Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
I1ahLI8fId.exe

Overview

General Information

Sample name:I1ahLI8fId.exe
renamed because original name is a hash value
Original sample name:8c5312bbccde4babcfbcb4d079b6063cf023777affca10a479891833925d4118.exe
Analysis ID:1589061
MD5:d46127b513eaa0e4e1e4d2ab89fe2b4a
SHA1:3478c45ea7e943ac5656186a13a5829256117232
SHA256:8c5312bbccde4babcfbcb4d079b6063cf023777affca10a479891833925d4118
Tags:exeRemcosRATuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Copy file to startup via Powershell
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Creates executable files without a name
Delayed program exit found
Drops PE files to the startup folder
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Powershell drops PE file
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected WebBrowserPassView password recovery tool
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found evasive API chain (may stop execution after accessing registry keys)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • I1ahLI8fId.exe (PID: 7684 cmdline: "C:\Users\user\Desktop\I1ahLI8fId.exe" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
    • powershell.exe (PID: 7752 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • I1ahLI8fId.exe (PID: 7908 cmdline: "C:\Users\user\Desktop\I1ahLI8fId.exe" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
      • WerFault.exe (PID: 8044 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7908 -s 512 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • svchost.exe (PID: 7960 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • .exe (PID: 1992 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
    • powershell.exe (PID: 908 cmdline: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • .exe (PID: 1564 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
      • .exe (PID: 3116 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\tbpbiomps" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
      • .exe (PID: 2344 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\vvutjgfjgfkdi" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
      • .exe (PID: 2216 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\gphekzqluncilesz" MD5: D46127B513EAA0E4E1E4D2AB89FE2B4A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["192.210.150.26:8787:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R1T905", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.3880428650.000000000420C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      0000000D.00000002.3872038045.0000000000466000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          0000000D.00000002.3877544184.000000000291F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            0000000A.00000002.3880604542.000000000450D000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              Click to see the 29 entries
              SourceRuleDescriptionAuthorStrings
              0.2.I1ahLI8fId.exe.421fa40.3.unpackREMCOS_RAT_variantsunknownunknown
              • 0x64c10:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
              • 0x6503c:$str_b3: GetDirectListeningPort
              • 0x64a00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
              • 0x64b80:$str_b7: \update.vbs
              • 0x65004:$str_b13: StartForward
              • 0x65024:$str_b14: StopForward
              • 0x64ad8:$str_b15: fso.DeleteFile "
              • 0x64a6c:$str_b16: On Error Resume Next
              • 0x64b08:$str_b17: fso.DeleteFolder "
              • 0x64aa0:$str_b20: while fso.FileExists("
              10.2..exe.449fa40.4.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                10.2..exe.449fa40.4.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  10.2..exe.449fa40.4.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x69ef8:$a1: Remcos restarted by watchdog!
                  • 0x6a470:$a3: %02i:%02i:%02i:%03i
                  10.2..exe.449fa40.4.unpackREMCOS_RAT_variantsunknownunknown
                  • 0x64610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                  • 0x64749:$str_c0: [Firefox StoredLogins not found]
                  • 0x6467d:$str_c2: [Chrome StoredLogins found, cleared!]
                  • 0x64659:$str_c3: [Chrome StoredLogins not found]
                  • 0x64774:$str_c6: \logins.json
                  • 0x646f9:$str_c7: [Chrome Cookies found, cleared!]
                  • 0x647b5:$str_c8: [Firefox Cookies not found]
                  • 0x646dd:$str_c9: [Chrome Cookies not found]
                  • 0x647e5:$str_c10: [Firefox cookies found, cleared!]
                  • 0x6471c:$str_c12: \AppData\Roaming\Mozilla\Firefox\Profiles\
                  Click to see the 12 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: frack113: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\I1ahLI8fId.exe", ParentImage: C:\Users\user\Desktop\I1ahLI8fId.exe, ParentProcessId: 7684, ParentProcessName: I1ahLI8fId.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 7752, ProcessName: powershell.exe
                  Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7752, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                  Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7752, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\I1ahLI8fId.exe", ParentImage: C:\Users\user\Desktop\I1ahLI8fId.exe, ParentProcessId: 7684, ParentProcessName: I1ahLI8fId.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 7752, ProcessName: powershell.exe
                  Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 624, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 7960, ProcessName: svchost.exe

                  Persistence and Installation Behavior

                  barindex
                  Source: Process startedAuthor: Joe Security: Data: Command: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\I1ahLI8fId.exe", ParentImage: C:\Users\user\Desktop\I1ahLI8fId.exe, ParentProcessId: 7684, ParentProcessName: I1ahLI8fId.exe, ProcessCommandLine: "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe', ProcessId: 7752, ProcessName: powershell.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe, ProcessId: 1564, TargetFilename: C:\ProgramData\remcos\logs.dat
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T09:03:05.289298+010020327761Malware Command and Control Activity Detected192.168.2.849716192.210.150.268787TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T09:03:05.899351+010020327771Malware Command and Control Activity Detected192.210.150.268787192.168.2.849716TCP
                  2025-01-11T09:05:18.458041+010020327771Malware Command and Control Activity Detected192.210.150.268787192.168.2.849716TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-11T09:03:08.225911+010028033043Unknown Traffic192.168.2.849718178.237.33.5080TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["192.210.150.26:8787:0"], "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-R1T905", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos", "Keylog file max size": ""}
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeReversingLabs: Detection: 79%
                  Source: I1ahLI8fId.exeReversingLabs: Detection: 79%
                  Source: I1ahLI8fId.exeVirustotal: Detection: 79%Perma Link
                  Source: Yara matchFile source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3872038045.0000000000466000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3877544184.000000000291F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1564, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJoe Sandbox ML: detected
                  Source: I1ahLI8fId.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,13_2_0043293A
                  Source: I1ahLI8fId.exe, 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_45d37422-4

                  Exploits

                  barindex
                  Source: Yara matchFile source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.3880428650.000000000420C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000A.00000002.3880604542.0000000004504000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1992, type: MEMORYSTR
                  Source: I1ahLI8fId.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: I1ahLI8fId.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: I1ahLI8fId.exe, 00000000.00000002.3878210254.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, I1ahLI8fId.exe, 00000000.00000002.3878210254.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.3890308815.0000000005850000.00000004.08000000.00040000.00000000.sdmp, .exe, 0000000A.00000002.3878328308.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.3878328308.000000000321F000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,13_2_100010F1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10006580 FindFirstFileExA,13_2_10006580
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00406AC2 FindFirstFileW,FindNextFileW,13_2_00406AC2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00407A8C FindFirstFileW,FindNextFileW,FindClose,13_2_00407A8C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00418C69 FindFirstFileW,13_2_00418C69
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,13_2_0041B42F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040B53A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00408DA7 FindFirstFileW,FindNextFileW,FindClose,13_2_00408DA7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0044D5E9 FindFirstFileExA,13_2_0044D5E9
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407EF8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeCode function: 4x nop then jmp 02F47067h0_2_02F43E10
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 4x nop then jmp 01897067h10_2_01893E10

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.8:49716 -> 192.210.150.26:8787
                  Source: Network trafficSuricata IDS: 2032777 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Server Response : 192.210.150.26:8787 -> 192.168.2.8:49716
                  Source: Malware configuration extractorIPs: 192.210.150.26
                  Source: global trafficTCP traffic: 192.168.2.8:54515 -> 1.1.1.1:53
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 192.210.150.26 192.210.150.26
                  Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                  Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                  Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.8:49718 -> 178.237.33.50:80
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040455B WaitForSingleObject,SetEvent,recv,13_2_0040455B
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                  Source: .exe, 00000010.00000002.1589323297.0000000002D08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
                  Source: .exe, 00000010.00000002.1589323297.0000000002D08000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: file://192.168.2.1/all/install/setup.au3https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srffile:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
                  Source: .exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                  Source: .exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                  Source: .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                  Source: .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertCloudServicesCA-1.crt0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://cacerts.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crt0
                  Source: powershell.exe, 00000002.00000002.1450086408.0000000007BFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
                  Source: svchost.exe, 00000006.00000002.3072152957.0000013F3A000000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertCloudServicesCA-1-g1.crl0?
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0H
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0=
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertCloudServicesCA-1-g1.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://crl4.digicert.com/GeoTrustGlobalTLSRSA4096SHA2562022CA1.crl0
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                  Source: qmgr.db.6.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                  Source: edb.log.6.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                  Source: .exe, 0000000D.00000002.3878307547.0000000003A30000.00000004.00000020.00020000.00000000.sdmp, .exe, 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, .exe, 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                  Source: I1ahLI8fId.exe, 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, I1ahLI8fId.exe, 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, I1ahLI8fId.exe, 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, .exe, 0000000A.00000002.3880604542.000000000450A000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000D.00000002.3872038045.000000000046B000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: .exe, 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpE
                  Source: .exe, 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                  Source: powershell.exe, 00000002.00000002.1446744687.00000000060BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0:
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0H
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0I
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.digicert.com0Q
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.msocsp.com0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocsp.msocsp.com0S
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://ocspx.digicert.com0E
                  Source: powershell.exe, 0000000B.00000002.1562272808.0000000004792000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: powershell.exe, 00000002.00000002.1440172253.0000000005051000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1562272808.0000000004641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Amcache.hve.8.drString found in binary or memory: http://upx.sf.net
                  Source: powershell.exe, 0000000B.00000002.1562272808.0000000004792000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://www.digicert.com/CPS0
                  Source: bhvBEB.tmp.16.drString found in binary or memory: http://www.digicert.com/CPS0~
                  Source: .exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                  Source: .exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                  Source: .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                  Source: .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                  Source: .exe, 00000010.00000002.1588156338.0000000000EF4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                  Source: .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LO
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                  Source: powershell.exe, 00000002.00000002.1440172253.0000000005051000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1562272808.0000000004641000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                  Source: powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEn
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                  Source: edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/Prod/C:
                  Source: svchost.exe, 00000006.00000003.1442777471.0000013F39EF0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2/C:
                  Source: powershell.exe, 0000000B.00000002.1562272808.0000000004792000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                  Source: .exeString found in binary or memory: https://login.yahoo.com/config/login
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                  Source: powershell.exe, 00000002.00000002.1446744687.00000000060BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-08-30-16/PreSignInSettingsConfig.json
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=13164f2a9ee6956f1439
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=b92552
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/hero-image-desktop-f6720a4145.jpg
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/officehome/thirdpartynotice.html
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://www.digicert.com/CPS0
                  Source: .exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                  Source: .exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                  Source: bhvBEB.tmp.16.drString found in binary or memory: https://www.office.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004099E4 SetWindowsHookExA 0000000D,004099D0,0000000013_2_004099E4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040AE1E OpenClipboard,GetClipboardData,CloseClipboard,13_2_0040AE1E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,16_2_0040987A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_004098E2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,17_2_00406DFC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,17_2_00406E9F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalLock,ReadFile,GlobalUnlock,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_004068B5
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalLock,memcpy,GlobalUnlock,SetClipboardData,CloseClipboard,18_2_004072B5
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040AE1E OpenClipboard,GetClipboardData,CloseClipboard,13_2_0040AE1E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00409B10 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,13_2_00409B10
                  Source: Yara matchFile source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000A.00000002.3880604542.000000000450D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1992, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3872038045.0000000000466000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3877544184.000000000291F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1564, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041BB77 SystemParametersInfoW,13_2_0041BB77

                  System Summary

                  barindex
                  Source: 0.2.I1ahLI8fId.exe.421fa40.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000A.00000002.3880604542.000000000450A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000D.00000002.3872038045.000000000046B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: .exe PID: 1992, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: .exe PID: 1564, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00417245 CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,13_2_00417245
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041CA9E NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,13_2_0041CA9E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,13_2_0041ACC1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,13_2_0041ACED
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00401806 NtdllDefWindowProc_W,16_2_00401806
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_004018C0 NtdllDefWindowProc_W,16_2_004018C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_004016FD NtdllDefWindowProc_A,17_2_004016FD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_004017B7 NtdllDefWindowProc_A,17_2_004017B7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00402CAC NtdllDefWindowProc_A,18_2_00402CAC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00402D66 NtdllDefWindowProc_A,18_2_00402D66
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004158B5 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_004158B5
                  Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeCode function: 0_2_02F4DA6C0_2_02F4DA6C
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E80C622_2_04E80C62
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E81D002_2_04E81D00
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_0189DA6C10_2_0189DA6C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_0664171010_2_06641710
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_0664E52010_2_0664E520
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_06642C0010_2_06642C00
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_045079D711_2_045079D7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_1001719413_2_10017194
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_1000B5C113_2_1000B5C1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041D07113_2_0041D071
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004520D213_2_004520D2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043D09813_2_0043D098
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043C9DD13_2_0043C9DD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004361AA13_2_004361AA
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00432A4913_2_00432A49
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00436A8D13_2_00436A8D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043CC0C13_2_0043CC0C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00436D4813_2_00436D48
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043651C13_2_0043651C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00434D2213_2_00434D22
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00440E2013_2_00440E20
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043CE3B13_2_0043CE3B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004367C613_2_004367C6
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044B04016_2_0044B040
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0043610D16_2_0043610D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044731016_2_00447310
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044A49016_2_0044A490
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040755A16_2_0040755A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0043C56016_2_0043C560
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044B61016_2_0044B610
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044D6C016_2_0044D6C0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_004476F016_2_004476F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044B87016_2_0044B870
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044081D16_2_0044081D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0041495716_2_00414957
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_004079EE16_2_004079EE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00407AEB16_2_00407AEB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044AA8016_2_0044AA80
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00412AA916_2_00412AA9
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00404B7416_2_00404B74
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00404B0316_2_00404B03
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044BBD816_2_0044BBD8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00404BE516_2_00404BE5
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00404C7616_2_00404C76
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00415CFE16_2_00415CFE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00416D7216_2_00416D72
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00446D3016_2_00446D30
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00446D8B16_2_00446D8B
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00406E8F16_2_00406E8F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0040503817_2_00405038
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0041208C17_2_0041208C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_004050A917_2_004050A9
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0040511A17_2_0040511A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0043C13A17_2_0043C13A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_004051AB17_2_004051AB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044930017_2_00449300
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0040D32217_2_0040D322
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044A4F017_2_0044A4F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0043A5AB17_2_0043A5AB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0041363117_2_00413631
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044669017_2_00446690
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044A73017_2_0044A730
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_004398D817_2_004398D8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_004498E017_2_004498E0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044A88617_2_0044A886
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0043DA0917_2_0043DA09
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00438D5E17_2_00438D5E
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00449ED017_2_00449ED0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0041FE8317_2_0041FE83
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00430F5417_2_00430F54
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_004050C218_2_004050C2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_004014AB18_2_004014AB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_0040513318_2_00405133
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_004051A418_2_004051A4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_0040124618_2_00401246
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_0040CA4618_2_0040CA46
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_0040523518_2_00405235
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_004032C818_2_004032C8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_0040168918_2_00401689
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00402F6018_2_00402F60
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 004169A7 appears 87 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 004020E7 appears 40 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 0044DB70 appears 41 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 004165FF appears 35 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 00422297 appears 42 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 00444B5A appears 37 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 00413025 appears 79 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 00416760 appears 69 times
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: String function: 00433FB0 appears 55 times
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7908 -s 512
                  Source: I1ahLI8fId.exe, 00000000.00000002.3875464343.000000000120E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs I1ahLI8fId.exe
                  Source: I1ahLI8fId.exe, 00000000.00000002.3878210254.0000000002F61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs I1ahLI8fId.exe
                  Source: I1ahLI8fId.exe, 00000000.00000002.3878210254.0000000002F9F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs I1ahLI8fId.exe
                  Source: I1ahLI8fId.exe, 00000000.00000000.1416303127.0000000000B38000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameICantSeeYou.exe8 vs I1ahLI8fId.exe
                  Source: I1ahLI8fId.exe, 00000000.00000002.3891341363.0000000005866000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs I1ahLI8fId.exe
                  Source: I1ahLI8fId.exeBinary or memory string: OriginalFilenameICantSeeYou.exe8 vs I1ahLI8fId.exe
                  Source: I1ahLI8fId.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 0.2.I1ahLI8fId.exe.421fa40.3.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000A.00000002.3880604542.000000000450A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000D.00000002.3872038045.000000000046B000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: .exe PID: 1992, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: .exe PID: 1564, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: I1ahLI8fId.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: .exe.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: classification engineClassification label: mal100.rans.spre.phis.troj.adwa.spyw.expl.evad.winEXE@20/21@1/3
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,free,16_2_004182CE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,13_2_00416AB7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,CloseHandle,18_2_00410DE1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,free,16_2_00418758
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040E219 GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,13_2_0040E219
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041A63F FindResourceA,LoadResource,LockResource,SizeofResource,13_2_0041A63F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,13_2_00419BC4
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-R1T905
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:964:120:WilError_03
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7760:120:WilError_03
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7908
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kp1qk1vn.alb.ps1Jump to behavior
                  Source: I1ahLI8fId.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: I1ahLI8fId.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSystem information queried: HandleInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: .exe, .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: .exe, .exe, 00000011.00000002.1580108470.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                  Source: .exe, .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                  Source: .exe, .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: .exe, .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: .exe, 00000010.00000002.1589323297.0000000002D08000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: .exe, .exe, 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: I1ahLI8fId.exeReversingLabs: Detection: 79%
                  Source: I1ahLI8fId.exeVirustotal: Detection: 79%
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_17-33245
                  Source: unknownProcess created: C:\Users\user\Desktop\I1ahLI8fId.exe "C:\Users\user\Desktop\I1ahLI8fId.exe"
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Users\user\Desktop\I1ahLI8fId.exe "C:\Users\user\Desktop\I1ahLI8fId.exe"
                  Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7908 -s 512
                  Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\tbpbiomps"
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\vvutjgfjgfkdi"
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\gphekzqluncilesz"
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Users\user\Desktop\I1ahLI8fId.exe "C:\Users\user\Desktop\I1ahLI8fId.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\tbpbiomps"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\vvutjgfjgfkdi"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\gphekzqluncilesz"Jump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: pstorec.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: pstorec.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: windows.storage.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: wldp.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: msasn1.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: sspicli.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptsp.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: rsaenh.dll
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: cryptbase.dll
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                  Source: I1ahLI8fId.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: I1ahLI8fId.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: I1ahLI8fId.exe, 00000000.00000002.3878210254.0000000002F61000.00000004.00000800.00020000.00000000.sdmp, I1ahLI8fId.exe, 00000000.00000002.3878210254.0000000002F9F000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.3890308815.0000000005850000.00000004.08000000.00040000.00000000.sdmp, .exe, 0000000A.00000002.3878328308.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000A.00000002.3878328308.000000000321F000.00000004.00000800.00020000.00000000.sdmp
                  Source: I1ahLI8fId.exeStatic PE information: 0xCC43327E [Fri Aug 5 20:11:42 2078 UTC]
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004158B5 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_004158B5
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeCode function: 0_2_02F4F052 push esp; iretd 0_2_02F4F059
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E86E70 push BC07CA79h; ret 2_2_04E86E75
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E80A1D pushfd ; iretd 2_2_04E80A22
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeCode function: 4_2_008FCF5B push eax; iretd 4_2_008FCF5D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_0189F053 push esp; iretd 10_2_0189F059
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_066486A0 push esp; retf 10_2_066486A1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_06648C93 push eax; iretd 10_2_06648C99
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_06648D18 pushfd ; iretd 10_2_06648D21
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 10_2_06640006 push es; retf 10_2_0664001C
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_04506BA8 push A4073279h; ret 11_2_04506E75
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_04508375 pushfd ; iretd 11_2_0450837A
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 11_2_0450690A pushfd ; ret 11_2_04506915
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10002806 push ecx; ret 13_2_10002819
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00415A0C push esp; ret 13_2_00415A0D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00415C62 push edi; ret 13_2_00415C63
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00406FE8 push edx; retf 13_2_00406FEB
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0044D096 push esp; retf 13_2_0044D097
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0044CA98 push esp; retf 13_2_0044CAA0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004533FF push dword ptr [esp+ecx-75h]; iretd 13_2_00453403
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00455EAF push ecx; ret 13_2_00455EC2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00433FF6 push ecx; ret 13_2_00434009
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044693D push ecx; ret 16_2_0044694D
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044DB70 push eax; ret 16_2_0044DB84
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0044DB70 push eax; ret 16_2_0044DBAC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00451D54 push eax; ret 16_2_00451D61
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044B090 push eax; ret 17_2_0044B0A4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_0044B090 push eax; ret 17_2_0044B0CC
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00451D34 push eax; ret 17_2_00451D41
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00444E71 push ecx; ret 17_2_00444E81
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00414060 push eax; ret 18_2_00414074
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00414060 push eax; ret 18_2_0041409C
                  Source: I1ahLI8fId.exeStatic PE information: section name: .text entropy: 7.431506281556981
                  Source: .exe.2.drStatic PE information: section name: .text entropy: 7.431506281556981

