                                                • Instruction Fuzzy Hash: 7231BC72344A8186EB209F39F44839D37A1F749B8CF54A522DF1983BA8DF39C484EB01
                                                                APIs
                                                                • _ctrlfp.LIBCMT ref: 02E6CC31
                                                                • _exception_enabled.LIBCMT ref: 02E6CC54
                                                                  • Part of subcall function 02E6CB34: _set_statfp.LIBCMT ref: 02E6CB5B
                                                                  • Part of subcall function 02E6CB34: _set_statfp.LIBCMT ref: 02E6CBCE
                                                                • _raise_exc.LIBCMT ref: 02E6CCA0
                                                                • _ctrlfp.LIBCMT ref: 02E6CCE0
                                                                • _ctrlfp.LIBCMT ref: 02E6CD11
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _ctrlfp$_set_statfp$_exception_enabled_raise_exc
                                                                • String ID:
                                                                • API String ID: 3456427917-0
                                                                • Opcode ID: 6d0b5b3ad2c709662f382e20db8cab413169064652d1349d93ce4c8a5f060bc7
                                                                • Instruction ID: 6683416276cc468c4719d0332b31e51f52c7eaf6f1a32d012596340fb325bd32
                                                                • Opcode Fuzzy Hash: 6d0b5b3ad2c709662f382e20db8cab413169064652d1349d93ce4c8a5f060bc7
                                                                • Instruction Fuzzy Hash: AE318432654E848AD751DF25E84876FB776F78A3D8F506216FE8917A18DF38C446CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Virtual$AllocGuaranteeInfoProtectQueryStackSystemThread
                                                                • String ID:
                                                                • API String ID: 513674450-0
                                                                • Opcode ID: 1024e802668d761e8f9f1b2b79f1ec6faa9c774cb7cb2bbf6b7d463fff73795d
                                                                • Instruction ID: 695e25a6e2e495c6cf3976d7e219f3d70c39191acd6ad6ab97175749c1e0bad3
                                                                • Opcode Fuzzy Hash: 1024e802668d761e8f9f1b2b79f1ec6faa9c774cb7cb2bbf6b7d463fff73795d
                                                                • Instruction Fuzzy Hash: F4314136390A959ADB24CF31E8547D933A8F748B8CF8895269E4E87B48DF38D645C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$__doserrno
                                                                • String ID:
                                                                • API String ID: 2614100947-0
                                                                • Opcode ID: 9c10f4dddecf88ff0f614810f4e23f27c8e3f15c21c1131958e96a886f5cc72c
                                                                • Instruction ID: ffcbd31af70282862cd43402295dd6f2158aea929f79d046b9be48bdae2d37cb
                                                                • Opcode Fuzzy Hash: 9c10f4dddecf88ff0f614810f4e23f27c8e3f15c21c1131958e96a886f5cc72c
                                                                • Instruction Fuzzy Hash: 2C21023C6086458EE714BFACD8D977D7692EF85324F09461CD45ECB2E1DB748842CBA2
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _errno$__doserrno
                                                                • String ID:
                                                                • API String ID: 2614100947-0
                                                                • Opcode ID: 1e62d9c386a74b43a65d93e3c78ab7b1f09407b89e46e5cb920697f667b46571
                                                                • Instruction ID: 7bd1a2741a539f0303f4adcab51a3834ad2da37fca94016e55a246c09bf05355
                                                                • Opcode Fuzzy Hash: 1e62d9c386a74b43a65d93e3c78ab7b1f09407b89e46e5cb920697f667b46571
                                                                • Instruction Fuzzy Hash: 2021353C704B054EE3196FAC98D937D7A92EF46324F25456CD55EC7292EB74C8408F92
                                                                APIs
                                                                • DecodePointer.KERNEL32 ref: 02E5590D
                                                                • DecodePointer.KERNEL32 ref: 02E5591D
                                                                • EncodePointer.KERNEL32 ref: 02E5599B
                                                                  • Part of subcall function 02E5A8E4: realloc.LIBCMT ref: 02E5A90F
                                                                  • Part of subcall function 02E5A8E4: Sleep.KERNEL32 ref: 02E5A92B
                                                                • EncodePointer.KERNEL32 ref: 02E559AB
                                                                • EncodePointer.KERNEL32 ref: 02E559B8
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Pointer$Encode$Decode$Sleeprealloc
                                                                • String ID:
                                                                • API String ID: 1601076685-0
                                                                • Opcode ID: 41bb2ee92579e29bb048e88261e2f5d15513c2e40ba12b19a60fef79da225d25
                                                                • Instruction ID: e1f273d22e4ac87ff88bc01c094de89fc9b98d9883764b3f5692763e4126716f
                                                                • Opcode Fuzzy Hash: 41bb2ee92579e29bb048e88261e2f5d15513c2e40ba12b19a60fef79da225d25
                                                                • Instruction Fuzzy Hash: BF2195213A2BA481DA109F52F94C359B361F749BE4F84A835DE6E47B18EF7CC485C701
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ObjectSelect$ColorCompatibleCreateDeleteTable
                                                                • String ID:
                                                                • API String ID: 3899591553-0
                                                                • Opcode ID: 25bca2b50bd8d51f8858a6c8eb88d856bb50887b8d04bad872bb72e688f53c5b
                                                                • Instruction ID: 2a454ba23f65de6ed094ad9cea80d8a5e9421a2b958779ec357f5b025398844d
                                                                • Opcode Fuzzy Hash: 25bca2b50bd8d51f8858a6c8eb88d856bb50887b8d04bad872bb72e688f53c5b
                                                                • Instruction Fuzzy Hash: 6B118936245A4089EB548F26F49871933A5FBA8BD8F24B126DE4B53B18CF39C485C380
                                                                APIs
                                                                • OpenProcess.KERNEL32 ref: 02E4A762
                                                                • malloc.LIBCMT ref: 02E4A770
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                • GetCurrentProcessId.KERNEL32 ref: 02E4A7A7
                                                                • free.LIBCMT ref: 02E4A7C3
                                                                • CloseHandle.KERNEL32 ref: 02E4A7CB