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to dropped file
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe\:Zone.Identifier:$DATAJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,13_2_00419BC4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00434D22 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,13_2_00434D22
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040E54F Sleep,ExitProcess,13_2_0040E54F
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeMemory allocated: 2DA0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 1890000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 31E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMemory allocated: 51E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,13_2_004198C2
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3460Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 448Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4174Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1380Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWindow / User API: threadDelayed 3325Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWindow / User API: threadDelayed 6159Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeWindow / User API: foregroundWindowGot 1768Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_13-41182
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_13-40979
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_13-40978
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeAPI coverage: 9.7 %
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7836Thread sleep count: 3460 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7832Thread sleep count: 448 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7880Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7852Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 8004Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exe TID: 3276Thread sleep time: -30000s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5548Thread sleep count: 4174 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1568Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5548Thread sleep count: 1380 > 30Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1508Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 1796Thread sleep count: 236 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 1796Thread sleep time: -118000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 1736Thread sleep count: 3325 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 1736Thread sleep time: -9975000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 1736Thread sleep count: 6159 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe TID: 1736Thread sleep time: -18477000s >= -30000sJump to behavior
                  Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,13_2_100010F1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10006580 FindFirstFileExA,13_2_10006580
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00406AC2 FindFirstFileW,FindNextFileW,13_2_00406AC2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00407A8C FindFirstFileW,FindNextFileW,FindClose,13_2_00407A8C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,13_2_0040B335
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00418C69 FindFirstFileW,13_2_00418C69
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,13_2_0041B42F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,13_2_0040B53A
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00408DA7 FindFirstFileW,FindNextFileW,FindClose,13_2_00408DA7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0044D5E9 FindFirstFileExA,13_2_0044D5E9
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040AE51 FindFirstFileW,FindNextFileW,16_2_0040AE51
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 17_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407EF8
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 18_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407898
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_00418981 memset,GetSystemInfo,16_2_00418981
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: Amcache.hve.8.drBinary or memory string: VMware
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual USB Mouse
                  Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin
                  Source: Amcache.hve.8.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
                  Source: Amcache.hve.8.drBinary or memory string: VMware, Inc.
                  Source: Amcache.hve.8.drBinary or memory string: VMware20,1hbin@
                  Source: Amcache.hve.8.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                  Source: Amcache.hve.8.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                  Source: svchost.exe, 00000006.00000002.3070831411.0000013F34A2B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000006.00000002.3072263524.0000013F3A054000.00000004.00000020.00020000.00000000.sdmp, .exe, 0000000D.00000002.3876973808.0000000000E8C000.00000004.00000020.00020000.00000000.sdmp, .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmp, .exe, 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: Amcache.hve.8.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: bhvBEB.tmp.16.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                  Source: Amcache.hve.8.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                  Source: Amcache.hve.8.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: vmci.sys
                  Source: Amcache.hve.8.drBinary or memory string: vmci.syshbin`
                  Source: Amcache.hve.8.drBinary or memory string: \driver\vmci,\driver\pci
                  Source: Amcache.hve.8.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                  Source: Amcache.hve.8.drBinary or memory string: VMware20,1
                  Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Generation Counter
                  Source: Amcache.hve.8.drBinary or memory string: NECVMWar VMware SATA CD00
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                  Source: Amcache.hve.8.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                  Source: Amcache.hve.8.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                  Source: Amcache.hve.8.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                  Source: Amcache.hve.8.drBinary or memory string: VMware PCI VMCI Bus Device
                  Source: Amcache.hve.8.drBinary or memory string: VMware VMCI Bus Device
                  Source: Amcache.hve.8.drBinary or memory string: VMware Virtual RAM
                  Source: Amcache.hve.8.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                  Source: Amcache.hve.8.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeAPI call chain: ExitProcess graph end nodegraph_13-41225
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeAPI call chain: ExitProcess graph end nodegraph_17-34123
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_100060E2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,16_2_0040DD85
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_004158B5 ExitWindowsEx,LoadLibraryA,GetProcAddress,13_2_004158B5
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10004AB4 mov eax, dword ptr fs:[00000030h]13_2_10004AB4
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00442554 mov eax, dword ptr fs:[00000030h]13_2_00442554
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_1000724E GetProcessHeap,13_2_1000724E
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_100060E2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_10002639
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_10002B1C
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00434168
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00433B44
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00433CD7 SetUnhandledExceptionFilter,13_2_00433CD7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_0043A65D
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00417245 CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,13_2_00417245
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: NULL target: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: NULL target: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeSection loaded: NULL target: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_00418754 mouse_event,13_2_00418754
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeProcess created: C:\Users\user\Desktop\I1ahLI8fId.exe "C:\Users\user\Desktop\I1ahLI8fId.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\tbpbiomps"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\vvutjgfjgfkdi"Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\gphekzqluncilesz"Jump to behavior
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\25_ o.
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
                  Source: .exe, 0000000D.00000002.3878307547.0000000003A38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\D z.
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\*'
                  Source: .exe, 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerk
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\V h.
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\38r D.
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\02
                  Source: .exe, 0000000D.00000002.3876973808.0000000000E95000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager05\a6M a.
                  Source: .exe, 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, .exe, 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: .exe, 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, logs.dat.13.drBinary or memory string: [Program Manager]
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10002933 cpuid 13_2_10002933
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetLocaleInfoA,13_2_0040E679
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: EnumSystemLocalesW,13_2_004470AE
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetLocaleInfoW,13_2_004510B1
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetLocaleInfoW,13_2_004510BA
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,13_2_004511E3
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,13_2_00450A7F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetLocaleInfoW,13_2_004512EA
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,13_2_004513B7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: EnumSystemLocalesW,13_2_00450CF7
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: EnumSystemLocalesW,13_2_00450D42
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: EnumSystemLocalesW,13_2_00450DDD
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: GetLocaleInfoW,13_2_00447597
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeQueries volume information: C:\Users\user\Desktop\I1ahLI8fId.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
                  Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeQueries volume information: C:\ VolumeInformation
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_10002264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,13_2_10002264
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0041A7A2 GetComputerNameExW,GetUserNameW,13_2_0041A7A2
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 13_2_0044800F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,13_2_0044800F
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: 16_2_0041739B GetVersionExW,16_2_0041739B
                  Source: C:\Users\user\Desktop\I1ahLI8fId.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                  Source: Amcache.hve.8.drBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3872038045.0000000000466000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3877544184.000000000291F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1564, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\key4.dbJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\24a4ohrz.default-release\places.sqlite
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: ESMTPPassword17_2_004033F0
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword17_2_00402DB3
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword17_2_00402DB3
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 3116, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-R1T905Jump to behavior
                  Source: Yara matchFile source: 10.2..exe.449fa40.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.I1ahLI8fId.exe.550000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.I1ahLI8fId.exe.41a7610.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000D.00000002.3872038045.0000000000466000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3877544184.000000000291F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: I1ahLI8fId.exe PID: 7908, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1992, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: .exe PID: 1564, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
                  Native API
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  1
                  Windows Service
                  1
                  Access Token Manipulation
                  1
                  Deobfuscate/Decode Files or Information
                  211
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  2
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  12
                  Registry Run Keys / Startup Folder
                  1
                  Windows Service
                  4
                  Obfuscated Files or Information
                  2
                  Credentials in Registry
                  1
                  System Service Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Remote Access Software
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal Accounts2
                  PowerShell
                  Login Hook212
                  Process Injection
                  2
                  Software Packing
                  1
                  Credentials In Files
                  2
                  File and Directory Discovery
                  Distributed Component Object Model211
                  Input Capture
                  2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                  Registry Run Keys / Startup Folder
                  1
                  Timestomp
                  LSA Secrets48
                  System Information Discovery
                  SSH3
                  Clipboard Data
                  12
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials161
                  Security Software Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                  Masquerading
                  DCSync51
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job51
                  Virtualization/Sandbox Evasion
                  Proc Filesystem4
                  Process Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow1
                  Application Window Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                  Process Injection
                  Network Sniffing1
                  System Owner/User Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1589061 Sample: I1ahLI8fId.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 53 geoplugin.net 2->53 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 16 other signatures 2->75 8 .exe 2 2->8         started        10 I1ahLI8fId.exe 2 2->10         started        13 svchost.exe 1 1 2->13         started        signatures3 process4 dnsIp5 16 .exe 3 16 8->16         started        21 powershell.exe 11 8->21         started        77 Bypasses PowerShell execution policy 10->77 23 powershell.exe 13 10->23         started        25 I1ahLI8fId.exe 10->25         started        55 127.0.0.1 unknown unknown 13->55 signatures6 process7 dnsIp8 49 192.210.150.26, 49716, 49717, 8787 AS-COLOCROSSINGUS United States 16->49 51 geoplugin.net 178.237.33.50, 49718, 80 ATOM86-ASATOM86NL Netherlands 16->51 41 C:\ProgramData\remcos\logs.dat, data 16->41 dropped 57 Detected Remcos RAT 16->57 59 Maps a DLL or memory area into another process 16->59 61 Installs a global keyboard hook 16->61 27 .exe 16->27         started        30 .exe 16->30         started        32 .exe 2 16->32         started        34 conhost.exe 21->34         started        43 C:\Users\user\AppData\Roaming\...\.exe, PE32 23->43 dropped 45 C:\Users\user\...\.exe:Zone.Identifier, ASCII 23->45 dropped 63 Creates executable files without a name 23->63 65 Drops PE files to the startup folder 23->65 67 Powershell drops PE file 23->67 36 conhost.exe 23->36         started        38 WerFault.exe 19 16 25->38         started        file9 signatures10 process11 file12 79 Tries to steal Instant Messenger accounts or passwords 27->79 81 Tries to steal Mail credentials (via file / registry access) 27->81 83 Tries to harvest and steal browser information (history, passwords, etc) 30->83 47 C:\ProgramData\Microsoft\...\Report.wer, Unicode 38->47 dropped signatures13

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  I1ahLI8fId.exe79%ReversingLabsWin32.Backdoor.Remcos
                  I1ahLI8fId.exe79%VirustotalBrowse
                  I1ahLI8fId.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe79%ReversingLabsWin32.Backdoor.Remcos
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c30%Avira URL Cloudsafe
                  https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be7170%Avira URL Cloudsafe
                  https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96dd0%Avira URL Cloudsafe
                  https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc80%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  geoplugin.net
                  178.237.33.50
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://geoplugin.net/json.gpfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.office.com/bhvBEB.tmp.16.drfalse
                        high
                        http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1446744687.00000000060BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=LObhvBEB.tmp.16.drfalse
                            high
                            https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f343d3a8731ffea490b8b5c3bhvBEB.tmp.16.drfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.imvu.comr.exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000B.00000002.1562272808.0000000004792000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000B.00000002.1562272808.0000000004792000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://aefd.nelreports.net/api/report?cat=bingthbhvBEB.tmp.16.drfalse
                                    high
                                    https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?469316a07faf13c962eeef1395652e59bhvBEB.tmp.16.drfalse
                                      high
                                      https://contoso.com/Licensepowershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.imvu.com.exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                          high
                                          https://aefd.nelreports.net/api/report?cat=wsbbhvBEB.tmp.16.drfalse
                                            high
                                            https://contoso.com/Iconpowershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.ver)svchost.exe, 00000006.00000002.3072152957.0000013F3A000000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://upx.sf.netAmcache.hve.8.drfalse
                                                  high
                                                  https://g.live.com/odclientsettings/ProdV2/C:svchost.exe, 00000006.00000003.1442777471.0000013F39EF0000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.6.dr, edb.log.6.drfalse
                                                    high
                                                    http://www.nirsoft.net.exe, 00000010.00000002.1588156338.0000000000EF4000.00000004.00000010.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aefd.nelreports.net/api/report?cat=bingaotakbhvBEB.tmp.16.drfalse
                                                        high
                                                        https://deff.nelreports.net/api/report?cat=msnbhvBEB.tmp.16.drfalse
                                                          high
                                                          https://github.com/Pester/Pesterpowershell.exe, 0000000B.00000002.1562272808.0000000004792000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://geoplugin.net/json.gpSystem32.exe, 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com.exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                high
                                                                https://www.google.com.exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                  high
                                                                  https://g.live.com/odclientsettings/Prod/C:edb.log.6.drfalse
                                                                    high
                                                                    https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=MIRA-WW-PH7&FrontEnbhvBEB.tmp.16.drfalse
                                                                      high
                                                                      http://crl.micropowershell.exe, 00000002.00000002.1450086408.0000000007BFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://geoplugin.net/json.gpE.exe, 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://aefd.nelreports.net/api/report?cat=bingaotbhvBEB.tmp.16.drfalse
                                                                            high
                                                                            http://geoplugin.net/json.gp/CI1ahLI8fId.exe, 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, I1ahLI8fId.exe, 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, I1ahLI8fId.exe, 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, .exe, 0000000A.00000002.3880604542.000000000450A000.00000004.00000800.00020000.00000000.sdmp, .exe, 0000000D.00000002.3872038045.000000000046B000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?f0f7e1407b69bd65640be717bhvBEB.tmp.16.drfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.1440172253.0000000005051000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1562272808.0000000004641000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&platbhvBEB.tmp.16.drfalse
                                                                                  high
                                                                                  https://contoso.com/powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1446744687.00000000060BA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1578624976.00000000056AB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://waw02prdapp02-canary.netmon.azure.com/apc/trans.gif?407dab52f7bc43350b5cde12afe93269bhvBEB.tmp.16.drfalse
                                                                                        high
                                                                                        https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgbhvBEB.tmp.16.drfalse
                                                                                          high
                                                                                          https://07ab41ecf42bc570255fdecc8dea3fa9.azr.footprintdns.com/apc/trans.gif?5b3bec92835bc024c52f96ddbhvBEB.tmp.16.drfalse
                                                                                          • Avira URL Cloud: safe
                                                                                          unknown
                                                                                          https://aefd.nelreports.net/api/report?cat=bingrmsbhvBEB.tmp.16.drfalse
                                                                                            high
                                                                                            https://www.google.com/accounts/servicelogin.exefalse
                                                                                              high
                                                                                              https://7da35b81493d6264eefb208fce0c5757.azr.footprintdns.com/apc/trans.gif?f92d19bcbba8eb1999dabbc8bhvBEB.tmp.16.drfalse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              https://login.yahoo.com/config/login.exefalse
                                                                                                high
                                                                                                http://www.nirsoft.net/.exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1440172253.0000000005051000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1562272808.0000000004641000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    http://www.ebuddy.com.exe, .exe, 00000012.00000002.1582998119.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5a&bhvBEB.tmp.16.drfalse
                                                                                                        high
                                                                                                        • No. of IPs < 25%
                                                                                                        • 25% < No. of IPs < 50%
                                                                                                        • 50% < No. of IPs < 75%
                                                                                                        • 75% < No. of IPs
                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                        192.210.150.26
                                                                                                        unknownUnited States
                                                                                                        36352AS-COLOCROSSINGUStrue
                                                                                                        178.237.33.50
                                                                                                        geoplugin.netNetherlands
                                                                                                        8455ATOM86-ASATOM86NLfalse
                                                                                                        IP
                                                                                                        127.0.0.1
                                                                                                        Joe Sandbox version:42.0.0 Malachite
                                                                                                        Analysis ID:1589061
                                                                                                        Start date and time:2025-01-11 09:01:54 +01:00
                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                        Overall analysis duration:0h 9m 44s
                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                        Report type:full
                                                                                                        Cookbook file name:default.jbs
                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                        Number of analysed new started processes analysed:22
                                                                                                        Number of new started drivers analysed:0
                                                                                                        Number of existing processes analysed:0
                                                                                                        Number of existing drivers analysed:0
                                                                                                        Number of injected processes analysed:0
                                                                                                        Technologies:
                                                                                                        • HCA enabled
                                                                                                        • EGA enabled
                                                                                                        • AMSI enabled
                                                                                                        Analysis Mode:default
                                                                                                        Analysis stop reason:Timeout
                                                                                                        Sample name:I1ahLI8fId.exe
                                                                                                        renamed because original name is a hash value
                                                                                                        Original Sample Name:8c5312bbccde4babcfbcb4d079b6063cf023777affca10a479891833925d4118.exe
                                                                                                        Detection:MAL
                                                                                                        Classification:mal100.rans.spre.phis.troj.adwa.spyw.expl.evad.winEXE@20/21@1/3
                                                                                                        EGA Information:
                                                                                                        • Successful, ratio: 66.7%
                                                                                                        HCA Information:
                                                                                                        • Successful, ratio: 99%
                                                                                                        • Number of executed functions: 200
                                                                                                        • Number of non-executed functions: 318
                                                                                                        Cookbook Comments:
                                                                                                        • Found application associated with file extension: .exe
                                                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                        • Excluded IPs from analysis (whitelisted): 184.28.90.27, 13.89.179.12, 40.126.32.136, 20.109.210.53
                                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                                                                                                        • Execution Graph export aborted for target I1ahLI8fId.exe, PID 7908 because there are no executed function
                                                                                                        • Execution Graph export aborted for target powershell.exe, PID 7752 because it is empty
                                                                                                        • Execution Graph export aborted for target powershell.exe, PID 908 because it is empty
                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                        TimeTypeDescription
                                                                                                        03:02:51API Interceptor12x Sleep call for process: powershell.exe modified
                                                                                                        03:02:53API Interceptor3x Sleep call for process: svchost.exe modified
                                                                                                        03:03:01API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                        03:03:36API Interceptor6371654x Sleep call for process: .exe modified
                                                                                                        09:02:54AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        192.210.150.26rZcI2tz327.exeGet hashmaliciousRemcosBrowse
                                                                                                          C2R7VV2QmG.exeGet hashmaliciousRemcosBrowse
                                                                                                            8kjlHXmbAY.exeGet hashmaliciousRemcosBrowse
                                                                                                              NssBkEQKsI.exeGet hashmaliciousRemcosBrowse
                                                                                                                l1QC9H0SNR.exeGet hashmaliciousRemcosBrowse
                                                                                                                  bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                                                    FACTURA.xlsxGet hashmaliciousRemcosBrowse
                                                                                                                      7056ZCiFdE.exeGet hashmaliciousRemcosBrowse
                                                                                                                        uIarPolvHR.exeGet hashmaliciousRemcosBrowse
                                                                                                                          IB9876789000.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                            178.237.33.50yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            173634822473cd620521fcc8b42a4aac25bbd1c3f6e30c324045b1411f9747e93f432d0281839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            1736348224ad77cf86e491faad27e4b5decf1eb0bb26f16b0527e5ef488389ba353aa3db79582.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            17363482247f60133f013d62aae38c531ac95bb55a200a243b0e15fa7cf8e8923b2a10590f952.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • geoplugin.net/json.gp
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            geoplugin.netyPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            173634822473cd620521fcc8b42a4aac25bbd1c3f6e30c324045b1411f9747e93f432d0281839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            1736348224ad77cf86e491faad27e4b5decf1eb0bb26f16b0527e5ef488389ba353aa3db79582.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            17363482247f60133f013d62aae38c531ac95bb55a200a243b0e15fa7cf8e8923b2a10590f952.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            AS-COLOCROSSINGUS2iH7rqx9rQ.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 198.23.227.212
                                                                                                                            M6MafKT2pj.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.3.64.152
                                                                                                                            rZcI2tz327.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.210.150.26
                                                                                                                            Wk731bq71c.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 198.23.227.212
                                                                                                                            yPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 198.23.227.212
                                                                                                                            C2R7VV2QmG.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.210.150.26
                                                                                                                            8kjlHXmbAY.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.210.150.26
                                                                                                                            OKkUGRkZV7.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.3.64.152
                                                                                                                            NssBkEQKsI.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.210.150.26
                                                                                                                            l1QC9H0SNR.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 192.210.150.26
                                                                                                                            ATOM86-ASATOM86NLyPIOW6yoPi.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            bwYw3UUfy7.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            1736491685b40eefbc9bdfbc98216071e6ff3a4c19c7e1ab8a144cde35036665da85346b6b949.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            Material Requirments.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            preliminary drawing.pif.exeGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            173634822473cd620521fcc8b42a4aac25bbd1c3f6e30c324045b1411f9747e93f432d0281839.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            1736348224ad77cf86e491faad27e4b5decf1eb0bb26f16b0527e5ef488389ba353aa3db79582.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            17363482247f60133f013d62aae38c531ac95bb55a200a243b0e15fa7cf8e8923b2a10590f952.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                                                                                            • 178.237.33.50
                                                                                                                            No context
                                                                                                                            No context
                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):8192
                                                                                                                            Entropy (8bit):0.35999246155449205
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:6:6xDoaaD0JOCEfMuaaD0JOCEfMKQmDMxDoaaD0JOCEfMuaaD0JOCEfMKQmD:haaD0JcaaD0JwQQnaaD0JcaaD0JwQQ
                                                                                                                            MD5:D6D3830984AEC72B32E4EF5030B32290
                                                                                                                            SHA1:A645195729EB557B4B773E137AA78ECB17CFB96D
                                                                                                                            SHA-256:09BA30C4D4F2F7FEC3C62A7AD0D5103CE6662FDAB91F62803144CCB6B20E4604
                                                                                                                            SHA-512:44C27B21C2BB77D57AC1499ABFEB4FA11B45A7EC856276696132498302733B88EE7D748E05ABD6DAC09C8A478CCC803F16A8E1FF7305245F82E382D2617AA69F
                                                                                                                            Malicious:false
                                                                                                                            Reputation:moderate, very likely benign file
                                                                                                                            Preview:*.>...........~.....D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@......................................................~.............................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1310720
                                                                                                                            Entropy (8bit):0.8062552664811121
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:1536:RJszRK0I9i0k0I9wXq0I9UGJC/PQJCmJCovVsnQ9Sii1GY9zOoRXTpMNYpKhvUAP:RJE+Lfki1GjHwU/+vVhWqpG
                                                                                                                            MD5:3D2B39EFDC6F30FFB4B0615279FAFA81
                                                                                                                            SHA1:7B34940556F59D8CC4BE00407B5F02863D222F43
                                                                                                                            SHA-256:886B9B71E27D865ED447AE9D2D266FD965AC2B7804CDB58A3F78DE6B7D3D7CB6
                                                                                                                            SHA-512:B93A86E4BDF8A6187F959D54C45574A3C06F6A1D2845BA0CDCD60F597DBFBE615D8759F08EA7E1F2A8B15671FDC77B420A1F08B27B31E3B822A62CEA93AD18ED
                                                                                                                            Malicious:false
                                                                                                                            Preview:..Q^........@..@.....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@.....................................3~L.#.........`h.................h.......1.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x77c4aaa2, page size 16384, Windows version 10.0
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1048576
                                                                                                                            Entropy (8bit):0.786431360310997
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:1536:7SB2ESB2SSjlK/IECXK0I9XGJCTgzEYkr3g16t2UPkLk+k0+lKuy9nyS2kILzsL6:7azauEezm2U
                                                                                                                            MD5:84E18B06EF43622F827C028D42119A63
                                                                                                                            SHA1:01EE080896784187B5E441909E2D8752D73F9F28
                                                                                                                            SHA-256:A0B25BAFA4B5151E0AE623C8A7F40BC98A6A2150818C3B4728C8B640D130882B
                                                                                                                            SHA-512:E3806EA0BAF404BE03824626DFFECC9F7F461A1AA7DB5120AF776C3C27B2006BFDBEABBB611A59C3CE642808BCCD56572E8411AB0B3825A89247CB58AEC5D10C
                                                                                                                            Malicious:false
                                                                                                                            Preview:w..... ...............X\...;...{......................0.}..........}W.5....}..h.z..........}W.0.}.........D./..;...{..........................................................................................................eJ......n....@...................................................................................................... ............................................................................................................................................................................................................2...{..................................9.......}W..................._......}W..........................#......0.}.....................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):16384
                                                                                                                            Entropy (8bit):0.0794469404755582
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:arOetYen/gRpiuXRMNuU3tuUYllmn/lZOPp3lll:arrznoR3RMNttuZiD
                                                                                                                            MD5:D11C3E240DF62AD1F840331FDEC8AD24
                                                                                                                            SHA1:9BB5CCA2C0EC4C29EEB1F0CF9154558C7E40DE59
                                                                                                                            SHA-256:1F5E56D06FB9A0358B770DE31ABB585242DED10D3A77655CE6AA4F5345B991FA
                                                                                                                            SHA-512:F7AA2C8038A5056CDA8D3B767B62164A67CAE2A2C42E074D5D1674E964F659E3C8EFB7466530C617196E2C0383C72693984B92760EB1A12D74BDDCE0F39363FE
                                                                                                                            Malicious:false
                                                                                                                            Preview:..IZ.....................................;...{..5....}.......}W..............}.......}W.........}W..................._......}W.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):65536
                                                                                                                            Entropy (8bit):0.8158379998291172
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:192:lnURovOxM60BU/gjkZrCqzuiFbZ24IO8QT:lURo2xMBBU/gjUzuiFbY4IO8QT
                                                                                                                            MD5:099A6271020845DE51D27EC4143F48F4
                                                                                                                            SHA1:5FE8A4A71BD51664EC976B38359AA3F1C4DB4263
                                                                                                                            SHA-256:5C56AF7B2AE7BFD4E7AAB1AC07417041DD51C703679E74BF008D3E908AE70A64
                                                                                                                            SHA-512:54C2C5A9747E444D95792EE5DAA45F8A5B74CA1C9C9AA7988DD7CDD4F83BD9613D70A6FA448754D97F8684AF2AD2222CF39F14BF73F5AB5CF2DE747422E89EBC
                                                                                                                            Malicious:true
                                                                                                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.1.0.5.6.1.7.3.5.7.7.7.7.3.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.1.0.5.6.1.7.4.0.1.5.2.7.3.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.3.4.5.d.d.7.-.0.5.2.6.-.4.f.0.3.-.a.3.5.9.-.f.3.d.0.d.7.e.a.0.0.7.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.5.e.b.0.4.8.-.3.5.7.b.-.4.4.1.4.-.b.6.3.c.-.5.b.d.9.c.d.e.1.3.1.1.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.I.1.a.h.L.I.8.f.I.d...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.I.C.a.n.t.S.e.e.Y.o.u...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.e.e.4.-.0.0.0.1.-.0.0.1.4.-.1.e.a.b.-.0.3.3.7.f.f.6.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.d.9.f.0.b.3.a.0.2.1.2.0.e.4.c.1.9.5.b.5.b.5.b.c.5.d.1.5.2.9.b.0.0.0.0.0.0.0.0.!.0.0.0.0.3.4.7.8.c.4.5.e.a.7.e.9.4.3.a.c.5.6.5.6.1.8.6.a.1.3.a.5.8.2.9.2.
                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            File Type:Mini DuMP crash report, 14 streams, Sat Jan 11 08:02:53 2025, 0x1205a4 type
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):40952
                                                                                                                            Entropy (8bit):1.8367816722198422
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:192:z2DHezQ0XPdMnO+c8SD2DBeOs0hwVIkIjBIkFfe2p7:KbezQ0HOs0hMIjuGp
                                                                                                                            MD5:E505BEE4AB3CC4C5A5AE5D8371B35632
                                                                                                                            SHA1:7C8E477DA5EF6558C691FEE4E2D638CBEE38AA02
                                                                                                                            SHA-256:6A4AFB7674C1D3DA0E6E29E6F03C0E9DB1073EF5D226A3CBF732F2ED09ADA8E8
                                                                                                                            SHA-512:9EDB02A5F653A7611209E27C758CBE2A10D20FED04378DDEB92C8FD327364BB637AF74C334456BD101A93A5DAF348F8F23C696AB4C14239B9C130AC9605E218E
                                                                                                                            Malicious:false
                                                                                                                            Preview:MDMP..a..... ........%.g........................................L%..........T.......8...........T...............p...........H...........4...............................................................................eJ..............GenuineIntel............T............%.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):8324
                                                                                                                            Entropy (8bit):3.703023815466754
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:192:R6l7wVeJ4065R6Yr/6lOCgmfRaprv89bSgsfmmm:R6lXJD6f6YD6YCgmfRfSzf+
                                                                                                                            MD5:4EC5ADBEE4ADFF40C064DF6013540F04
                                                                                                                            SHA1:881A7D6496A5891A2DA396FD4355B2138A22D877
                                                                                                                            SHA-256:85F1F61B6EFD105A6132EB9871EAA5DF9E8FE8E59ADA159431E3534461DC5A38
                                                                                                                            SHA-512:9FD5A89C9656B47483D0D9DDC2CBCBFFB0E624C3EDD861B22CDC82485946CA8715FB359F88161B08FAA2DA450014E536086A95D7FF10EA6AC75E9EFC55208EF9
                                                                                                                            Malicious:false
                                                                                                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.9.0.8.<./.P.i.
                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):4685
                                                                                                                            Entropy (8bit):4.507002717846787
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:48:cvIwWl8zshJg77aI9ALWpW8VYYYm8M4JZwFzX+q8BD8GN6d:uIjfzI7O67VoJ4GRN6d
                                                                                                                            MD5:562ED3BF679D523A2BC41032E065440B
                                                                                                                            SHA1:C15A42DEBEE58B2F9C7D8661D5B43A706B6B53E5
                                                                                                                            SHA-256:9355908960F9AE50B7159FC6C26197424910247633A88D008185C59CFB3B70E1
                                                                                                                            SHA-512:96F37A7BE4FEBFD817D4E0FB565E12EA7BC72B7ECCDBBD0741FF0E4781ECE7206D220DA7344F32601F162D3BBFC2A3CBF8A05D920BE81D1C9B62254705F6C2A1
                                                                                                                            Malicious:false
                                                                                                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="670985" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):246
                                                                                                                            Entropy (8bit):3.412381184455069
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:6:MlsPlfl25YcIeeDAls8ylKWA7DxbN2fBMMm0v:tXWeca82KWItN25MMl
                                                                                                                            MD5:DACE6203BA332565661A78B5C1421474
                                                                                                                            SHA1:7F21ACE42D81E4C5BB6B660041F9F077A67AEFCA
                                                                                                                            SHA-256:0660F8B1ACBE69EA46F2212B3040627FB093684E01CD6A51DEBFA786297D702A
                                                                                                                            SHA-512:87977BB162EDE31088FFB57CCAF039329064CE4808256D87DB55734D82AC8CE8D657C683855E4396C76CDC970C916C84B113548410C740E65A17A2A9687A9766
                                                                                                                            Malicious:true
                                                                                                                            Yara Hits:
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                                            Preview:....[.2.0.2.5./.0.1./.1.1. .0.3.:.0.3.:.0.4. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.F.o.r.m.1.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                                                                                                                            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            File Type:JSON data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):963
                                                                                                                            Entropy (8bit):5.019506780280991
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:12:tkluWJmnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzd:qlupdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                                                                                            MD5:7459F6DA71CD5EAF9DBE2D20CA9434AC
                                                                                                                            SHA1:4F60E33E15277F7A632D8CD058EC7DF4728B40BC
                                                                                                                            SHA-256:364A445C3A222EE10A8816F78283BBD0503A5E5824B2A7F5DCD8E6DA9148AF6A
                                                                                                                            SHA-512:3A862711D78F6F97F07E01ACC0DCB54F595A23AACEA9F2BB9606382805E1E92C1ACE09E1446F312F3B6D4EE63435ABEF46F0C16F015BD505347A1BCF2E149841
                                                                                                                            Malicious:false
                                                                                                                            Preview:{. "geoplugin_request":"8.46.123.189",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1248
                                                                                                                            Entropy (8bit):5.370576209173007
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:24:3vZWSKco4KmBs4RPT6BmFoUebIKomjKcmZ9tXt/NK3R8UHrx:hWSU4y4RQmFoUeWmfmZ9tlNWR8Wt
                                                                                                                            MD5:3FB3D0544BDF233A410F17EC5EDB5075
                                                                                                                            SHA1:92DD40560C86924B32347AF007F38750A25D19E5
                                                                                                                            SHA-256:C55317DC391339B025E39019536804AB0E863C65F327AC22CDD6A2F66591750F
                                                                                                                            SHA-512:F5EEBA99CC255217352FCC11F0FBC139D709732DBA99AEA3DBE5DFB002912B736AF857B98EB8FA92C9A9C590C67BE0A77078482CA20DBD74AB9E30CD8121A312
                                                                                                                            Malicious:false
                                                                                                                            Preview:@...e.................................l..............@..........P................1]...E...........(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.4.....................@.[8]'.\........System.Data.<...............i..VdqF...|...........System.ConfigurationH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.D....................+.H..!...e........System.Configuration.Ins
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):60
                                                                                                                            Entropy (8bit):4.038920595031593
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                            Malicious:false
                                                                                                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            File Type:Extensible storage engine DataBase, version 0x620, checksum 0x894b4025, page size 32768, DirtyShutdown, Windows version 10.0
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):15728640
                                                                                                                            Entropy (8bit):0.9442037664922805
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:12288:YcCS8rMTkTaTeUZT+T5SFnTKXpmlGVvK:YcrTGv
                                                                                                                            MD5:DEC72DFD48EF059BC51EA55AB9986E08
                                                                                                                            SHA1:5679B443FD648FEFDE56AA6A5AD77BB14271013D
                                                                                                                            SHA-256:9B36A737901BBDA83B4D989C3A3183126E2A22C69578391A59DD0D012FB757D2
                                                                                                                            SHA-512:25C25965546B7DCEED0E95CC1FBE6BCD687A931D4DB62974CF4D1305B77FE3DE1A899E9C1B2909D6ED86FA7301427A0BFD4E01D6A4B036A55D0F04E72CDB6CFB
                                                                                                                            Malicious:false
                                                                                                                            Preview:.K@%... .......!........v.......{......................d........$...{.......}i.h...........................0s......{..............................................................................................Y...........eJ......n........................................................................................................... ........"...{..............................................................................................................................................................................................;....{..................................|.G}.....}i................._.......}i..........................#......h.......................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            Process:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):2
                                                                                                                            Entropy (8bit):1.0
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:Qn:Qn
                                                                                                                            MD5:F3B25701FE362EC84616A93A45CE9998
                                                                                                                            SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                                                                                            SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                                                                                            SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                                                                                            Malicious:false
                                                                                                                            Preview:..
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1005568
                                                                                                                            Entropy (8bit):7.424962707628146
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:24576:QMj4sXd+Zh5lLfwDpuRR7BYutqtoQsFC/Z+Y0yPPov:ssXd+hBYsxqoe0NE
                                                                                                                            MD5:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            SHA1:3478C45EA7E943AC5656186A13A5829256117232
                                                                                                                            SHA-256:8C5312BBCCDE4BABCFBCB4D079B6063CF023777AFFCA10A479891833925D4118
                                                                                                                            SHA-512:2086D69E11D20DD489ABED169722FE0B6B2E864D45E2356E703F8D593C0F992BEADA47A646043AF361DB59DC514623BBE87746A97E79A4130AA55DC7F9D47278
                                                                                                                            Malicious:true
                                                                                                                            Antivirus:
                                                                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                            • Antivirus: ReversingLabs, Detection: 79%
                                                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~2C...............0..N...........l... ........@.. ....................................@.................................Dl..W.................................................................................... ............... ..H............text....L... ...N.................. ..`.rsrc................P..............@..@.reloc...............V..............@..B.................l......H........e..l.......Z...t...d...........................................!.@.#.$.%.^.&.*.(.).-._.=.+.".(a....*.sb........*.sb........*Vsb........(S........*.sb........*B.{.....(...+...*&.(a.....*".......*".(y....*VsU...(z...t.........*j.(......(.....sW...(.....*..{....*..{....*V.(......}......}....*. ... )UU.Z(.....{....o....X )UU.Z(.....{....o....X*f.(....-..(....-..(....*.*..-..*.o....r...p(..../..*.r...p.o....-..r...p.o....*.*Z.,..o........+(f...*.*z..}......}......}......
                                                                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):26
                                                                                                                            Entropy (8bit):3.95006375643621
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:ggPYV:rPYV
                                                                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                            Malicious:true
                                                                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                            Process:C:\Windows\System32\svchost.exe
                                                                                                                            File Type:JSON data
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):55
                                                                                                                            Entropy (8bit):4.306461250274409
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                                                                                                                            MD5:DCA83F08D448911A14C22EBCACC5AD57
                                                                                                                            SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                                                                                                                            SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                                                                                                                            SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                                                                                                                            Malicious:false
                                                                                                                            Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                                                                                                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            File Type:MS Windows registry file, NT/2000 or above
                                                                                                                            Category:dropped
                                                                                                                            Size (bytes):1835008
                                                                                                                            Entropy (8bit):4.372268622377021
                                                                                                                            Encrypted:false
                                                                                                                            SSDEEP:6144:iFVfpi6ceLP/9skLmb04yWWSPtaJG8nAge35OlMMhA2AX4WABlguN7iL:qV1+yWWI/glMM6kF7xq
                                                                                                                            MD5:DDCFE321C12FD7A7A3877DE75B3F70F1
                                                                                                                            SHA1:A06A293F5A40B2293DCE9E064C982EC928231BB0
                                                                                                                            SHA-256:8E4E22F72049031603F4EE45D7C2359BE131CD4DCA247BF748B55556896A1B49
                                                                                                                            SHA-512:C1BFC5619CA8564CE4A99B404B4658512C28CF3E5E89690934905BF9CB484C676FC391E932C377CB4D6CD1B7D800DAFDBFE9F1370EE662FEA6FE0AC6AC6052B8
                                                                                                                            Malicious:false
                                                                                                                            Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..[7.c................................................................................................................................................................................................................................................................................................................................................L.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                            Entropy (8bit):7.424962707628146
                                                                                                                            TrID:
                                                                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                                                                            • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                            File name:I1ahLI8fId.exe
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5:d46127b513eaa0e4e1e4d2ab89fe2b4a
                                                                                                                            SHA1:3478c45ea7e943ac5656186a13a5829256117232
                                                                                                                            SHA256:8c5312bbccde4babcfbcb4d079b6063cf023777affca10a479891833925d4118
                                                                                                                            SHA512:2086d69e11d20dd489abed169722fe0b6b2e864d45e2356e703f8d593c0f992beada47a646043af361db59dc514623bbe87746a97e79a4130aa55dc7f9d47278
                                                                                                                            SSDEEP:24576:QMj4sXd+Zh5lLfwDpuRR7BYutqtoQsFC/Z+Y0yPPov:ssXd+hBYsxqoe0NE
                                                                                                                            TLSH:1A25BE1526FA1019F2772F7ABBF124658B7BFA636939D05D008D128E0BA3B80DD61773
                                                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~2C...............0..N...........l... ........@.. ....................................@................................
                                                                                                                            Icon Hash:00928e8e8686b000
                                                                                                                            Entrypoint:0x4f6c9e
                                                                                                                            Entrypoint Section:.text
                                                                                                                            Digitally signed:false
                                                                                                                            Imagebase:0x400000
                                                                                                                            Subsystem:windows gui