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process_errno$AllocCloseCurrentHandleHeapOpen_callnewhfreemalloc
                                                                • String ID:
                                                                • API String ID: 1715275611-0
                                                                • Opcode ID: 6199685c681e89abc964dfd2cc35e6f96c4d0bea44aa1d2d8b5656ebf405cfb4
                                                                • Instruction ID: e0d1f4d5e534724a695745063b0e30379f421894c855fa810b3425addcea485f
                                                                • Opcode Fuzzy Hash: 6199685c681e89abc964dfd2cc35e6f96c4d0bea44aa1d2d8b5656ebf405cfb4
                                                                • Instruction Fuzzy Hash: 12119D32794A8086EB209B56F42875DB771F788BD8F889125DB9E03B49CF38C4818B40
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 02E45DE5
                                                                • EnterCriticalSection.KERNEL32 ref: 02E45DEF
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E45DFF
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E45E09
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$EnterLeave
                                                                • String ID:
                                                                • API String ID: 3168844106-0
                                                                • Opcode ID: 44c292e90eb37e2d7492bf557040c1a2ec22a7d7a39af7b405922077d069d486
                                                                • Instruction ID: c1e13cb1e95f34847b2fb4ffc248c94145eede8a503aa639f215c52710835f21
                                                                • Opcode Fuzzy Hash: 44c292e90eb37e2d7492bf557040c1a2ec22a7d7a39af7b405922077d069d486
                                                                • Instruction Fuzzy Hash: 0C11EC36664A8083EB649B62F8983AA7360F758795F846021DB9B47E64DF3CD5CAC700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: 7dc4d60269de1f28ce6bcda9ddb35f367140244f83087da5b98b7f79842c89cf
                                                                • Instruction ID: 0c1874710eab3c5ea317fc7c931c2002559cfcd3042e033fd09506f7ac782927
                                                                • Opcode Fuzzy Hash: 7dc4d60269de1f28ce6bcda9ddb35f367140244f83087da5b98b7f79842c89cf
                                                                • Instruction Fuzzy Hash: 1CF0623C5649498EE719FB68C8947B832A1FF4533AF894298D01ACB1F5E77C9444CA63
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: 3f8399101a99e04f111acb68838fd8e0fe981b5cff2cdfebbd5aafd65add2f64
                                                                • Instruction ID: ce07f52b1fb5c7f5cc29d7f9fa4ea3db50348c67aebcd438850dc2a7b1dbf68b
                                                                • Opcode Fuzzy Hash: 3f8399101a99e04f111acb68838fd8e0fe981b5cff2cdfebbd5aafd65add2f64
                                                                • Instruction Fuzzy Hash: 4BF0C23C168949CED70AAB6CCC507A43691FF46329FA4D34CE506C72E2C7788440CB52
                                                                APIs
                                                                • GetSystemTimeAsFileTime.KERNEL32 ref: 02E6254B
                                                                • GetCurrentProcessId.KERNEL32 ref: 02E62556
                                                                • GetCurrentThreadId.KERNEL32 ref: 02E62562
                                                                • GetTickCount.KERNEL32 ref: 02E6256E
                                                                • QueryPerformanceCounter.KERNEL32 ref: 02E6257F
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                • String ID:
                                                                • API String ID: 1445889803-0
                                                                • Opcode ID: 97ad835b81cb6df91117922e019d69de1d0eaff2d601c02b2c415f9bb153aa1b
                                                                • Instruction ID: 1f9378ddff1f1da1b6f91193d5020447d3c247592fa62ccb2917e4cfb4cc9eb0
                                                                • Opcode Fuzzy Hash: 97ad835b81cb6df91117922e019d69de1d0eaff2d601c02b2c415f9bb153aa1b
                                                                • Instruction Fuzzy Hash: 2A01B1212A9B8082EB50CF21F85D3557364F759BD6F547621EE6F47BA0DB3CC8858700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$Enter$DeleteGdiplusLeaveObjectShutdown
                                                                • String ID:
                                                                • API String ID: 1513102227-0
                                                                • Opcode ID: d4542beb37d90f8ad3c0edd15d75e9a44333cb729b96ee7ae577a21e01d114c8
                                                                • Instruction ID: a1a952211d6f4d94c13d05f2ec5c481317ab6966918653c55322b3df8a5c3acf
                                                                • Opcode Fuzzy Hash: d4542beb37d90f8ad3c0edd15d75e9a44333cb729b96ee7ae577a21e01d114c8
                                                                • Instruction Fuzzy Hash: D911D771282B86C1EB149F65F89C3543374FB28F68F646225C5AE43AB0DF39C19AC350
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: __doserrno_errno
                                                                • String ID:
                                                                • API String ID: 921712934-0
                                                                • Opcode ID: b090733ce00a7d6ef75ad3e43b7a98ae415e30c3fad73d63844ff4cd7894af6a
                                                                • Instruction ID: 4f007ba4f1268eb7751f4d0960d4620510a1a08552b55cc972b03f33fed9dd99
                                                                • Opcode Fuzzy Hash: b090733ce00a7d6ef75ad3e43b7a98ae415e30c3fad73d63844ff4cd7894af6a
                                                                • Instruction Fuzzy Hash: 2FF0F6B22E169484DE05AB14C89C33C76A29B90BB6F92E742DA3D0B3D0CBBC4445CA21
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                • String ID: -
                                                                • API String ID: 485257318-2547889144
                                                                • Opcode ID: b2371414ba15bd96bd34930c290af5108b2ff8fdf43211108ea949018dfebcf9
                                                                • Instruction ID: 00ff2a2de93f676166d9abb9f522d9bd6c621c0343706e304c1289c7c39bfa03
                                                                • Opcode Fuzzy Hash: b2371414ba15bd96bd34930c290af5108b2ff8fdf43211108ea949018dfebcf9
                                                                • Instruction Fuzzy Hash: F331D539218A888FDB55FB3C988177A73E1FB99354F044A2EEC8EC3244DE21D8458793
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                • String ID: -
                                                                • API String ID: 485257318-2547889144
                                                                • Opcode ID: 230054471ab9e94bf14a18ec9c1b65bcb69ff4194e86f8a2025a727ab66c8c29