                                                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                            Time Stamp:0xCC43327E [Fri Aug 5 20:11:42 2078 UTC]
                                                                                                                            TLS Callbacks:
                                                                                                                            CLR (.Net) Version:
                                                                                                                            OS Version Major:4
                                                                                                                            OS Version Minor:0
                                                                                                                            File Version Major:4
                                                                                                                            File Version Minor:0
                                                                                                                            Subsystem Version Major:4
                                                                                                                            Subsystem Version Minor:0
                                                                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                                            Instruction
                                                                                                                            jmp dword ptr [00402000h]
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            add byte ptr [eax], al
                                                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xf6c440x57.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xf80000x5b6.rsrc
                                                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xfa0000xc.reloc
                                                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                            .text0x20000xf4ca40xf4e0015631c15b63ca02887512dd936f94d13False0.714912543070444data7.431506281556981IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                            .rsrc0xf80000x5b60x60015b870c2200d4751ec7118ef5dfa3bfbFalse0.4205729166666667data4.114950064068566IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                            .reloc0xfa0000xc0x2007595f860861717f5b0998c76bfb079aeFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                            RT_VERSION0xf80a00x32cdata0.42610837438423643
                                                                                                                            RT_MANIFEST0xf83cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                                            DLLImport
                                                                                                                            mscoree.dll_CorExeMain
                                                                                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                            2025-01-11T09:03:05.289298+01002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.849716192.210.150.268787TCP
                                                                                                                            2025-01-11T09:03:05.899351+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1192.210.150.268787192.168.2.849716TCP
                                                                                                                            2025-01-11T09:03:08.225911+01002803304ETPRO MALWARE Common Downloader Header Pattern HCa3192.168.2.849718178.237.33.5080TCP
                                                                                                                            2025-01-11T09:05:18.458041+01002032777ET MALWARE Remcos 3.x Unencrypted Server Response1192.210.150.268787192.168.2.849716TCP
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Jan 11, 2025 09:03:05.283304930 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:05.288181067 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:05.288255930 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:05.289298058 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:05.294066906 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:05.899350882 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:05.900705099 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:05.905564070 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:06.500157118 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:06.543919086 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:06.633896112 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:06.640280008 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:06.645147085 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:06.645232916 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:06.645282030 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:06.650048971 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:06.684541941 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.150675058 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150696039 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150724888 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150737047 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150837898 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.150846958 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150839090 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.150859118 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150870085 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150947094 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.150984049 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.150996923 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.151009083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.151031017 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.151062012 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.155724049 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.155774117 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.155859947 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.239732027 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.239751101 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.239763021 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.239816904 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.239828110 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.239913940 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.239913940 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.240245104 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.240257025 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.240267038 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.240286112 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.240298033 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.240310907 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.240310907 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.240345001 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.240976095 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241020918 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241033077 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241074085 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.241128922 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241589069 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241625071 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241636038 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241640091 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.241660118 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.241715908 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241728067 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.241766930 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.242485046 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.242497921 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.242511034 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.242551088 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.242564917 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.244787931 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.244800091 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.244812965 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.244852066 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.293939114 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.330485106 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330529928 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330588102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330621958 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330657005 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330662966 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.330691099 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330718040 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.330725908 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330787897 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.330847025 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330877066 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330912113 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.330913067 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330954075 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330964088 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.330986977 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331018925 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331206083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331218958 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331235886 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331247091 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331262112 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331274033 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331300974 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331620932 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331631899 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331648111 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331656933 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331667900 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331671000 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331681967 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331693888 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331701040 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331732988 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331759930 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331877947 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331890106 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331902027 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331912994 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.331934929 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.331964016 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.332410097 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332456112 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332468033 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332510948 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.332582951 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332592964 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332606077 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332667112 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.332667112 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.332736969 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332755089 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332765102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332777023 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332787991 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.332799911 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.332865000 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.333332062 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333360910 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333367109 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333424091 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.333528996 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333540916 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333551884 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333561897 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333573103 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.333626986 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.333626986 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.335546017 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.335613966 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421283007 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421317101 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421328068 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421400070 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421411991 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421422005 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421432972 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421468019 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421511889 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421511889 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421521902 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421565056 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421592951 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421602964 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421613932 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421653032 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421715021 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421725988 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421736956 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421747923 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421757936 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421767950 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421775103 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421777964 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421793938 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421837091 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421878099 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421890020 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421941996 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.421955109 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.421967030 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422028065 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422149897 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422161102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422171116 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422182083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422194004 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422214985 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422215939 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422215939 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422285080 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422302961 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422313929 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422323942 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422336102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422360897 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422383070 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422482967 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422493935 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422502995 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422513962 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422524929 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422533989 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422549009 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422549009 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422604084 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422673941 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422683954 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422693968 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422730923 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422790051 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422799110 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422808886 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422818899 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.422851086 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.422875881 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.423058987 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423069954 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423083067 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423093081 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423111916 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423122883 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423132896 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423137903 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.423141956 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423154116 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423157930 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.423187017 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.423187017 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.423360109 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423369884 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423379898 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423391104 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.423410892 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.423439026 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426250935 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426270008 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426280975 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426311016 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426328897 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426356077 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426356077 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426398039 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426408052 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426419020 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426449060 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426470995 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426474094 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426542997 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426553965 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426573992 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426588058 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426610947 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426629066 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426670074 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426681042 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426692009 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426726103 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426749945 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426876068 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426886082 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426896095 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.426929951 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.426974058 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.427033901 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.427045107 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.427057981 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.427067995 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.427077055 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.427097082 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.427097082 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.481396914 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.511833906 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.511848927 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.511862993 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.511907101 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.511919975 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.511924028 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.511981964 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.511992931 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.511993885 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512005091 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512020111 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512058020 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512115955 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512126923 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512139082 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512151003 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512161970 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512175083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512182951 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512182951 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512234926 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512322903 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512334108 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512346029 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512357950 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512386084 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512406111 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512469053 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512480021 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512490034 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512501001 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512521982 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512543917 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512605906 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512617111 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512633085 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512643099 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512654066 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512665987 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512676001 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512696028 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512717962 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512845039 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512856960 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512867928 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512880087 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512891054 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512900114 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.512908936 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512933016 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.512933969 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513123035 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513139963 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513151884 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513163090 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513175964 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513185978 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513200045 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513211966 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513221025 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513222933 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513221025 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513227940 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513235092 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513240099 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513245106 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513274908 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513297081 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513461113 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513506889 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513520002 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513533115 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513550997 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513575077 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513751030 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513767004 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513777971 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513787985 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513799906 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513811111 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513812065 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513823986 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513825893 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513834953 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513847113 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513856888 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513863087 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513874054 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513885975 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513900042 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513900995 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513900995 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513915062 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.513925076 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.513957024 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514388084 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514400005 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514410973 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514421940 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514432907 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514446020 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514455080 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514458895 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514471054 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514480114 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514483929 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514494896 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514497042 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514507055 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514518023 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514518976 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514528990 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514539957 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514547110 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514565945 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514589071 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514894962 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514905930 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514916897 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514928102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514938116 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514947891 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514949083 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514959097 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514971018 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514974117 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.514982939 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.514995098 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515017033 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515186071 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515197992 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515209913 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515221119 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515232086 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515244007 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515254974 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515264034 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515264034 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515264034 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515296936 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515332937 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515346050 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515350103 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515357018 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515367031 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515377998 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515388966 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515391111 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515399933 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515410900 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515415907 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515415907 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515424967 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515435934 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515444040 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515448093 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515460968 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515471935 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515474081 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515482903 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.515492916 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.515516996 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.559509993 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.602586031 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602613926 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602626085 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602637053 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602648020 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602680922 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.602680922 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.602729082 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602740049 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602751970 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602777004 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.602797031 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602803946 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.602808952 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602819920 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602860928 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.602911949 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602924109 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602933884 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602943897 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602953911 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.602965117 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603003025 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603003025 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603039026 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603049994 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603061914 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603079081 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603090048 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603091955 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603099108 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603115082 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603152037 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603280067 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603291035 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603301048 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603318930 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603332043 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603343010 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603398085 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603399992 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603410959 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603446007 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603485107 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603496075 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603506088 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603516102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603527069 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603528023 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603566885 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603727102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603738070 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603748083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603758097 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603769064 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603779078 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.603818893 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603818893 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.603818893 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604024887 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604037046 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604046106 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604055882 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604064941 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604074955 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604075909 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604084969 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604096889 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604106903 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604116917 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604118109 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604135990 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604165077 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604167938 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604178905 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604224920 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604281902 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604294062 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604304075 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604314089 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604326963 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604337931 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604342937 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604347944 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604363918 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604392052 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604500055 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604510069 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604520082 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604531050 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604536057 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604567051 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604602098 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604614019 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604624987 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604635000 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604646921 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604657888 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604661942 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604661942 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604669094 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604684114 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604700089 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604724884 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604834080 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604849100 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604861975 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604872942 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.604875088 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.604912043 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605094910 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605106115 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605117083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605129004 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605139971 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605142117 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605149984 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605155945 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605166912 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605166912 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605178118 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605185032 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605187893 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605200052 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605204105 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605210066 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605221987 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605226040 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605232954 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605258942 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605432987 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605446100 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605457067 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605467081 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605479002 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605490923 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605525017 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605529070 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605540991 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605544090 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605552912 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605562925 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605575085 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605586052 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605593920 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605597019 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605608940 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605618954 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605632067 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605632067 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605658054 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605916977 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605927944 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605937958 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605948925 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605958939 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605971098 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.605971098 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.605982065 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.606015921 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.606050014 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.621620893 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:03:07.626544952 CET8049718178.237.33.50192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.626621008 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:03:07.627624989 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:03:07.632457972 CET8049718178.237.33.50192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693243027 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693264961 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693335056 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693347931 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693350077 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693392038 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693392992 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693406105 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693435907 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693448067 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693502903 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693541050 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693553925 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693564892 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693602085 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693696976 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693707943 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693720102 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693730116 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693742990 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693753958 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693761110 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693798065 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693798065 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693922043 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693933010 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693944931 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.693991899 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.693991899 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694025993 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694044113 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694056034 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694072008 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694093943 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694140911 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694257021 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694268942 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694278955 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694291115 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694302082 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694308043 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694319010 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694330931 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694331884 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694341898 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694353104 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694364071 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694374084 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694376945 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694403887 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694529057 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694541931 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694552898 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694581032 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694612026 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:07.694647074 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694658995 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:07.694706917 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:08.225781918 CET8049718178.237.33.50192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:08.225910902 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:03:08.254190922 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:08.259061098 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.008308887 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:09.013345003 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013372898 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013410091 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013463020 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:09.013470888 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013484001 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013519049 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013525963 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:09.013535023 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013567924 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013581038 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.013596058 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018394947 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018408060 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018431902 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018445015 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018495083 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018507957 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.018779039 CET878749717192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.019587994 CET497178787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:09.226003885 CET8049718178.237.33.50192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:09.226131916 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:03:10.598144054 CET5451553192.168.2.81.1.1.1
                                                                                                                            Jan 11, 2025 09:03:10.603027105 CET53545151.1.1.1192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:10.603107929 CET5451553192.168.2.81.1.1.1
                                                                                                                            Jan 11, 2025 09:03:10.608033895 CET53545151.1.1.1192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:11.060328960 CET5451553192.168.2.81.1.1.1
                                                                                                                            Jan 11, 2025 09:03:11.065363884 CET53545151.1.1.1192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:11.065424919 CET5451553192.168.2.81.1.1.1
                                                                                                                            Jan 11, 2025 09:03:18.264676094 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:18.266043901 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:18.270862103 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:48.319833994 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:48.321552992 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:03:48.326400042 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:04:18.354960918 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:04:18.356240988 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:04:18.361093044 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:04:48.393220901 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:04:48.394403934 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:04:48.399240971 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:04:57.544195890 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:04:57.872083902 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:04:58.510989904 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:04:59.872272015 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:05:02.359944105 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:05:07.262748003 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:05:16.966767073 CET4971880192.168.2.8178.237.33.50
                                                                                                                            Jan 11, 2025 09:05:18.458040953 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:05:18.459613085 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:05:18.464652061 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:05:48.508733988 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:05:48.509888887 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:05:48.514733076 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:06:18.565453053 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:06:18.566634893 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:06:18.571444035 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:06:48.609801054 CET878749716192.210.150.26192.168.2.8
                                                                                                                            Jan 11, 2025 09:06:48.652909040 CET497168787192.168.2.8192.210.150.26
                                                                                                                            Jan 11, 2025 09:06:48.658170938 CET878749716192.210.150.26192.168.2.8
                                                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                                                            Jan 11, 2025 09:03:07.595407963 CET6277553192.168.2.81.1.1.1
                                                                                                                            Jan 11, 2025 09:03:07.603269100 CET53627751.1.1.1192.168.2.8
                                                                                                                            Jan 11, 2025 09:03:10.597670078 CET53582481.1.1.1192.168.2.8
                                                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                            Jan 11, 2025 09:03:07.595407963 CET192.168.2.81.1.1.10x3cd3Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                            Jan 11, 2025 09:03:07.603269100 CET1.1.1.1192.168.2.80x3cd3No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                                                                                            • geoplugin.net
                                                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                            0192.168.2.849718178.237.33.50801564C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            TimestampBytes transferredDirectionData
                                                                                                                            Jan 11, 2025 09:03:07.627624989 CET71OUTGET /json.gp HTTP/1.1
                                                                                                                            Host: geoplugin.net
                                                                                                                            Cache-Control: no-cache
                                                                                                                            Jan 11, 2025 09:03:08.225781918 CET1171INHTTP/1.1 200 OK
                                                                                                                            date: Sat, 11 Jan 2025 08:03:08 GMT
                                                                                                                            server: Apache
                                                                                                                            content-length: 963
                                                                                                                            content-type: application/json; charset=utf-8
                                                                                                                            cache-control: public, max-age=300
                                                                                                                            access-control-allow-origin: *
                                                                                                                            Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                                                                                            Data Ascii: { "geoplugin_request":"8.46.123.189", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                                                                                            Click to jump to process

                                                                                                                            Click to jump to process

                                                                                                                            Click to dive into process behavior distribution

                                                                                                                            Click to jump to process

                                                                                                                            Target ID:0
                                                                                                                            Start time:03:02:50
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\Desktop\I1ahLI8fId.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\Desktop\I1ahLI8fId.exe"
                                                                                                                            Imagebase:0xa40000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.3880428650.000000000420C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.3880428650.0000000004056000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000000.00000002.3880428650.0000000004210000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                            Reputation:low
                                                                                                                            Has exited:false

                                                                                                                            Target ID:2
                                                                                                                            Start time:03:02:51
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\Desktop\I1ahLI8fId.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                                                                                                                            Imagebase:0x580000
                                                                                                                            File size:433'152 bytes
                                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:3
                                                                                                                            Start time:03:02:51
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff6ee680000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:4
                                                                                                                            Start time:03:02:52
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\Desktop\I1ahLI8fId.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\Desktop\I1ahLI8fId.exe"
                                                                                                                            Imagebase:0x390000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000004.00000002.1521797650.00000000005A7000.00000002.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:6
                                                                                                                            Start time:03:02:53
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Windows\System32\svchost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                                                                                                                            Imagebase:0x7ff67e6d0000
                                                                                                                            File size:55'320 bytes
                                                                                                                            MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:8
                                                                                                                            Start time:03:02:53
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7908 -s 512
                                                                                                                            Imagebase:0x130000
                                                                                                                            File size:483'680 bytes
                                                                                                                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                            Has elevated privileges:true
                                                                                                                            Has administrator privileges:true
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:10
                                                                                                                            Start time:03:03:02
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                                                                                                                            Imagebase:0xe70000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000A.00000002.3880604542.000000000450D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000A.00000002.3880604542.000000000450A000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                            • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000A.00000002.3880604542.0000000004504000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Antivirus matches:
                                                                                                                            • Detection: 100%, Joe Sandbox ML
                                                                                                                            • Detection: 79%, ReversingLabs
                                                                                                                            Reputation:low
                                                                                                                            Has exited:false

                                                                                                                            Target ID:11
                                                                                                                            Start time:03:03:03
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe' 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe'
                                                                                                                            Imagebase:0x580000
                                                                                                                            File size:433'152 bytes
                                                                                                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:12
                                                                                                                            Start time:03:03:03
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                                                            Wow64 process (32bit):false
                                                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            Imagebase:0x7ff6ee680000
                                                                                                                            File size:862'208 bytes
                                                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:high
                                                                                                                            Has exited:true

                                                                                                                            Target ID:13
                                                                                                                            Start time:03:03:04
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe"
                                                                                                                            Imagebase:0x780000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Yara matches:
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.3872038045.0000000000466000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.3876496862.0000000000DEA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.3877544184.000000000291F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.3872038045.000000000046B000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                                            • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.3876065879.0000000000DB7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                            Reputation:low
                                                                                                                            Has exited:false

                                                                                                                            Target ID:16
                                                                                                                            Start time:03:03:06
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\tbpbiomps"
                                                                                                                            Imagebase:0xa10000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:17
                                                                                                                            Start time:03:03:06
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\vvutjgfjgfkdi"
                                                                                                                            Imagebase:0x4c0000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Target ID:18
                                                                                                                            Start time:03:03:07
                                                                                                                            Start date:11/01/2025
                                                                                                                            Path:C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                            Wow64 process (32bit):true
                                                                                                                            Commandline:"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe" /stext "C:\Users\user\AppData\Local\Temp\gphekzqluncilesz"
                                                                                                                            Imagebase:0x4a0000
                                                                                                                            File size:1'005'568 bytes
                                                                                                                            MD5 hash:D46127B513EAA0E4E1E4D2AB89FE2B4A
                                                                                                                            Has elevated privileges:false
                                                                                                                            Has administrator privileges:false
                                                                                                                            Programmed in:C, C++ or other language
                                                                                                                            Reputation:low
                                                                                                                            Has exited:true

                                                                                                                            Reset < >

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:9.1%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:1.5%
                                                                                                                              Total number of Nodes:200
                                                                                                                              Total number of Limit Nodes:28
                                                                                                                              execution_graph 17314 2f4d178 17315 2f4d1be 17314->17315 17319 2f4d347 17315->17319 17322 2f4d358 17315->17322 17316 2f4d2ab 17320 2f4d386 17319->17320 17325 2f4b410 17319->17325 17320->17316 17323 2f4b410 DuplicateHandle 17322->17323 17324 2f4d386 17323->17324 17324->17316 17326 2f4d3c0 DuplicateHandle 17325->17326 17327 2f4d456 17326->17327 17327->17320 17328 2f44668 17329 2f4467a 17328->17329 17330 2f44686 17329->17330 17334 2f44779 17329->17334 17339 2f43e10 17330->17339 17332 2f446a5 17335 2f4479d 17334->17335 17343 2f44888 17335->17343 17347 2f44878 17335->17347 17340 2f43e1b 17339->17340 17355 2f45ca4 17340->17355 17342 2f46fed 17342->17332 17345 2f448af 17343->17345 17344 2f4498c 17344->17344 17345->17344 17351 2f44248 17345->17351 17349 2f448af 17347->17349 17348 2f4498c 17348->17348 17349->17348 17350 2f44248 CreateActCtxA 17349->17350 17350->17348 17352 2f45918 CreateActCtxA 17351->17352 17354 2f459db 17352->17354 17356 2f45caf 17355->17356 17359 2f45cc4 17356->17359 17358 2f4710d 17358->17342 17360 2f45ccf 17359->17360 17363 2f45cf4 17360->17363 17362 2f471e2 17362->17358 17364 2f45cff 17363->17364 17367 2f45d24 17364->17367 17366 2f472e5 17366->17362 17368 2f45d2f 17367->17368 17370 2f485eb 17368->17370 17378 2f4a560 17368->17378 17394 2f4a988 17368->17394 17406 2f4a448 17368->17406 17422 2f4a438 17368->17422 17438 2f4a998 17368->17438 17369 2f48629 17369->17366 17370->17369 17450 2f4cd81 17370->17450 17456 2f4cd90 17370->17456 17379 2f4a582 17378->17379 17380 2f4a5e8 17378->17380 17379->17380 17381 2f4a560 2 API calls 17379->17381 17380->17370 17383 2f4a7ef 17381->17383 17382 2f4a942 17382->17370 17383->17382 17385 2f4a9cb 17383->17385 17466 2f48304 17383->17466 17386 2f4a448 2 API calls 17385->17386 17387 2f4aa5b 17386->17387 17462 2f49b00 17387->17462 17389 2f49b00 2 API calls 17393 2f4abdb 17389->17393 17390 2f4aae8 17391 2f4a448 2 API calls 17390->17391 17392 2f4ab38 17390->17392 17391->17392 17392->17389 17392->17393 17393->17370 17395 2f4a9b3 17394->17395 17396 2f48304 2 API calls 17395->17396 17397 2f4a9cb 17395->17397 17396->17397 17398 2f4a448 2 API calls 17397->17398 17399 2f4aa5b 17398->17399 17400 2f49b00 2 API calls 17399->17400 17401 2f4aae8 17400->17401 17403 2f4a448 2 API calls 17401->17403 17405 2f4ab38 17401->17405 17402 2f49b00 2 API calls 17404 2f4abdb 17402->17404 17403->17405 17404->17370 17405->17402 17405->17404 17407 2f4a480 17406->17407 17408 2f4a4d5 17407->17408 17409 2f4a560 2 API calls 17407->17409 17408->17370 17411 2f4a7ef 17409->17411 17410 2f4a942 17410->17370 17411->17410 17412 2f48304 2 API calls 17411->17412 17413 2f4a9cb 17411->17413 17412->17413 17414 2f4a448 2 API calls 17413->17414 17415 2f4aa5b 17414->17415 17416 2f49b00 2 API calls 17415->17416 17418 2f4aae8 17416->17418 17417 2f49b00 2 API calls 17420 2f4abdb 17417->17420 17419 2f4a448 2 API calls 17418->17419 17421 2f4ab38 17418->17421 17419->17421 17420->17370 17421->17417 17421->17420 17423 2f4a480 17422->17423 17424 2f4a4d5 17423->17424 17425 2f4a560 2 API calls 17423->17425 17424->17370 17427 2f4a7ef 17425->17427 17426 2f4a942 17426->17370 17427->17426 17428 2f48304 2 API calls 17427->17428 17429 2f4a9cb 17427->17429 17428->17429 17430 2f4a448 2 API calls 17429->17430 17431 2f4aa5b 17430->17431 17432 2f49b00 2 API calls 17431->17432 17434 2f4aae8 17432->17434 17433 2f49b00 2 API calls 17436 2f4abdb 17433->17436 17435 2f4a448 2 API calls 17434->17435 17437 2f4ab38 17434->17437 17435->17437 17436->17370 17437->17433 17437->17436 17439 2f4a9b3 17438->17439 17440 2f48304 2 API calls 17439->17440 17441 2f4a9cb 17439->17441 17440->17441 17442 2f4a448 2 API calls 17441->17442 17443 2f4aa5b 17442->17443 17444 2f49b00 2 API calls 17443->17444 17446 2f4aae8 17444->17446 17445 2f49b00 2 API calls 17448 2f4abdb 17445->17448 17447 2f4a448 2 API calls 17446->17447 17449 2f4ab38 17446->17449 17447->17449 17448->17370 17449->17445 17449->17448 17451 2f4cd91 17450->17451 17452 2f4cdd5 17451->17452 17477 2f4d060 17451->17477 17481 2f4d0b9 17451->17481 17486 2f4d050 17451->17486 17452->17369 17458 2f4cdb1 17456->17458 17457 2f4cdd5 17457->17369 17458->17457 17459 2f4d060 2 API calls 17458->17459 17460 2f4d050 2 API calls 17458->17460 17461 2f4d0b9 2 API calls 17458->17461 17459->17457 17460->17457 17461->17457 17463 2f49b0b 17462->17463 17464 2f4cc23 17463->17464 17465 2f4a448 2 API calls 17463->17465 17464->17390 17465->17464 17467 2f48309 17466->17467 17469 2f485eb 17467->17469 17470 2f4a560 2 API calls 17467->17470 17471 2f4a448 2 API calls 17467->17471 17472 2f4a438 2 API calls 17467->17472 17473 2f4a998 2 API calls 17467->17473 17474 2f4a988 2 API calls 17467->17474 17468 2f48629 17468->17385 17469->17468 17475 2f4cd90 2 API calls 17469->17475 17476 2f4cd81 2 API calls 17469->17476 17470->17469 17471->17469 17472->17469 17473->17469 17474->17469 17475->17468 17476->17468 17478 2f4d06d 17477->17478 17479 2f4d0a7 17478->17479 17490 2f4b348 17478->17490 17479->17452 17482 2f4d0ed 17481->17482 17483 2f4d078 17481->17483 17482->17452 17484 2f4d0a7 17483->17484 17485 2f4b348 2 API calls 17483->17485 17484->17452 17485->17484 17487 2f4d055 17486->17487 17488 2f4b348 2 API calls 17487->17488 17489 2f4d0a7 17487->17489 17488->17489 17489->17452 17491 2f4b353 17490->17491 17493 2f4ddc0 17491->17493 17494 2f4b42c 17491->17494 17493->17493 17495 2f4b437 17494->17495 17496 2f45d24 2 API calls 17495->17496 17497 2f4de2f 17496->17497 17498 2f4de3e 17497->17498 17505 2f4dea8 17497->17505 17511 2f4de98 17497->17511 17518 2f4d7ac 17498->17518 17500 2f4de58 17523 2f4d7bc 17500->17523 17502 2f4de5f 17502->17493 17508 2f4ded6 17505->17508 17506 2f4dfa7 17507 2f4d7bc KiUserCallbackDispatcher 17506->17507 17509 2f4e013 17506->17509 17507->17509 17508->17506 17508->17509 17510 2f4dfa2 KiUserCallbackDispatcher 17508->17510 17510->17506 17512 2f4de64 17511->17512 17515 2f4de9e 17511->17515 17512->17498 17513 2f4dfa7 17514 2f4d7bc KiUserCallbackDispatcher 17513->17514 17517 2f4e013 17513->17517 17514->17517 17515->17513 17516 2f4dfa2 KiUserCallbackDispatcher 17515->17516 17515->17517 17516->17513 17521 2f4d7b7 17518->17521 17519 2f4da4c KiUserCallbackDispatcher KiUserCallbackDispatcher 17520 2f4efc4 17519->17520 17520->17500 17521->17519 17522 2f4efc9 17521->17522 17522->17500 17524 2f4d7c7 17523->17524 17525 2f4db40 KiUserCallbackDispatcher KiUserCallbackDispatcher 17524->17525 17526 2f4f5cf 17525->17526 17527 2f4a448 KiUserCallbackDispatcher KiUserCallbackDispatcher 17526->17527 17528 2f4f5e9 17527->17528 17528->17502 17529 2f4acc8 17532 2f4adb1 17529->17532 17530 2f4acd7 17533 2f4add1 17532->17533 17534 2f4adf4 17532->17534 17533->17534 17535 2f4aff8 GetModuleHandleW 17533->17535 17534->17530 17536 2f4b025 17535->17536 17536->17530 17537 2f4f598 17538 2f4f5cf 17537->17538 17542 2f4db40 17537->17542 17540 2f4a448 2 API calls 17538->17540 17541 2f4f5e9 17540->17541 17543 2f4db4b 17542->17543 17544 2f4a448 2 API calls 17543->17544 17546 2f4f741 17543->17546 17545 2f4f6bf 17544->17545 17545->17546 17547 2f4db40 2 API calls 17545->17547 17546->17538 17547->17545
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: d12646b8d6cf86f633bc9103e7e07cd6f28ced34a853be5b2c44f25c45429d83
                                                                                                                              • Instruction ID: 961a4f6b9ad1eddd64c60171ab7c53a0f4b7fcdd4adf0190e978ab3c86273ad0
                                                                                                                              • Opcode Fuzzy Hash: d12646b8d6cf86f633bc9103e7e07cd6f28ced34a853be5b2c44f25c45429d83
                                                                                                                              • Instruction Fuzzy Hash: 15217F31E02208DBDB08EFA9E5546EDFBF6AF8A750F14A029D515B7250DF75A840CB14