                                                                • Instruction ID: 01e11bf09137d89dc14007524c4dd648efae7662c1bcc2ba6ce91ceae58098fe
                                                                • Opcode Fuzzy Hash: 230054471ab9e94bf14a18ec9c1b65bcb69ff4194e86f8a2025a727ab66c8c29
                                                                • Instruction Fuzzy Hash: C231E739218A884FCB55EB7C98817AA77E1FBC5315F24465EE88EC3240DF35D8468B93
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: EnumErrorEventEventsLastNetworkReset
                                                                • String ID:
                                                                • API String ID: 1050048411-3916222277
                                                                • Opcode ID: de254dcb7ccf77805dc610188d48849fc80be153bc30c80741740ae0a985eb5d
                                                                • Instruction ID: 32c505d42f4011af555433018e02ea71c5e5979b060330cd93efac763eca34f0
                                                                • Opcode Fuzzy Hash: de254dcb7ccf77805dc610188d48849fc80be153bc30c80741740ae0a985eb5d
                                                                • Instruction Fuzzy Hash: 3E418A722447808BE720CF29E40875A77E2F785B8CF159119DE4987798EFBAC946CF40
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm
                                                                • API String ID: 3186804695-1018135373
                                                                • Opcode ID: 916a707afdb0f71ebe95bef2f33ca7e6fa47fc2edc3f926a604d61cd2de3a953
                                                                • Instruction ID: 13bd1391c9a5a524b125977be079dbbde78058738bd6adc5f43ce153e29d7e37
                                                                • Opcode Fuzzy Hash: 916a707afdb0f71ebe95bef2f33ca7e6fa47fc2edc3f926a604d61cd2de3a953
                                                                • Instruction Fuzzy Hash: D4315A79208B048FDB64EF1CD484B69B3E1FB98715F5006ACD48EC7642DB31E842CB86
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                • String ID: -
                                                                • API String ID: 485257318-2547889144
                                                                • Opcode ID: 363d0df97914af9f27d5d13ea758efb9d61f29a21fe89b0b544be230302bbbe4
                                                                • Instruction ID: 4c4967050423927c79642f350058cf1a7ccc72920c34c4a1ca8f4109922af104
                                                                • Opcode Fuzzy Hash: 363d0df97914af9f27d5d13ea758efb9d61f29a21fe89b0b544be230302bbbe4
                                                                • Instruction Fuzzy Hash: 6D21C239218E8C4BCB54FB6CD88576AB3E5FB94310F54462EA89AC3284DF24D8458B93
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                • String ID: -
                                                                • API String ID: 485257318-2547889144
                                                                • Opcode ID: bbdcb5bc06b9c46dfb1d423dceb7eebd86a9672f6a5897a7d82af974e746431d
                                                                • Instruction ID: 408f183092c54ee4d5eff8447ece82d624da80e21f801e7cc1256ff570043dc6
                                                                • Opcode Fuzzy Hash: bbdcb5bc06b9c46dfb1d423dceb7eebd86a9672f6a5897a7d82af974e746431d
                                                                • Instruction Fuzzy Hash: 8B21C239218E4D8BC765FB7C988476BB3E5FB84310F14452EA88AC3284DF35D8458B92
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_fltout2_invalid_parameter_noinfo
                                                                • String ID: -
                                                                • API String ID: 485257318-2547889144
                                                                • Opcode ID: 02bff1a59af1fa515b6cbdd793a19a9d5db4cd0daae80a934fe287ecd89124cf
                                                                • Instruction ID: 1a45ad46501b1c8828227f45928ded0243cdb7f839c391e6a96dd921769c779c
                                                                • Opcode Fuzzy Hash: 02bff1a59af1fa515b6cbdd793a19a9d5db4cd0daae80a934fe287ecd89124cf
                                                                • Instruction Fuzzy Hash: 2E3109227D46C085DB219F25A84876EB761E785BE8F14E236EF8917B94DF3DC445CB00
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo
                                                                • String ID: 1
                                                                • API String ID: 2819658684-2212294583
                                                                • Opcode ID: 6b53c2dcc294edf9728eab1c0bef983e4baecdb5bea7ed18be76febd96b6e3f9
                                                                • Instruction ID: 02da83e0b901933ec00727ee79746b7f270671204d84f54111e59419d5b5e4c6
                                                                • Opcode Fuzzy Hash: 6b53c2dcc294edf9728eab1c0bef983e4baecdb5bea7ed18be76febd96b6e3f9
                                                                • Instruction Fuzzy Hash: DD113A62AE92D095DB178F38943837C6A75DB55BC8F89F071DB4617312D72DE940CB10
                                                                APIs
                                                                • _callnewh.LIBCMT ref: 02E55386
                                                                • malloc.LIBCMT ref: 02E55392
                                                                  • Part of subcall function 02E552C0: _FF_MSGBANNER.LIBCMT ref: 02E552F0
                                                                  • Part of subcall function 02E552C0: HeapAlloc.KERNEL32 ref: 02E55315
                                                                  • Part of subcall function 02E552C0: _callnewh.LIBCMT ref: 02E5532E
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55339
                                                                  • Part of subcall function 02E552C0: _errno.LIBCMT ref: 02E55344
                                                                • std::exception::exception.LIBCMT ref: 02E553FF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _callnewh_errno$AllocHeapmallocstd::exception::exception
                                                                • String ID: bad allocation
                                                                • API String ID: 2837191506-2104205924
                                                                • Opcode ID: 2789b863962101d94b643c399cf47e2269a7bf3f296a5f660e329cf77ed2a842
                                                                • Instruction ID: 68b107d4d22db69345e012385652d30cc771557447f83c1bc52e3f2edd7b9b92
                                                                • Opcode Fuzzy Hash: 2789b863962101d94b643c399cf47e2269a7bf3f296a5f660e329cf77ed2a842
                                                                • Instruction Fuzzy Hash: B2018F612E5B9691EF10EF20F8583992365FB54384FC8A421AD8E477A4EF7CC144CB10
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 1646373207-1276376045
                                                                • Opcode ID: 825098e7262f08d60cb7bdb3c3f67da28a0895d5aeadfa1fb81c8a544a304b7a
                                                                • Instruction ID: 3bd79f743347d4242883c5f6949efb675c4a6be8b6875e71e0b19b09d91101ea