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02F4B016
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4139908857-0
                                                                                                                              • Opcode ID: b9f7f49052b1e860c57dd9269278be71d845ffeb4d786373375de3d6af71d2d9
                                                                                                                              • Instruction ID: 7bba2966b92b525fba38919069a8c4f2b204ee74746f523074e1c0991806aca9
                                                                                                                              • Opcode Fuzzy Hash: b9f7f49052b1e860c57dd9269278be71d845ffeb4d786373375de3d6af71d2d9
                                                                                                                              • Instruction Fuzzy Hash: 9B8168B0A00B059FDB24DF7AD45179ABBF1BF88344F00892ED196DBA50DBB5E845CB90

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 60 2f4590d-2f459d9 CreateActCtxA 62 2f459e2-2f45a3c 60->62 63 2f459db-2f459e1 60->63 70 2f45a3e-2f45a41 62->70 71 2f45a4b-2f45a4f 62->71 63->62 70->71 72 2f45a60-2f45a90 71->72 73 2f45a51-2f45a5d 71->73 77 2f45a42-2f45a47 72->77 78 2f45a92-2f45b14 72->78 73->72 77->71
                                                                                                                              APIs
                                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 02F459C9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Create
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2289755597-0
                                                                                                                              • Opcode ID: ed5a5489ac4494e1aee3adc9dd893494130df4d746e203db89cafde7a490da6a
                                                                                                                              • Instruction ID: 591a34b200b1bd158a55965453e4fa8ce61a2d19cb26d332fc1456fbf50dc9d1
                                                                                                                              • Opcode Fuzzy Hash: ed5a5489ac4494e1aee3adc9dd893494130df4d746e203db89cafde7a490da6a
                                                                                                                              • Instruction Fuzzy Hash: E141C1B1D00719CBEB24DFA9C884B9EFBB5BF49304F60816AD408AB251DBB56946CF50

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 81 2f44248-2f459d9 CreateActCtxA 84 2f459e2-2f45a3c 81->84 85 2f459db-2f459e1 81->85 92 2f45a3e-2f45a41 84->92 93 2f45a4b-2f45a4f 84->93 85->84 92->93 94 2f45a60-2f45a90 93->94 95 2f45a51-2f45a5d 93->95 99 2f45a42-2f45a47 94->99 100 2f45a92-2f45b14 94->100 95->94 99->93
                                                                                                                              APIs
                                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 02F459C9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Create
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2289755597-0
                                                                                                                              • Opcode ID: 579c28be02a73e06d8d855bdfdc954111dfd27770b27a9a1412d0821cd27f3f7
                                                                                                                              • Instruction ID: 6aa12b3253427136824c98b5381400e7f5ecf76cd8da1ef9950050e3912f88c5
                                                                                                                              • Opcode Fuzzy Hash: 579c28be02a73e06d8d855bdfdc954111dfd27770b27a9a1412d0821cd27f3f7
                                                                                                                              • Instruction Fuzzy Hash: 0D41F1B0D00719CBEB24DFA9C885B8EBBB5BF49304F60806AD408AB251DBB56945CF90

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 103 2f4d3b8-2f4d3bc 104 2f4d402-2f4d454 DuplicateHandle 103->104 105 2f4d3be-2f4d3ff 103->105 106 2f4d456-2f4d45c 104->106 107 2f4d45d-2f4d47a 104->107 105->104 106->107
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F4D386,?,?,?,?,?), ref: 02F4D447
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: 719051a60600f677ee210a457a44144a804712b9b71e493d416b23f95fdeb92f
                                                                                                                              • Instruction ID: 3232b1ef37b0da004ac643ad816418c42c485f2ae63a4d5f2d330c58210b8a22
                                                                                                                              • Opcode Fuzzy Hash: 719051a60600f677ee210a457a44144a804712b9b71e493d416b23f95fdeb92f
                                                                                                                              • Instruction Fuzzy Hash: D22155B5C00249DFDB10CFA9D984BDEBFF4AF48320F14851AE914A7250C378A941CF61

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 110 2f4b410-2f4d454 DuplicateHandle 112 2f4d456-2f4d45c 110->112 113 2f4d45d-2f4d47a 110->113 112->113
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F4D386,?,?,?,?,?), ref: 02F4D447
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: af7f3b02167bad97e6f9816c88f9c519b8f6a77f5e567ca4e4bc9eaf10168fbe
                                                                                                                              • Instruction ID: 07fdd51bac4806752b24ce88a662ae5770c812ccb4cf642da2370cb843e417e5
                                                                                                                              • Opcode Fuzzy Hash: af7f3b02167bad97e6f9816c88f9c519b8f6a77f5e567ca4e4bc9eaf10168fbe
                                                                                                                              • Instruction Fuzzy Hash: B321E5B5900248EFDB10CF9AD584ADEBBF8EB48350F14841AE914A7310D375A940CFA5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 116 2f4afb0-2f4aff0 117 2f4aff2-2f4aff5 116->117 118 2f4aff8-2f4b023 GetModuleHandleW 116->118 117->118 119 2f4b025-2f4b02b 118->119 120 2f4b02c-2f4b040 118->120 119->120
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 02F4B016
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4139908857-0
                                                                                                                              • Opcode ID: 3c03cfebf03c0b984944a328b1708e39b2fbfe715ac88fbeffb193c982a44214
                                                                                                                              • Instruction ID: a67ce0394ba0d23d0292d636211349fe9311787c588580b1f7727bcd65e19b3b
                                                                                                                              • Opcode Fuzzy Hash: 3c03cfebf03c0b984944a328b1708e39b2fbfe715ac88fbeffb193c982a44214
                                                                                                                              • Instruction Fuzzy Hash: C91110B6C00749CFDB24CF9AC444BDEFBF4EB88224F10841AD528A7210C3B9A545CFA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3873458875.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_11dd000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e40aacd65bb6dc82778733cd591b0e73f976f00e4d6ed3c139423d531fedc028
                                                                                                                              • Instruction ID: 856bb64a09be006506d002e518d4b645806eb3a5f743b01a603ac6d28cb3e844
                                                                                                                              • Opcode Fuzzy Hash: e40aacd65bb6dc82778733cd591b0e73f976f00e4d6ed3c139423d531fedc028
                                                                                                                              • Instruction Fuzzy Hash: 1D2128B2504204EFDF19DF94E9C0B66BF65FB84324F24C16DE9090B696C336E456CBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3873598177.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_11ed000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1c8bc9e08c85e0ec3c57f66b935ace0061a8bb10b3f2b54286263bcd49230669
                                                                                                                              • Instruction ID: 65a608a73f20da2c838bd4d29bf5fc04ec917270708afe6963b9e887becb3fa2
                                                                                                                              • Opcode Fuzzy Hash: 1c8bc9e08c85e0ec3c57f66b935ace0061a8bb10b3f2b54286263bcd49230669
                                                                                                                              • Instruction Fuzzy Hash: A021F571504744DFDF19DFA4E988B16BFA5FB84314F28C56DE80A4B246C336D447CA62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3873598177.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_11ed000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: f625da9c96bf8ef375a4567f0d8f4fb9eaaf34ae7783055688781e04ef6ae2fe
                                                                                                                              • Instruction ID: 07ee6e680fd392b157e8add177ff5aaa095e0c72ba52c121d4306bf76f8bbc3d
                                                                                                                              • Opcode Fuzzy Hash: f625da9c96bf8ef375a4567f0d8f4fb9eaaf34ae7783055688781e04ef6ae2fe
                                                                                                                              • Instruction Fuzzy Hash: 0C210BB5508B44DFDF19DFD4E5C4B26FBA5FB84324F24C569D8490B242C336D446CA62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3873598177.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_11ed000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0f047a83f5e3e18e91ced12460d0c3094e50953e495fb9371bee5acb6738da39
                                                                                                                              • Instruction ID: 80a22a7c7c39bfd90fb8beba1162894bd1e53dc6298bf9c33e12623f504cca41
                                                                                                                              • Opcode Fuzzy Hash: 0f047a83f5e3e18e91ced12460d0c3094e50953e495fb9371bee5acb6738da39
                                                                                                                              • Instruction Fuzzy Hash: 5321C275509780CFCB07CF64D994715BFB1EB46214F28C1DAD8498F6A3C33A980ACB62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3873458875.00000000011DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011DD000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_11dd000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                                                                                              • Instruction ID: c84e4b94938365ae97be1d0e9a4fc3648863e1cb573d0f38333b60d424c1cb6b
                                                                                                                              • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                                                                                              • Instruction Fuzzy Hash: 0111CD72404240DFCF16CF44D9C0B56BF61FB84224F24C2A9D8090A657C33AE456CBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3873598177.00000000011ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 011ED000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_11ed000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0087aa9c0370ffbcc44a91c72dac69a08dec4055da452c00f01411939cf63ad0
                                                                                                                              • Instruction ID: b8de646a73e481063992626ecb8e5a6a6f00bf0b3e04d50fb687bb1d315f6d76
                                                                                                                              • Opcode Fuzzy Hash: 0087aa9c0370ffbcc44a91c72dac69a08dec4055da452c00f01411939cf63ad0
                                                                                                                              • Instruction Fuzzy Hash: 1811E2B5508680DFCB16CF54E5C4B19FFA1FB84324F24C6A9D8490B643C33AD406CB92
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000000.00000002.3878035519.0000000002F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F40000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_0_2_2f40000_I1ahLI8fId.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: acc1fda61708bfcaebdab85d63255c34d42c96e6edd72a9e049296af01ea462c
                                                                                                                              • Instruction ID: d4b7ef665be1dab709d81869beefaef37fddfcaedce263b77e30cb25d3f39eee
                                                                                                                              • Opcode Fuzzy Hash: acc1fda61708bfcaebdab85d63255c34d42c96e6edd72a9e049296af01ea462c
                                                                                                                              • Instruction Fuzzy Hash: A6A18E32E106098FCF15DFB4C8805AEBBB2FF85344B15816AE905AB265DFB5E915CF40
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439774133.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_4e80000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: b470683141ff4bd305c3b9bfbfd20ae187cae4302855e02ca4a098d39d142293
                                                                                                                              • Instruction ID: 545dd7286f1b81741c853add33f02015a2769d23b8a2131578e14bbd875c038a
                                                                                                                              • Opcode Fuzzy Hash: b470683141ff4bd305c3b9bfbfd20ae187cae4302855e02ca4a098d39d142293
                                                                                                                              • Instruction Fuzzy Hash: 0B51CD35A04258DFCB09DBA4D4849AEFBB2EF89305F1480A9E548AB362C735ED45CB60
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439774133.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_4e80000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 18fd604bf5af9df70f747982f470012c49d9bc1379cec1f802bb541277e18271
                                                                                                                              • Instruction ID: b8f13b52a41aea239f9a38bb40e421059ff5148abeb4e417de1b094b1d2e1416
                                                                                                                              • Opcode Fuzzy Hash: 18fd604bf5af9df70f747982f470012c49d9bc1379cec1f802bb541277e18271
                                                                                                                              • Instruction Fuzzy Hash: 6191AD74A00205CFCB15CF58C494AAEFBB1FF88310B258699D959AB7A5C736FC51CBA0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439774133.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_4e80000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 31da84f5223aac65154b8089f3ea253e4209ca728a27f58545359e7d3ae030c0
                                                                                                                              • Instruction ID: e1746e7649189873d6960854157280176ea0372df947982a3bf9971ceed13fb1
                                                                                                                              • Opcode Fuzzy Hash: 31da84f5223aac65154b8089f3ea253e4209ca728a27f58545359e7d3ae030c0
                                                                                                                              • Instruction Fuzzy Hash: 28415B74A00605DFCB06DF58C598AAAF7B1FF88310B218699D919AB764C736FC51CFA0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439774133.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_4e80000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 9e4138825ce85cc0078b3fb53ba2902c005789664640bde8665b6694f7f9f4e4
                                                                                                                              • Instruction ID: e824f2d9c24d3d3a8ae9669447f6af8d1727ed9e8289689e432e31f8ef6712da
                                                                                                                              • Opcode Fuzzy Hash: 9e4138825ce85cc0078b3fb53ba2902c005789664640bde8665b6694f7f9f4e4
                                                                                                                              • Instruction Fuzzy Hash: 5D411A349042589FCB09DFA9D5809EDFBF2FF89310F2480A9E804AB361C735A945DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439774133.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_4e80000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8e53d4e55498a43c43f392a61328ccb0ee2e5e72162c1e5a12671322630e885d
                                                                                                                              • Instruction ID: fc00888bace5678fa09741de81549e7b5ce7fdf524a004dc8800ae4e93e4a3cb
                                                                                                                              • Opcode Fuzzy Hash: 8e53d4e55498a43c43f392a61328ccb0ee2e5e72162c1e5a12671322630e885d
                                                                                                                              • Instruction Fuzzy Hash: 0F411734A042589FCB09DFA9D5809ADFBF2FF89300F2480A9E804AB362C735A945DF50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439390481.000000000362D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0362D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_362d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: fca1ff92c3c6416d6f7a1b3079199d0187a0c7d1a17f4c551b2adf41c1187d8e
                                                                                                                              • Instruction ID: 7819d9686c8948fcb89670ee95a4d230852281ae838e05b5a04f24ba6f38ea6c
                                                                                                                              • Opcode Fuzzy Hash: fca1ff92c3c6416d6f7a1b3079199d0187a0c7d1a17f4c551b2adf41c1187d8e
                                                                                                                              • Instruction Fuzzy Hash: 6E016D7200D7D09FE7128B258D84752BFA8DF43224F0980CBD9948F2A3C2689C44CB72
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000002.00000002.1439390481.000000000362D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0362D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_2_2_362d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: e69205805d0e774ba29ca9f544ffa5ace5bbf3b9f43ea6acabc1aaa2259703da
                                                                                                                              • Instruction ID: 26996f33e1a39306f89f645aff8a41c3b6e85722f0a0550b8d76856f5f7f4262
                                                                                                                              • Opcode Fuzzy Hash: e69205805d0e774ba29ca9f544ffa5ace5bbf3b9f43ea6acabc1aaa2259703da
                                                                                                                              • Instruction Fuzzy Hash: 3C01F771404B14AAE7108E25D980B67FF98EF41760F08C059DD684E252C2789842CEB2

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:10.1%
                                                                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                                                                              Signature Coverage:0%
                                                                                                                              Total number of Nodes:175
                                                                                                                              Total number of Limit Nodes:20
                                                                                                                              execution_graph 26428 189acc8 26429 189acc9 26428->26429 26432 189adb1 26429->26432 26430 189acd7 26433 189adb4 26432->26433 26434 189adf4 26433->26434 26435 189adec 26433->26435 26439 189b414 26433->26439 26434->26430 26435->26434 26436 189aff8 GetModuleHandleW 26435->26436 26437 189b025 26436->26437 26437->26430 26441 189b425 26439->26441 26440 189b46e 26440->26435 26441->26440 26447 1895d24 26441->26447 26444 189de3e 26444->26435 26448 1895d2f 26447->26448 26449 1898629 26448->26449 26459 189cd81 26448->26459 26449->26444 26451 189de9b 26449->26451 26455 189dea8 26449->26455 26452 189dea8 26451->26452 26453 189dfa2 KiUserCallbackDispatcher 26452->26453 26454 189dfa7 26452->26454 26453->26454 26456 189ded6 26455->26456 26457 189dfa2 KiUserCallbackDispatcher 26456->26457 26458 189dfa7 26456->26458 26457->26458 26460 189cd84 26459->26460 26461 189cdd5 26460->26461 26464 189d050 26460->26464 26468 189d060 26460->26468 26461->26449 26465 189d055 26464->26465 26467 189d0a7 26465->26467 26472 189b348 26465->26472 26467->26461 26470 189d06d 26468->26470 26469 189d0a7 26469->26461 26470->26469 26471 189b348 2 API calls 26470->26471 26471->26469 26473 189b353 26472->26473 26475 189ddc0 26473->26475 26476 189b42c 26473->26476 26475->26475 26477 189b431 26476->26477 26478 1895d24 2 API calls 26477->26478 26479 189de2f 26478->26479 26480 189de3e 26479->26480 26481 189dea8 KiUserCallbackDispatcher 26479->26481 26482 189de9b KiUserCallbackDispatcher 26479->26482 26480->26475 26481->26480 26482->26480 26497 1894668 26498 1894669 26497->26498 26501 1894686 26498->26501 26503 1894779 26498->26503 26500 18946a5 26508 1893e10 26501->26508 26504 189477c 26503->26504 26512 1894888 26504->26512 26516 1894878 26504->26516 26509 1893e1b 26508->26509 26524 1895ca4 26509->26524 26511 1896fed 26511->26500 26514 1894889 26512->26514 26513 189498c 26513->26513 26514->26513 26520 1894248 26514->26520 26518 189487c 26516->26518 26517 189498c 26517->26517 26518->26517 26519 1894248 CreateActCtxA 26518->26519 26519->26517 26521 1895918 CreateActCtxA 26520->26521 26523 18959db 26521->26523 26523->26523 26525 1895caf 26524->26525 26528 1895cc4 26525->26528 26527 189710d 26527->26511 26529 1895ccf 26528->26529 26532 1895cf4 26529->26532 26531 18971e2 26531->26527 26533 1895cff 26532->26533 26534 1895d24 2 API calls 26533->26534 26535 18972e5 26534->26535 26535->26531 26573 189d178 26574 189d179 GetCurrentProcess 26573->26574 26576 189d209 26574->26576 26577 189d210 GetCurrentThread 26574->26577 26576->26577 26578 189d24d GetCurrentProcess 26577->26578 26579 189d246 26577->26579 26580 189d283 26578->26580 26579->26578 26581 189d2ab GetCurrentThreadId 26580->26581 26582 189d2dc 26581->26582 26536 6640040 26538 6640065 26536->26538 26537 664010e 26539 66402a3 26537->26539 26548 664e520 26537->26548 26554 664e4fc 26537->26554 26538->26537 26538->26539 26543 6640483 26538->26543 26545 6640495 26543->26545 26544 66404f2 26544->26537 26545->26537 26545->26544 26546 189dea8 KiUserCallbackDispatcher 26545->26546 26547 189de9b KiUserCallbackDispatcher 26545->26547 26546->26544 26547->26544 26552 664e585 26548->26552 26549 664c890 PeekMessageW 26549->26552 26550 664e9e8 WaitMessage 26550->26552 26552->26549 26552->26550 26553 664e5d2 26552->26553 26560 664c8dc 26552->26560 26553->26539 26558 664e585 26554->26558 26555 664c890 PeekMessageW 26555->26558 26556 664e9e8 WaitMessage 26556->26558 26557 664c8dc DispatchMessageW 26557->26558 26558->26555 26558->26556 26558->26557 26559 664e5d2 26558->26559 26559->26539 26561 664f288 DispatchMessageW 26560->26561 26562 664f2f4 26561->26562 26562->26552 26563 6641f80 26564 6641f90 26563->26564 26568 6641fb0 26564->26568 26571 6641fb8 SendMessageW 26564->26571 26565 6641fa1 26569 6641fb8 SendMessageW 26568->26569 26570 6642024 26569->26570 26570->26565 26572 6642024 26571->26572 26572->26565 26583 6640b50 26584 6640b55 26583->26584 26585 6640b73 26584->26585 26588 6646800 26584->26588 26594 6646810 26584->26594 26589 6646810 26588->26589 26592 664683d 26589->26592 26600 66455b8 26589->26600 26591 6646883 26591->26585 26592->26591 26593 66455b8 OleInitialize 26592->26593 26593->26591 26595 664683d 26594->26595 26596 664682a 26594->26596 26598 6646883 26595->26598 26599 66455b8 OleInitialize 26595->26599 26597 66455b8 OleInitialize 26596->26597 26597->26595 26598->26585 26599->26598 26601 66455c3 26600->26601 26602 66468ae 26601->26602 26605 66468e8 26601->26605 26611 66468d8 26601->26611 26602->26592 26606 6646bf0 26605->26606 26607 6646910 26605->26607 26606->26602 26608 6646919 26607->26608 26617 6645654 26607->26617 26608->26602 26610 664693c 26612 6646bf0 26611->26612 26613 6646910 26611->26613 26612->26602 26614 6646919 26613->26614 26615 6645654 OleInitialize 26613->26615 26614->26602 26616 664693c 26615->26616 26619 664565f 26617->26619 26618 6646c33 26618->26610 26619->26618 26621 6645670 26619->26621 26622 6646c68 OleInitialize 26621->26622 26623 6646ccc 26622->26623 26623->26618 26483 189d3c0 26484 189d3c1 DuplicateHandle 26483->26484 26486 189d456 26484->26486 26624 6640858 26625 6640891 26624->26625 26626 6640ac5 26625->26626 26629 6643780 26625->26629 26634 6643771 26625->26634 26631 6643785 26629->26631 26630 664378e 26630->26626 26631->26630 26632 66437c3 SendMessageW 26631->26632 26633 6643844 26632->26633 26633->26626 26636 6643780 26634->26636 26635 664378e 26635->26626 26636->26635 26637 66437c3 SendMessageW 26636->26637 26638 6643844 26637->26638 26638->26626 26639 66419d8 26640 6641a20 SetWindowTextW 26639->26640 26641 6641a1a 26639->26641 26642 6641a51 26640->26642 26641->26640 26487 664503b 26488 664504e 26487->26488 26492 6645320 PostMessageW 26488->26492 26494 66452f1 26488->26494 26489 6645071 26493 664538c 26492->26493 26493->26489 26495 6645320 PostMessageW 26494->26495 26496 664538c 26495->26496 26496->26489

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 47 664e520-664e583 48 664e585-664e5af 47->48 49 664e5b2-664e5d0 47->49 48->49 54 664e5d2-664e5d4 49->54 55 664e5d9-664e610 49->55 56 664ea92-664eaa7 54->56 59 664e616-664e62a 55->59 60 664ea41 55->60 61 664e62c-664e656 59->61 62 664e659-664e678 59->62 63 664ea46-664ea5c 60->63 61->62 69 664e690-664e692 62->69 70 664e67a-664e680 62->70 63->56 74 664e694-664e6ac 69->74 75 664e6b1-664e6ba 69->75 72 664e684-664e686 70->72 73 664e682 70->73 72->69 73->69 74->63 76 664e6c2-664e6c9 75->76 77 664e6d3-664e6da 76->77 78 664e6cb-664e6d1 76->78 80 664e6e4 77->80 81 664e6dc-664e6e2 77->81 79 664e6e7-664e704 call 664c890 78->79 84 664e859-664e85d 79->84 85 664e70a-664e711 79->85 80->79 81->79 86 664e863-664e867 84->86 87 664ea2c-664ea3f 84->87 85->60 88 664e717-664e754 85->88 89 664e881-664e88a 86->89 90 664e869-664e87c 86->90 87->63 96 664ea22-664ea26 88->96 97 664e75a-664e75f 88->97 91 664e88c-664e8b6 89->91 92 664e8b9-664e8c0 89->92 90->63 91->92 94 664e8c6-664e8cd 92->94 95 664e95f-664e974 92->95 99 664e8fc-664e91e 94->99 100 664e8cf-664e8f9 94->100 95->96 110 664e97a-664e97c 95->110 96->76 96->87 101 664e791-664e7a6 call 664c8b4 97->101 102 664e761-664e76f call 664c89c 97->102 99->95 137 664e920-664e92a 99->137 100->99 108 664e7ab-664e7af 101->108 102->101 112 664e771-664e78f call 664c8a8 102->112 113 664e820-664e82d 108->113 114 664e7b1-664e7c3 call 664c8c0 108->114 115 664e97e-664e9b7 110->115 116 664e9c9-664e9e6 call 664c890 110->116 112->108 113->96 129 664e833-664e83d call 664c8d0 113->129 140 664e7c5-664e7f5 114->140 141 664e803-664e81b 114->141 132 664e9c0-664e9c7 115->132 133 664e9b9-664e9bf 115->133 116->96 128 664e9e8-664ea14 WaitMessage 116->128 134 664ea16 128->134 135 664ea1b 128->135 143 664e84c-664e854 call 664e10c 129->143 144 664e83f-664e842 call 664c8dc 129->144 132->96 133->132 134->135 135->96 148 664e942-664e95d 137->148 149 664e92c-664e932 137->149 155 664e7f7 140->155 156 664e7fc 140->156 141->63 143->96 151 664e847 144->151 148->95 148->137 153 664e934 149->153 154 664e936-664e938 149->154 151->96 153->148 154->148 155->156 156->141
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DispatchMessage
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2061451462-0
                                                                                                                              • Opcode ID: 6feed19404d97cedf6e495ae1a9201fb767ef2e3c9d06d97423d4cc42fe7e1f7
                                                                                                                              • Instruction ID: 4b64080cd3048bd1c891527ffea9c17e4258f60df8b242e586b820d2be5993e7
                                                                                                                              • Opcode Fuzzy Hash: 6feed19404d97cedf6e495ae1a9201fb767ef2e3c9d06d97423d4cc42fe7e1f7
                                                                                                                              • Instruction Fuzzy Hash: 1AF13930E00209DFEB54EFA9C848B9DBBF2FF88304F158559E405AB395DB76A945CB81

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 0189D1F6
                                                                                                                              • GetCurrentThread.KERNEL32 ref: 0189D233
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 0189D270
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 0189D2C9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Current$ProcessThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2063062207-0
                                                                                                                              • Opcode ID: 991b5e72ee46abdc17ecfe59502135f9458882369a18c7fd1d04b89bbe6dbd4b
                                                                                                                              • Instruction ID: 9227dba0ddde54720e267985fb7332a8688947c46a7a20e8ae9074f3ffc76e43
                                                                                                                              • Opcode Fuzzy Hash: 991b5e72ee46abdc17ecfe59502135f9458882369a18c7fd1d04b89bbe6dbd4b
                                                                                                                              • Instruction Fuzzy Hash: DE517BB0900749CFEB14CFA9D5487AEBBF2FF88314F248459E509AB361D734A944CB66

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 0189D1F6
                                                                                                                              • GetCurrentThread.KERNEL32 ref: 0189D233
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 0189D270
                                                                                                                              • GetCurrentThreadId.KERNEL32 ref: 0189D2C9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Current$ProcessThread
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2063062207-0
                                                                                                                              • Opcode ID: 0a9d3c6a8a86d446a0a907e5a7222a9d70c9d78c6e47b55accc762c1d3962e13
                                                                                                                              • Instruction ID: dd787e95675386f0211709647f8af7b3f0fb037881085d1d8b29e271d433bf76
                                                                                                                              • Opcode Fuzzy Hash: 0a9d3c6a8a86d446a0a907e5a7222a9d70c9d78c6e47b55accc762c1d3962e13
                                                                                                                              • Instruction Fuzzy Hash: 415178B0900709CFEB14CFAAD548BAEBBF2FF88310F248459E409A7350D734A944CB66

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 159 189adb1-189adb2 160 189adb9-189adba 159->160 161 189adb4-189adb8 159->161 162 189adbc-189adbe 160->162 163 189adc1-189adc4 160->163 161->160 164 189adc5-189adcf 162->164 165 189adc0 162->165 163->164 166 189adfb-189adff 164->166 167 189add1-189adde call 1899d10 164->167 165->163 169 189ae01-189ae0b 166->169 170 189ae13-189ae54 166->170 172 189ade0 167->172 173 189adf4 167->173 169->170 176 189ae61-189ae6f 170->176 177 189ae56-189ae5e 170->177 226 189ade6 call 189b448 172->226 227 189ade6 call 189b458 172->227 228 189ade6 call 189b414 172->228 173->166 178 189ae71-189ae76 176->178 179 189ae93-189ae95 176->179 177->176 181 189ae78-189ae7f call 1899d1c 178->181 182 189ae81 178->182 184 189ae98-189ae9f 179->184 180 189adec-189adee 180->173 183 189af30-189afaa 180->183 186 189ae83-189ae91 181->186 182->186 215 189afac 183->215 216 189afb1-189afb4 183->216 187 189aeac-189aeb3 184->187 188 189aea1-189aea9 184->188 186->184 190 189aec0-189aec9 call 1899d2c 187->190 191 189aeb5-189aebd 187->191 188->187 196 189aecb-189aed3 190->196 197 189aed6-189aedb 190->197 191->190 196->197 198 189aef9-189af06 197->198 199 189aedd-189aee4 197->199 206 189af29-189af2f 198->206 207 189af08-189af26 198->207 199->198 201 189aee6-189aef6 call 1899d3c call 1899d4c 199->201 201->198 207->206 217 189afd8-189aff0 215->217 218 189afae 215->218 219 189afb5-189afd6 216->219 221 189aff8-189b023 GetModuleHandleW 217->221 222 189aff2-189aff5 217->222 218->219 220 189afb0 218->220 219->217 220->216 223 189b02c-189b040 221->223 224 189b025-189b02b 221->224 222->221 224->223 226->180 227->180 228->180
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 2955f7304d4d458cd2d9a9735a576bc055dd3c1a729b56f4f5095538333a98a3
                                                                                                                              • Instruction ID: 4193cec6ab51fdf8dd38ce50617e404963ef561da6bcabf6e516e5375a2ca542
                                                                                                                              • Opcode Fuzzy Hash: 2955f7304d4d458cd2d9a9735a576bc055dd3c1a729b56f4f5095538333a98a3
                                                                                                                              • Instruction Fuzzy Hash: BC817770A00B458FDB29DF6AD44079ABBF1FF88304F08892DD486DBA40D775EA49CB91

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 229 189590d-189590e 230 1895910-1895912 229->230 231 1895915 229->231 232 1895919-18959d9 CreateActCtxA 230->232 233 1895914 230->233 231->232 235 18959db-18959e1 232->235 236 18959e2-1895a3c 232->236 233->231 235->236 243 1895a4b-1895a4f 236->243 244 1895a3e-1895a41 236->244 245 1895a51-1895a5d 243->245 246 1895a60 243->246 244->243 245->246 248 1895a61 246->248 248->248
                                                                                                                              APIs
                                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 018959C9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Create
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2289755597-0
                                                                                                                              • Opcode ID: 22c60f70b9e5658f2817ae1b3cdc080d8bcaa69fda710fae95268caec4c2a051
                                                                                                                              • Instruction ID: daae30d79286641606b93ba4f61706c66b489b150a8922db93af5353f7399145
                                                                                                                              • Opcode Fuzzy Hash: 22c60f70b9e5658f2817ae1b3cdc080d8bcaa69fda710fae95268caec4c2a051
                                                                                                                              • Instruction Fuzzy Hash: F641E2B0D00719CBEF25DFAAC88479DBBF5BF49304F24806AD408AB251DB756A45CF50

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 249 1894248-18959d9 CreateActCtxA 253 18959db-18959e1 249->253 254 18959e2-1895a3c 249->254 253->254 261 1895a4b-1895a4f 254->261 262 1895a3e-1895a41 254->262 263 1895a51-1895a5d 261->263 264 1895a60 261->264 262->261 263->264 266 1895a61 264->266 266->266
                                                                                                                              APIs
                                                                                                                              • CreateActCtxA.KERNEL32(?), ref: 018959C9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Create
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2289755597-0
                                                                                                                              • Opcode ID: db815c9905487376218ac20ce39c35b335db415aadef18faebcb9b6d7947a608
                                                                                                                              • Instruction ID: be432266bb09c8eb4e238def2dfe23af7d7f779d0c17b9c9f18144d80cdb556a
                                                                                                                              • Opcode Fuzzy Hash: db815c9905487376218ac20ce39c35b335db415aadef18faebcb9b6d7947a608
                                                                                                                              • Instruction Fuzzy Hash: 3841C1B0C00719CBEB25DFAAC884B9EBBF5BF49304F64806AD408AB251DB756945CF90

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 267 6643780-664378c 269 6643792-6643842 SendMessageW 267->269 270 664378e-6643791 267->270 276 6643844-664384a 269->276 277 664384b-664385f 269->277 276->277
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(?,?,?,?), ref: 06643835
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3850602802-0
                                                                                                                              • Opcode ID: 023d88af9d02ecea9159cad118d5e9558bb1f5feca88f386127284a7c4d08347
                                                                                                                              • Instruction ID: 3313fda283f1062887d24c8a7dbd1d5298e6e2fb097b76f5e9ef81e3ce0c9f13
                                                                                                                              • Opcode Fuzzy Hash: 023d88af9d02ecea9159cad118d5e9558bb1f5feca88f386127284a7c4d08347
                                                                                                                              • Instruction Fuzzy Hash: 302166B5900348DFCB10DFAAD884B9EBFF4EB48210F14845AE419A7750C775A980CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 279 189d3b8-189d3ba 280 189d3bc 279->280 281 189d3c1-189d3c4 279->281 282 189d3be 280->282 283 189d402-189d454 DuplicateHandle 280->283 284 189d3c5-189d3ff 281->284 282->284 285 189d3c0 282->285 286 189d45d-189d47a 283->286 287 189d456-189d45c 283->287 284->283 285->281 287->286
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0189D447
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: fd3d268e154451104e9ffa79ebc10d87c3610dedbc19b4b404f4a1d83e849c80
                                                                                                                              • Instruction ID: 7b7b763fccc96599c05940c3735ab29e26e75b639b30f74150106619cff010dc
                                                                                                                              • Opcode Fuzzy Hash: fd3d268e154451104e9ffa79ebc10d87c3610dedbc19b4b404f4a1d83e849c80
                                                                                                                              • Instruction Fuzzy Hash: 453135B5800249DFDF10CFAAD884ADEFFF4EB49320F18811AE954A7251D374A941DFA5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 290 66419a8-6641a18 293 6641a20-6641a4f SetWindowTextW 290->293 294 6641a1a-6641a1d 290->294 295 6641a51-6641a57 293->295 296 6641a58-6641a79 293->296 294->293 295->296
                                                                                                                              APIs
                                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 06641A42
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: TextWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 530164218-0
                                                                                                                              • Opcode ID: 8d04f2d81b810dd8b08a19e462567542c047e9a9627f5c2b4bf2911e94a35b3d
                                                                                                                              • Instruction ID: f9a04e6ecad2c5a1f6b89ce1c76c9925ab3edb5531dd4a7e3ab97a1c69457d42
                                                                                                                              • Opcode Fuzzy Hash: 8d04f2d81b810dd8b08a19e462567542c047e9a9627f5c2b4bf2911e94a35b3d
                                                                                                                              • Instruction Fuzzy Hash: 69215C758093888FDB15CFAAD8547DEBFF0AF4A210F04809AD454AB352C3385549CFA6