                                                                • Opcode Fuzzy Hash: 825098e7262f08d60cb7bdb3c3f67da28a0895d5aeadfa1fb81c8a544a304b7a
                                                                • Instruction Fuzzy Hash: 1FD01710796A8182EE599BA0F8AC32823505B98798F48202D882E06355EF6886898310
                                                                APIs
                                                                  • Part of subcall function 02E5A7E0: malloc.LIBCMT ref: 02E5A80B
                                                                  • Part of subcall function 02E5A7E0: Sleep.KERNEL32 ref: 02E5A81E
                                                                • free.LIBCMT ref: 02E5ADD0
                                                                • free.LIBCMT ref: 02E5ADEC
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$Sleepmalloc
                                                                • String ID:
                                                                • API String ID: 1995388493-0
                                                                • Opcode ID: 937ab413b08246a84f5eda74101b413cfd46f5463a50d76eaf4660d41468c8d6
                                                                • Instruction ID: 1819eaeb5d9700216068d531778bfa695914abbcccb06066ab5ee1bbea680b1a
                                                                • Opcode Fuzzy Hash: 937ab413b08246a84f5eda74101b413cfd46f5463a50d76eaf4660d41468c8d6
                                                                • Instruction Fuzzy Hash: 9F419832391B9497DB14DF66E99039A33A4F784B98F849239EF8D47B10DF38D5628740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$Heap$FreeProcess
                                                                • String ID:
                                                                • API String ID: 3493288988-0
                                                                • Opcode ID: 6c013b565ca14f6815c43c194a3a20116d2b7f974b210a047db512b5b65b0d71
                                                                • Instruction ID: 201ab49026254919aa0c781c4a312c317d7e207a3df9e3c061118a162f33fd83
                                                                • Opcode Fuzzy Hash: 6c013b565ca14f6815c43c194a3a20116d2b7f974b210a047db512b5b65b0d71
                                                                • Instruction Fuzzy Hash: 3A314726761A6097DB28DBA6E14075D6370FB88F88F48A025DF4E07F14CF34D4A18740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfoiswctype
                                                                • String ID:
                                                                • API String ID: 248606491-0
                                                                • Opcode ID: aeb513ee65751ef69d87611bd964b8af52c6f8f90d4da357b889b4f01a58cbea
                                                                • Instruction ID: 5db8c28a943d0df2a48815a4ede419405ea146dbe104314113d3924ba844d9cb
                                                                • Opcode Fuzzy Hash: aeb513ee65751ef69d87611bd964b8af52c6f8f90d4da357b889b4f01a58cbea
                                                                • Instruction Fuzzy Hash: D5516D7F808A1949EB381A2DD88637A39C5FB42764F24121BDDEED7181F760D4838397
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfoiswctype
                                                                • String ID:
                                                                • API String ID: 248606491-0
                                                                • Opcode ID: 600b5e1a0884fd86083a6c40ec30f50f7914204e96c09ac3a2eb1a49d6991a14
                                                                • Instruction ID: 803c848d66862f1722107597a355eda0124efbc46094cf0474fb3a9c6acb2a24
                                                                • Opcode Fuzzy Hash: 600b5e1a0884fd86083a6c40ec30f50f7914204e96c09ac3a2eb1a49d6991a14
                                                                • Instruction Fuzzy Hash: 48414463AF117044EF346A2BD80437B219EBB42BACFD5F922DE5247190EB79C581C312
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: DecodePointer_errno_invalid_parameter_noinfo_lock
                                                                • String ID:
                                                                • API String ID: 27599310-0
                                                                • Opcode ID: 7363268150c92f0dc87d915cd02ac402206b057223f311218893b197a08f2757
                                                                • Instruction ID: 4905ad6cc7b09aea7ff82262fa381cb90529dc0e0495ec8c2779ed699b7b0e3d
                                                                • Opcode Fuzzy Hash: 7363268150c92f0dc87d915cd02ac402206b057223f311218893b197a08f2757
                                                                • Instruction Fuzzy Hash: F051CF322A47A086DA29CF65E8A437A6762F78579CF74F11BDE9E43714CF38C042C601
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$BaseImage
                                                                • String ID:
                                                                • API String ID: 2482573191-0
                                                                • Opcode ID: 9c5b89509d60e0603f5a734c5cd4ba2a093cff095a5bf51701f84cb58c52bfef
                                                                • Instruction ID: b5f9985361718bbeb5a1d28a96e4e74d4d961c0213631a8f0f17f18f069e4015
                                                                • Opcode Fuzzy Hash: 9c5b89509d60e0603f5a734c5cd4ba2a093cff095a5bf51701f84cb58c52bfef
                                                                • Instruction Fuzzy Hash: 6341F73D118A058ED314776CD4092B972D2FB85B29F2846EED48AC35A1EF74E9438B93
                                                                APIs
                                                                  • Part of subcall function 0287ECC8: _errno.LIBCMT ref: 0287ECD1
                                                                  • Part of subcall function 0287ECC8: _invalid_parameter_noinfo.LIBCMT ref: 0287ECDC
                                                                • _errno.LIBCMT ref: 0287AA95
                                                                • _errno.LIBCMT ref: 0287AAB1
                                                                • _isatty.LIBCMT ref: 0287AB12
                                                                • _getbuf.LIBCMT ref: 0287AB1E
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_getbuf_invalid_parameter_noinfo_isatty
                                                                • String ID:
                                                                • API String ID: 3655708593-0
                                                                • Opcode ID: 642cb293855d618c4a91b970ef39d385d556a10ffa7651e5e7a3e60ba922326b
                                                                • Instruction ID: 2b34e81422987520854ac95d747c1005275d8b346359958c2ca9f0c995a579a9
                                                                • Opcode Fuzzy Hash: 642cb293855d618c4a91b970ef39d385d556a10ffa7651e5e7a3e60ba922326b
                                                                • Instruction Fuzzy Hash: 1D41AD3C214A0C8FDB5CEF2CC48176AB7E2FB98314B540699D86ACB2D6D734C891CB81
                                                                APIs
                                                                  • Part of subcall function 02E55AD8: _getptd.LIBCMT ref: 02E55AEA
                                                                • _errno.LIBCMT ref: 02E6A0BE
                                                                • _invalid_parameter_noinfo.LIBCMT ref: 02E6A0C8
                                                                • _errno.LIBCMT ref: 02E6A0EC
                                                                • _invalid_parameter_noinfo.LIBCMT ref: 02E6A0F6
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo$_getptd
                                                                • String ID:
                                                                • API String ID: 1297830140-0
                                                                • Opcode ID: a1b2e992952563b09da4c9b68e1145a5c931054a8e89e35b43f293698d4bcdd3
                                                                • Instruction ID: 9d0dedc4e1b5b07e76a27fb44c0ffb2ea09ee3d084b70962b66421eb92835e24
                                                                • Opcode Fuzzy Hash: a1b2e992952563b09da4c9b68e1145a5c931054a8e89e35b43f293698d4bcdd3
                                                                • Instruction Fuzzy Hash: F1411F626E879086CB21DF25D59826E7BA1F784BD4F04E132EF8A07B50DB38C045CB10
                                                                APIs
                                                                  • Part of subcall function 02E57574: _getptd.LIBCMT ref: 02E57578
                                                                • _getptd.LIBCMT ref: 02E58CAB
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                • _SetImageBase.LIBCMT ref: 02E58D7E
                                                                • _getptd.LIBCMT ref: 02E58DAC
                                                                • _getptd.LIBCMT ref: 02E58DBA
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd$BaseImage_amsg_exit
                                                                • String ID:
                                                                • API String ID: 2306399499-0
                                                                • Opcode ID: a02dd388b7b7f0f696520ad480e8c452745dcea769bd20a0fc531c877679dfad
                                                                • Instruction ID: ea6b6ada8d91d85d22e4cc7efe7f6236b20095234ec7588fe8c05ab32d865a1b
                                                                • Opcode Fuzzy Hash: a02dd388b7b7f0f696520ad480e8c452745dcea769bd20a0fc531c877679dfad
                                                                • Instruction Fuzzy Hash: 3D31D3326A0A6185CE21EB16D48427DA7A6FF91FDCB15E221EF1A43770DB38C1C2CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Initialize_cinit
                                                                • String ID:
                                                                • API String ID: 3622512177-0
                                                                • Opcode ID: d1796c927132e00e55e5a4d5cf3bd2133c49abd461362aa7674a33a9edd3c0bc
                                                                • Instruction ID: 69ffaf8c4872853c5c2350ca18ea049437fd7b094db32cfa7d4f13d316941196
                                                                • Opcode Fuzzy Hash: d1796c927132e00e55e5a4d5cf3bd2133c49abd461362aa7674a33a9edd3c0bc
                                                                • Instruction Fuzzy Hash: 9731293C6146068BEB54BBBCD9543AA32A6EF91309F14467AC509C7291FF69C840DB93
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _errno_getptd_invalid_parameter_noinfofree
                                                                • String ID:
                                                                • API String ID: 4053972703-0
                                                                • Opcode ID: a6b047b9ba05778c913bae5aa75a3fa791de028973cf7ce0c6a1d43e90da30c7
                                                                • Instruction ID: 519cd26cdbfc7a6355abcb293290bd25e52d588cefdbd4a8336276d8e3334125
                                                                • Opcode Fuzzy Hash: a6b047b9ba05778c913bae5aa75a3fa791de028973cf7ce0c6a1d43e90da30c7
                                                                • Instruction Fuzzy Hash: 78218338608F098FEB49FBAC985966A77D1EF98311F10062EE94DC3361DB60D8418F93
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 420147892-0
                                                                • Opcode ID: 9e68473edadeaf557d43ee5db64da582385d685932b15406e045d27e9c0fbed8
                                                                • Instruction ID: d5375f079c87f631943fa85c2c5cf1ee3455a7a48a2823af02a67f2cfc4b920f
                                                                • Opcode Fuzzy Hash: 9e68473edadeaf557d43ee5db64da582385d685932b15406e045d27e9c0fbed8
                                                                • Instruction Fuzzy Hash: C0315E36684A8082EB24DF2AF46836A77A1F789BA8F55D235DE5E43794DF39C045CB00
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo
                                                                • String ID:
                                                                • API String ID: 2819658684-0
                                                                • Opcode ID: c5488cea8a7420608f6a60d82c2d4936388b921319a0c2fb7a5c91bb596e3c00
                                                                • Instruction ID: 2116f2fc08704984d36a0b651564703f1623b7fa81ea5479044bee893b5a8576
                                                                • Opcode Fuzzy Hash: c5488cea8a7420608f6a60d82c2d4936388b921319a0c2fb7a5c91bb596e3c00
                                                                • Instruction Fuzzy Hash: BA2126A27E87D08AD704CA69D4683BD2B93E3653C8F59E423DB4287742E7A5C84DCB11
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: ErrorEventLastSelect
                                                                • String ID:
                                                                • API String ID: 1135597009-0
                                                                • Opcode ID: 956be7d5d60204c7e3c068f76d48fbfab2fb49e91de88ae288d2e3ac1e2e7a30
                                                                • Instruction ID: e6558029e59e1e65a6a26425afa6a1437b15085800df663f8ba322b3caebb1b0
                                                                • Opcode Fuzzy Hash: 956be7d5d60204c7e3c068f76d48fbfab2fb49e91de88ae288d2e3ac1e2e7a30
                                                                • Instruction Fuzzy Hash: 19216DB361068086EB10CF7AE44835D37A2FB98B9CF545115DA19CBA94DF7AC486CB10
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32 ref: 02E4506C
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E45085
                                                                • LeaveCriticalSection.KERNEL32 ref: 02E45105
                                                                • SetEvent.KERNEL32 ref: 02E45125
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection$Leave$EnterEvent
                                                                • String ID:
                                                                • API String ID: 3394196147-0
                                                                • Opcode ID: 21dc35a79e7d153aa5f527a3c9f68bbfba85f83a73de9e7e0ee8fccda7220007
                                                                • Instruction ID: 7d243cce0a03027a621cc650468218d21e471fca866a8dff194389120800f78a
                                                                • Opcode Fuzzy Hash: 21dc35a79e7d153aa5f527a3c9f68bbfba85f83a73de9e7e0ee8fccda7220007
                                                                • Instruction Fuzzy Hash: 3F211636354B8493DB48CF26F58439DB3A4F758B94F549125EBAA43B24DF38E8A1C740
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _amsg_exit$_getptd_lockfree
                                                                • String ID:
                                                                • API String ID: 2148533958-0
                                                                • Opcode ID: 5d29ed1caa0daea5f5dbfe864c41203751b69c3e2a73dd0d7e20f9917cc7433e
                                                                • Instruction ID: 300f7c61cc263fee1aa937e0124fa55642720a30fd2d1d09880305965a884f7e
                                                                • Opcode Fuzzy Hash: 5d29ed1caa0daea5f5dbfe864c41203751b69c3e2a73dd0d7e20f9917cc7433e
                                                                • Instruction Fuzzy Hash: 92115E362A5A9086DF589B61E4807697366F748B88F4CA026FF0E03356DF38C551C700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalDeleteSection_amsg_exit_lockfclosefree
                                                                • String ID:
                                                                • API String ID: 594724896-0
                                                                • Opcode ID: 1af19892bbc03468291f82b11de21fd6e6f481048af7f94286d8aedfc065ae7b
                                                                • Instruction ID: 3e94f1c8acf750c4d310966b2147a0013d1049513f1830093573a8cd86fac18a
                                                                • Opcode Fuzzy Hash: 1af19892bbc03468291f82b11de21fd6e6f481048af7f94286d8aedfc065ae7b
                                                                • Instruction Fuzzy Hash: 87118F365D0B8086EA208B29E49836DB761F784BD8F64A215EF9E43774CF36C482C704
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CriticalDeleteSection$Freefree
                                                                • String ID:
                                                                • API String ID: 1250194111-0
                                                                • Opcode ID: 3824737ec1521a2d4d93bf8402f796ef870551e1c1bfc4249913134d5e986940
                                                                • Instruction ID: 2e440fd2f6b88408288ab77ae6c7d7a4238d73c217f87bd242e35ec1d8de0851
                                                                • Opcode Fuzzy Hash: 3824737ec1521a2d4d93bf8402f796ef870551e1c1bfc4249913134d5e986940
                                                                • Instruction Fuzzy Hash: 20118E36AC5A81CAEB14DF25F85C3287360FB94BE8F58A311DF5A06A65CB38C481C701
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Thread$CurrentErrorExitLast_freefls
                                                                • String ID:
                                                                • API String ID: 217443660-0
                                                                • Opcode ID: cbffd315a96faa497177c600e0cbd82371ea40a3f718517a673364916740c137
                                                                • Instruction ID: 6597b2cf35d928fff8b9f9bc95d60445994cdfe34d27d14189654f1d7a86dd3a
                                                                • Opcode Fuzzy Hash: cbffd315a96faa497177c600e0cbd82371ea40a3f718517a673364916740c137
                                                                • Instruction Fuzzy Hash: 5CF01D21BA1BA585DF14AFB2E84C35C32A6BB28B88F98A434DD4E87710EE3588148711
                                                                APIs
                                                                  • Part of subcall function 02E41510: HeapFree.KERNEL32 ref: 02E41556
                                                                  • Part of subcall function 02E41510: free.LIBCMT ref: 02E41582
                                                                • HeapDestroy.KERNEL32 ref: 02E5004E
                                                                • HeapCreate.KERNEL32 ref: 02E5005F
                                                                • free.LIBCMT ref: 02E50071
                                                                • HeapDestroy.KERNEL32 ref: 02E50094
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: Heap$Destroyfree$CreateFree
                                                                • String ID:
                                                                • API String ID: 3907340440-0
                                                                • Opcode ID: c96b4cbec601b2cff9b4cd5d9c6a714dd82caa753ffdd010ae51052e50cdef96
                                                                • Instruction ID: 1ef8ad656b39fac314de855abb9ad8e6e2c63a9f9149386dabf78e138a5600c5
                                                                • Opcode Fuzzy Hash: c96b4cbec601b2cff9b4cd5d9c6a714dd82caa753ffdd010ae51052e50cdef96
                                                                • Instruction Fuzzy Hash: A3F0C476262A9097EB59DFA6E6943697375FB48B98F04A815EF2A03E10DF34D4B08700
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _amsg_exit_getptd$_lock
                                                                • String ID:
                                                                • API String ID: 3670291111-0
                                                                • Opcode ID: 6302b35e9a68ce893cca802b5f5e7a01f98d2e1d4d6a3a5cf8f19790a7114949
                                                                • Instruction ID: 4589451bcc00c7300f2e6037576e39e0cba19a156616642ec5bbb36f66decf5c
                                                                • Opcode Fuzzy Hash: 6302b35e9a68ce893cca802b5f5e7a01f98d2e1d4d6a3a5cf8f19790a7114949
                                                                • Instruction Fuzzy Hash: 3FF0F8616E2550C6FB18AB61C894BB92362EB89B48F0CA178EE494B794DF288481CB11
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm$csm
                                                                • API String ID: 3186804695-3733052814
                                                                • Opcode ID: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
                                                                • Instruction ID: 7244c14355dba157322c3c3c47a233b3b94d8f8c3042c28f6c5c45d4d6084d8c
                                                                • Opcode Fuzzy Hash: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
                                                                • Instruction Fuzzy Hash: DC516D3D208B0A8FCB64EE6C9484769B7D1FB98315F58426DE89DC7255DB30D881CB83
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm$csm
                                                                • API String ID: 3186804695-3733052814
                                                                • Opcode ID: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
                                                                • Instruction ID: da85d092d07593465130baad07946986872f15ca647782243961b2cdf263031d
                                                                • Opcode Fuzzy Hash: 101f134f4e12a7d59dd54e5d86992c5274962396a685041d1e783f31e629751d
                                                                • Instruction Fuzzy Hash: 60519E3C208B198FCB689E6C80A436973E1FB98316F64562ED48EC7261D730D8D5DB87
                                                                APIs
                                                                • _getptd.LIBCMT ref: 02E59C2C
                                                                  • Part of subcall function 02E5DF90: _amsg_exit.LIBCMT ref: 02E5DFA6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _amsg_exit_getptd
                                                                • String ID: csm$csm
                                                                • API String ID: 4217099735-3733052814
                                                                • Opcode ID: 0ebafe53c79dd1dc7c4b2410e29de92a4e8939059e6c475d33d2247252ee921c
                                                                • Instruction ID: 8ab522c2abffeaf9e0f34c61434ec8ebc7833daef98aba8cbb03c77da722f8a5
                                                                • Opcode Fuzzy Hash: 0ebafe53c79dd1dc7c4b2410e29de92a4e8939059e6c475d33d2247252ee921c
                                                                • Instruction Fuzzy Hash: DB51D5322647A0CACB348F26D5447ED77A1F745B8CF04E115DE8957B46CB38E4A0CB82
                                                                APIs
                                                                  • Part of subcall function 02E55378: malloc.LIBCMT ref: 02E55392
                                                                • wsprintfW.USER32 ref: 02E4DA98
                                                                • CloseHandle.KERNEL32 ref: 02E4DC0B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: CloseHandlemallocwsprintf
                                                                • String ID: %s_bin
                                                                • API String ID: 2399101171-2665034546
                                                                • Opcode ID: 8cd04662d7078cabdf984b15f4d60648459fd27a36f456a8367ae7b316583ac3
                                                                • Instruction ID: 4b160de932faafc4fa625f2549978b5bdd8116118ecbfed2d121446f9a0cead2
                                                                • Opcode Fuzzy Hash: 8cd04662d7078cabdf984b15f4d60648459fd27a36f456a8367ae7b316583ac3
                                                                • Instruction Fuzzy Hash: 5E41A9267A4AA481EF20DF62E818BAD3369FB85F98F48D126DE5E07784DF38C144C701
                                                                APIs
                                                                • _errno.LIBCMT ref: 02879245
                                                                • _invalid_parameter_noinfo.LIBCMT ref: 02879250
                                                                  • Part of subcall function 0287A834: _errno.LIBCMT ref: 0287A882
                                                                  • Part of subcall function 0287A834: _invalid_parameter_noinfo.LIBCMT ref: 0287A88D
                                                                  • Part of subcall function 0287AA68: _errno.LIBCMT ref: 0287AA95
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno$_invalid_parameter_noinfo
                                                                • String ID: B
                                                                • API String ID: 2819658684-1255198513
                                                                • Opcode ID: ee0464697b4dab9c83a21f4d43ccea67558d6137176d20332e089b8e5b9fb0e9
                                                                • Instruction ID: 407d13a51b5ed2bace0fbb4b0bd7f46e1d1c879be7244705f0f1d920b887d217
                                                                • Opcode Fuzzy Hash: ee0464697b4dab9c83a21f4d43ccea67558d6137176d20332e089b8e5b9fb0e9
                                                                • Instruction Fuzzy Hash: B621533D218B484FD748EB6CD44476A76D2FFA8328F54066EE45DC72A1DB78C944CB82
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm$csm
                                                                • API String ID: 3186804695-3733052814
                                                                • Opcode ID: 7c507ed6b6e76c727c6852df3bb056a156e285415972c8a1159783b32befb719
                                                                • Instruction ID: 73ef610f03f12cf596e1b657e04cc4187f5aa62d93ef2b0da6502cf237a7dbe4
                                                                • Opcode Fuzzy Hash: 7c507ed6b6e76c727c6852df3bb056a156e285415972c8a1159783b32befb719
                                                                • Instruction Fuzzy Hash: 9931AE7951060CCFDF94EF08C084B987BB1FB18369F9A12A8E80DDB611C375D881CB86
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm$csm
                                                                • API String ID: 3186804695-3733052814
                                                                • Opcode ID: 2390259f5c7b96c66dbe66369981e250b2529a0f82c8583acd2dcf66a4ceee86
                                                                • Instruction ID: 394352d253856d7ad5ec5c2f53425d145ac0667e12395180dda3280821c6aa07
                                                                • Opcode Fuzzy Hash: 2390259f5c7b96c66dbe66369981e250b2529a0f82c8583acd2dcf66a4ceee86
                                                                • Instruction Fuzzy Hash: CA31B27911060CCFDF94DF08C484B987BA9FB18369F9612A8E80DDB611C371D990CF84
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm$csm
                                                                • API String ID: 3186804695-3733052814
                                                                • Opcode ID: 008a1cef3fd956798f7d73ea4517d52a7d073b0e4720bf3f8ed94ca8c68e0db9
                                                                • Instruction ID: 9d5bce6be0d4bd7e69cf5fc9ec548aa12c038ee6320da395ab63ec8f815c38d7
                                                                • Opcode Fuzzy Hash: 008a1cef3fd956798f7d73ea4517d52a7d073b0e4720bf3f8ed94ca8c68e0db9
                                                                • Instruction Fuzzy Hash: 99218577680654CADB208F66C8887AC3B75F358BEDF8A6215EA4D0BF18CB75C490C784
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo
                                                                • String ID: B
                                                                • API String ID: 2959964966-1255198513
                                                                • Opcode ID: d9f8633fb066bb926e08558761ed9d779cc0cbf5af2a47bf39fdd692a1c5aced
                                                                • Instruction ID: 5489f703ee64efe175ef25838af9d1d6a837ffb4deafca7c55e45c5b6536b3eb
                                                                • Opcode Fuzzy Hash: d9f8633fb066bb926e08558761ed9d779cc0cbf5af2a47bf39fdd692a1c5aced
                                                                • Instruction Fuzzy Hash: BB11607226479086DB209F16E450259B7A2F788BE8F98A225EF9D57B54CB38C141CF00
                                                                APIs
                                                                  • Part of subcall function 02881EAC: _getptd.LIBCMT ref: 02881EB9
                                                                  • Part of subcall function 02881EAC: _getptd.LIBCMT ref: 02881ECC
                                                                • _getptd.LIBCMT ref: 02887484
                                                                • _getptd.LIBCMT ref: 02887497
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927074227.0000000002871000.00000020.10000000.00040000.00000000.sdmp, Offset: 02871000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2871000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm
                                                                • API String ID: 3186804695-1018135373
                                                                • Opcode ID: 4682075a758e49528a487afa047c3333b91a60c7711f6bd7727fe6ef45998704
                                                                • Instruction ID: ad0c00b59a6022785f4df67b0fd478877533ac28ca28b8f843cbd7a717d40d28
                                                                • Opcode Fuzzy Hash: 4682075a758e49528a487afa047c3333b91a60c7711f6bd7727fe6ef45998704
                                                                • Instruction Fuzzy Hash: 08010C3C91160C8FEF78FF5C88847A477A5FB18316F5541A9D80DCB642DB719984CB42
                                                                APIs
                                                                  • Part of subcall function 028C25B9: _getptd.LIBCMT ref: 028C25C6
                                                                  • Part of subcall function 028C25B9: _getptd.LIBCMT ref: 028C25D9
                                                                • _getptd.LIBCMT ref: 028C7B91
                                                                • _getptd.LIBCMT ref: 028C7BA4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927165195.00000000028B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_28b0000_regsvr32.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm
                                                                • API String ID: 3186804695-1018135373
                                                                • Opcode ID: 4682075a758e49528a487afa047c3333b91a60c7711f6bd7727fe6ef45998704
                                                                • Instruction ID: 1cb06dd8cef97762df8dc690ab3c27051cac9e7b88f460c9533240c396bbfbba
                                                                • Opcode Fuzzy Hash: 4682075a758e49528a487afa047c3333b91a60c7711f6bd7727fe6ef45998704
                                                                • Instruction Fuzzy Hash: 7501257C10060D8FCF78EF2C88A57A433AAFB18215FA5166EC85DCA645CB31C880CF02
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _errno_invalid_parameter_noinfo
                                                                • String ID: B
                                                                • API String ID: 2959964966-1255198513
                                                                • Opcode ID: 0ab59116831bbe62dcdadced444a5e6377d12d240e7c680d2d1bd855e87776a3
                                                                • Instruction ID: 114cced5e89281a9dc190132b20ccea86ba9aa9a654ac2212998114029daf3bf
                                                                • Opcode Fuzzy Hash: 0ab59116831bbe62dcdadced444a5e6377d12d240e7c680d2d1bd855e87776a3
                                                                • Instruction Fuzzy Hash: 300180B2624B9486DB10DF12E4543A9B665F798FE8F989321AF5807B98CF38C145CB04
                                                                APIs
                                                                  • Part of subcall function 02E579AC: _getptd.LIBCMT ref: 02E579B9
                                                                  • Part of subcall function 02E579AC: _getptd.LIBCMT ref: 02E579CC
                                                                • _getptd.LIBCMT ref: 02E6D688
                                                                • _getptd.LIBCMT ref: 02E6D69B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: _getptd
                                                                • String ID: csm
                                                                • API String ID: 3186804695-1018135373
                                                                • Opcode ID: 433e7348067b57c19063a6e5e3819906beb9ca32c691c09114a4435d6686f511
                                                                • Instruction ID: b8e31632d201eb00f4b21693cecc520d2a40274f9ce3ce2e11cb48b07db5bac5
                                                                • Opcode Fuzzy Hash: 433e7348067b57c19063a6e5e3819906beb9ca32c691c09114a4435d6686f511
                                                                • Instruction Fuzzy Hash: 8E012C626D164189CB309F329C443BC2365E759BADF8AA225DE4D0A618CB31C591CB61
                                                                APIs
                                                                • free.LIBCMT ref: 02E52F31
                                                                  • Part of subcall function 02E55280: HeapFree.KERNEL32 ref: 02E55296
                                                                  • Part of subcall function 02E55280: _errno.LIBCMT ref: 02E552A0
                                                                  • Part of subcall function 02E55280: GetLastError.KERNEL32 ref: 02E552A8
                                                                • free.LIBCMT ref: 02E52F44
                                                                • free.LIBCMT ref: 02E52F57
                                                                • free.LIBCMT ref: 02E52F6A
                                                                Memory Dump Source
                                                                • Source File: 00000005.00000002.2927512318.0000000002E40000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E40000, based on PE: true
                                                                • Associated: 00000005.00000002.2927512318.0000000002E89000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_5_2_2e40000_regsvr32.jbxd
                                                                Similarity
                                                                • API ID: free$ErrorFreeHeapLast_errno
                                                                • String ID:
                                                                • API String ID: 1012874770-0
                                                                • Opcode ID: f0a32442132290b978abf0824dadd0382e9fcad70a2f2925c0411fa04f225afc
                                                                • Instruction ID: b8c083cb341a30fae4cc98f41fb9e28f8f4f832e4480c54d91d0574a08774cf2
                                                                • Opcode Fuzzy Hash: f0a32442132290b978abf0824dadd0382e9fcad70a2f2925c0411fa04f225afc
                                                                • Instruction Fuzzy Hash: 5BF062166A272448DF64EFB1D0A43392330EB94F7CF58AB14DF6A0A1C8CF28C480C791