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 298 66452f1-664538a PostMessageW 300 6645393-66453b4 298->300 301 664538c-6645392 298->301 301->300
                                                                                                                              APIs
                                                                                                                              • PostMessageW.USER32(?,?,?,?), ref: 0664537D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessagePost
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 410705778-0
                                                                                                                              • Opcode ID: dc75571e1417c99061296c646619ff8d19706476596d9670417b382f3b3c74a5
                                                                                                                              • Instruction ID: ed31d2744220fd221de8a995a4ea8fe4bb4f05a1618936d79ed2402584291ff5
                                                                                                                              • Opcode Fuzzy Hash: dc75571e1417c99061296c646619ff8d19706476596d9670417b382f3b3c74a5
                                                                                                                              • Instruction Fuzzy Hash: 052133B1800349DFDB11CF9AC885BEEBBF8EB49320F14845AE855A7251D378A954CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 303 664eae0-664eae6 305 664eae8-664eb5d PeekMessageW 303->305 306 664eb66-664eb87 305->306 307 664eb5f-664eb65 305->307 307->306
                                                                                                                              APIs
                                                                                                                              • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0664E702,00000000,00000000,041E4220,03200900), ref: 0664EB50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessagePeek
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2222842502-0
                                                                                                                              • Opcode ID: b409f79eaa670b0e122f8d84bbc3c21a0543d0723f2f9805f072b103c9ac85f6
                                                                                                                              • Instruction ID: acdcd1e04894f01b589c4dc75feefb9ce9e3996cc82af4331fae944cc36c8fbd
                                                                                                                              • Opcode Fuzzy Hash: b409f79eaa670b0e122f8d84bbc3c21a0543d0723f2f9805f072b103c9ac85f6
                                                                                                                              • Instruction Fuzzy Hash: 282165B5C04349DFDB10DF9AD844ADEBBF8FB09310F00802AE964A7252C379A944CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 309 189d3c0-189d454 DuplicateHandle 313 189d45d-189d47a 309->313 314 189d456-189d45c 309->314 314->313
                                                                                                                              APIs
                                                                                                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0189D447
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DuplicateHandle
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3793708945-0
                                                                                                                              • Opcode ID: a5d6286b456ac7a43eccd8abb0c5f2e31551438ba1858eea71e11e374765ffd2
                                                                                                                              • Instruction ID: 22dc0c8f777e850a9a76e127f5f83f0d61f80a55085b7fbd1f79d0858b821eb0
                                                                                                                              • Opcode Fuzzy Hash: a5d6286b456ac7a43eccd8abb0c5f2e31551438ba1858eea71e11e374765ffd2
                                                                                                                              • Instruction Fuzzy Hash: CB21C4B5900248DFDB10CFAAD884ADEBBF8FB48310F14841AE914A7350D375A944CFA5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 317 664c890-664eb5d PeekMessageW 319 664eb66-664eb87 317->319 320 664eb5f-664eb65 317->320 320->319
                                                                                                                              APIs
                                                                                                                              • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,0664E702,00000000,00000000,041E4220,03200900), ref: 0664EB50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessagePeek
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2222842502-0
                                                                                                                              • Opcode ID: 5f576c1741def5d94ea90dc7b9afb8780c9536d45b3ed15acb6acd274a036116
                                                                                                                              • Instruction ID: e344b7b4e42c0df3fae3f605ce3935d1022191ed923212832d79b987f9f21090
                                                                                                                              • Opcode Fuzzy Hash: 5f576c1741def5d94ea90dc7b9afb8780c9536d45b3ed15acb6acd274a036116
                                                                                                                              • Instruction Fuzzy Hash: DD1117B1C00249DFDB10DF9AD444BDEBBF4FB48310F10842AE519A3241C375A544CFA5

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 322 66419d8-6641a18 323 6641a20-6641a4f SetWindowTextW 322->323 324 6641a1a-6641a1d 322->324 325 6641a51-6641a57 323->325 326 6641a58-6641a79 323->326 324->323 325->326
                                                                                                                              APIs
                                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 06641A42
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: TextWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 530164218-0
                                                                                                                              • Opcode ID: 627fa65353fcdc2dd4be1ac6ec5bd692e09fb5c1346e739a551564142aa77e54
                                                                                                                              • Instruction ID: f3a3e4a92a81ce182b6d000dd722bcf064e4cfc02b0b23281b1fe8888ec968f8
                                                                                                                              • Opcode Fuzzy Hash: 627fa65353fcdc2dd4be1ac6ec5bd692e09fb5c1346e739a551564142aa77e54
                                                                                                                              • Instruction Fuzzy Hash: 831106B1C006498FDB14CF9AC444BDEFBF4AF49310F14841AD459A7240D374A545CFA1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 328 6645320-664538a PostMessageW 329 6645393-66453b4 328->329 330 664538c-6645392 328->330 330->329
                                                                                                                              APIs
                                                                                                                              • PostMessageW.USER32(?,?,?,?), ref: 0664537D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessagePost
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 410705778-0
                                                                                                                              • Opcode ID: 62f982fa5d31a42014385d15f174ef812097e32e762af5f2eec891d4b885d211
                                                                                                                              • Instruction ID: 97e063f37a60e61bd09a5e4784f9bc81775e427b70737a9a065b4d2e735fbbf5
                                                                                                                              • Opcode Fuzzy Hash: 62f982fa5d31a42014385d15f174ef812097e32e762af5f2eec891d4b885d211
                                                                                                                              • Instruction Fuzzy Hash: ED11F5B5800349DFDB10DF9AC845BDEBBF8EB48320F148419E559A3251D379A944CFA5
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(?,?,?,?), ref: 06642015
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3850602802-0
                                                                                                                              • Opcode ID: 78bde13d32f6f4c330f63106d12ec9e067a725aa9a7cfdf107affd6a22948c25
                                                                                                                              • Instruction ID: ed4a2c23f7af25d9936e4841f6c468f9de645c99df98f992489acc621de64d2d
                                                                                                                              • Opcode Fuzzy Hash: 78bde13d32f6f4c330f63106d12ec9e067a725aa9a7cfdf107affd6a22948c25
                                                                                                                              • Instruction Fuzzy Hash: 921110B58002489FDB20DF9AD884BDEBBF8FB48310F20841AE818A7240C375A944CFA1
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 0189B016
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3877677707.0000000001890000.00000040.00000800.00020000.00000000.sdmp, Offset: 01890000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_1890000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4139908857-0
                                                                                                                              • Opcode ID: 084ababcb2f28716fe0abb67b651b4df132ec343480eaf80c4cc02a6a54eb164
                                                                                                                              • Instruction ID: 24bf9400fc48c11a67eaa4c1c7c32ec1dbfa3c1fae01ce7bb617ad6018d02183
                                                                                                                              • Opcode Fuzzy Hash: 084ababcb2f28716fe0abb67b651b4df132ec343480eaf80c4cc02a6a54eb164
                                                                                                                              • Instruction Fuzzy Hash: 7811DFB5C00649CFDB24CF9AD444B9EFBF4AB89310F14841AD529A7250C375A645CFA1
                                                                                                                              APIs
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 06646CBD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Initialize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2538663250-0
                                                                                                                              • Opcode ID: bc4e02a2a622fd1a7cf7d0fcf5bd5ca928c03fdd79e29ca5bd9017bfe9ed802e
                                                                                                                              • Instruction ID: 77141292033af27899525caeee41298203bb5048ef171cacf40ca490f19d1453
                                                                                                                              • Opcode Fuzzy Hash: bc4e02a2a622fd1a7cf7d0fcf5bd5ca928c03fdd79e29ca5bd9017bfe9ed802e
                                                                                                                              • Instruction Fuzzy Hash: 981103B5800748DFDB20DF9AD584B9EBBF8EB49610F108459D519A7300D379A944CFA5
                                                                                                                              APIs
                                                                                                                              • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0664E847), ref: 0664F2E5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DispatchMessage
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2061451462-0
                                                                                                                              • Opcode ID: 18118774a2d6170a22950241094dcca3e369e6cc269c9f3830a38d2166f65ade
                                                                                                                              • Instruction ID: 05563dc82522ae06eedfc9ea9972cd8acf26819a313a64aa3de2c889d1d17bf8
                                                                                                                              • Opcode Fuzzy Hash: 18118774a2d6170a22950241094dcca3e369e6cc269c9f3830a38d2166f65ade
                                                                                                                              • Instruction Fuzzy Hash: C911E0B5C04689CFDB60DF9AD444B9EFBF4EB88210F10852AE429A7300D375A544CFA5
                                                                                                                              APIs
                                                                                                                              • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,0664E847), ref: 0664F2E5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DispatchMessage
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2061451462-0
                                                                                                                              • Opcode ID: 77041ee8aea733fb50687853b47f64e8a59a6ee50c8eb90b88259c4095c176a8
                                                                                                                              • Instruction ID: e625310c4e5daf1d438bccd2cca2a8ff423311bf89379561102e52b8647f9e01
                                                                                                                              • Opcode Fuzzy Hash: 77041ee8aea733fb50687853b47f64e8a59a6ee50c8eb90b88259c4095c176a8
                                                                                                                              • Instruction Fuzzy Hash: FB11FEB5C04689DFCB24DF9AE844BCEBBF4EB88310F10841AE429A7300D378A544CFA5
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(?,?,?,?), ref: 06642015
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3850602802-0
                                                                                                                              • Opcode ID: ffb6a398f06a5277c922b8024b72fb557050dc88ec08d242317d6f920f54e413
                                                                                                                              • Instruction ID: f9721dc68cce87d5dee85d6a2344bf99b7411559b800d83d3ab58e3961ca18d7
                                                                                                                              • Opcode Fuzzy Hash: ffb6a398f06a5277c922b8024b72fb557050dc88ec08d242317d6f920f54e413
                                                                                                                              • Instruction Fuzzy Hash: F411D0B5800349DFDB20DF9AD885BDEBBF8EB48724F20845AE518A7210C375A944CFA1
                                                                                                                              APIs
                                                                                                                              • OleInitialize.OLE32(00000000), ref: 06646CBD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3893866031.0000000006640000.00000040.00000800.00020000.00000000.sdmp, Offset: 06640000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_6640000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Initialize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2538663250-0
                                                                                                                              • Opcode ID: 7dbecc7ed1890285994593900588d5cb9dc99cfc16ed3ac4835f467cce458d1a
                                                                                                                              • Instruction ID: 9940d5844da3d7dda2b2cae47a6abde6192f19bb9a1b34881ffdd95637e45040
                                                                                                                              • Opcode Fuzzy Hash: 7dbecc7ed1890285994593900588d5cb9dc99cfc16ed3ac4835f467cce458d1a
                                                                                                                              • Instruction Fuzzy Hash: ED1112B5C00748CFDB20DFAAD545BDEBBF4EB48210F24845AD818A7300C378A944CFA5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876853430.000000000183D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0183D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_183d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 4411060324783ccdf4673f8adf5017a68a497c3fabd43be74a923cab399fd42c
                                                                                                                              • Instruction ID: 0caf895510f26bb976c804ea191c3851a2850e6beadf0f36004766da9d21c871
                                                                                                                              • Opcode Fuzzy Hash: 4411060324783ccdf4673f8adf5017a68a497c3fabd43be74a923cab399fd42c
                                                                                                                              • Instruction Fuzzy Hash: E7214572500244EFDB01DF94D8C0B26BF65FBC8318F68C669E8098B287C336D516CAE2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876853430.000000000183D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0183D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_183d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 56b2e3e42dd9f6f60358e3ca44b3e18367e61f1cb9fa23f4382511302aee0a2a
                                                                                                                              • Instruction ID: d55615782ba10bffbf931d4c594021431217da3e641b7e2dfe9c8cf5ba01874a
                                                                                                                              • Opcode Fuzzy Hash: 56b2e3e42dd9f6f60358e3ca44b3e18367e61f1cb9fa23f4382511302aee0a2a
                                                                                                                              • Instruction Fuzzy Hash: A9214871500204DFDB01DF94D9C0B56BB65FBC4318F28C268E8098F246C33AE556CBE2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876996090.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_184d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 12520880b40dc9abb41bc43c82943726ab3e2e03c3b3fe99bcfe53d30656e2d9
                                                                                                                              • Instruction ID: af59078de4350729b052e7943950ecc463d45bbd6aa9ce41059dda305b191fdb
                                                                                                                              • Opcode Fuzzy Hash: 12520880b40dc9abb41bc43c82943726ab3e2e03c3b3fe99bcfe53d30656e2d9
                                                                                                                              • Instruction Fuzzy Hash: 0B213771504308DFDB15DFA4D8C0B16BB61FB94318F20C66DD8098B346CB3AD507CA62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876996090.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_184d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 9731b91dba38a1c5662409f22df06ec7fb8e215cb54e5df5d3d536e18f4b4835
                                                                                                                              • Instruction ID: b406712d121e778823de865ac221eeedd8bea58ea12131475a93116331ec1bc6
                                                                                                                              • Opcode Fuzzy Hash: 9731b91dba38a1c5662409f22df06ec7fb8e215cb54e5df5d3d536e18f4b4835
                                                                                                                              • Instruction Fuzzy Hash: 44213B7150434CDFDB11DF54D5C0B26FBA5FB94328F24C66DE8498B242D73AD506CA62
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876853430.000000000183D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0183D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_183d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                                                                                              • Instruction ID: 8bf65e6f982c670500c30fad215f8f9a9da344923b3cf28ed82327d89f86f4b6
                                                                                                                              • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                                                                                              • Instruction Fuzzy Hash: B011E172404240DFCB02CF54D9C0B56BF71FB84324F28C2A9D8094B657C33AE556CBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876853430.000000000183D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0183D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_183d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                                                                                              • Instruction ID: 81bd5624e2eecec6a96249f9a856828ba11cf0ef136cd4fa035b3b731a378777
                                                                                                                              • Opcode Fuzzy Hash: 0d1964494f132f00775c0e221f472ab769a33717f3edcd57285c8181465a4d2f
                                                                                                                              • Instruction Fuzzy Hash: AD11E172504280DFCB02CF54D9C0B16BF71FB84318F28C6A9E8094B657C33AD556CBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876996090.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_184d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                                                                                              • Instruction ID: 2d7ddacac56cdce42822e565bfc12cf977348aff29a4ef4ee0f4c104db6d254e
                                                                                                                              • Opcode Fuzzy Hash: a6f14a2633b0976cf55fba98dc8f49a251bcab79b87bdac7509de7911a20ab2c
                                                                                                                              • Instruction Fuzzy Hash: 6911BB75504284DFCB16CF54D5C4B15FFA2FB84314F24C6AAD8098B656C33AD54ACBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000A.00000002.3876996090.000000000184D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0184D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_10_2_184d000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0087aa9c0370ffbcc44a91c72dac69a08dec4055da452c00f01411939cf63ad0
                                                                                                                              • Instruction ID: e1655f7466fec34fe4f91426009c373d1aa78ed5fb3cd669c1957f2c021ec120
                                                                                                                              • Opcode Fuzzy Hash: 0087aa9c0370ffbcc44a91c72dac69a08dec4055da452c00f01411939cf63ad0
                                                                                                                              • Instruction Fuzzy Hash: 5B11EF76504684DFCB12CF14D5C4B19FFA1FB84324F28C6AAD8494B642C33AD50ACBA2
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1588854169.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_7470000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: _
                                                                                                                              • API String ID: 0-701932520
                                                                                                                              • Opcode ID: 6e69c353c2cda7807c1421092d03a5f9515eac7d3d0bcb48986c09cc9a0a84dc
                                                                                                                              • Instruction ID: fff64bbe005b1de6006c4fc2ba540866f0cdc8dbc432ad7fb7aa712716c89452
                                                                                                                              • Opcode Fuzzy Hash: 6e69c353c2cda7807c1421092d03a5f9515eac7d3d0bcb48986c09cc9a0a84dc
                                                                                                                              • Instruction Fuzzy Hash: 23124AB2B0434A8FDB259B79C8117EBBBA2AFC2211F1484ABD445CB751DB31D942C7A1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1561756050.0000000004500000.00000040.00000800.00020000.00000000.sdmp, Offset: 04500000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_4500000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 1f51f984c5372c87754db5055b80f082902657de75fd1ec360f5da322a075ab0
                                                                                                                              • Instruction ID: 9895fae3d58d1e044239a4012fc5a123f4f35edddb8c5dd8950f4520e2096572
                                                                                                                              • Opcode Fuzzy Hash: 1f51f984c5372c87754db5055b80f082902657de75fd1ec360f5da322a075ab0
                                                                                                                              • Instruction Fuzzy Hash: 52122C74A012099FDB15CF98D484AAEFBB2FF88310F25C159E845AB3A6D731ED41DB90
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1561756050.0000000004500000.00000040.00000800.00020000.00000000.sdmp, Offset: 04500000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_4500000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 94f7faec17957bf84dcb5dd436f89b4b0a9ecd0ae57b4bd11d00c5630c576ac7
                                                                                                                              • Instruction ID: 60098bed29a9d65a43e2a87e371ee0b6a0b7babc9e4fbd491a23c7678e1d1926
                                                                                                                              • Opcode Fuzzy Hash: 94f7faec17957bf84dcb5dd436f89b4b0a9ecd0ae57b4bd11d00c5630c576ac7
                                                                                                                              • Instruction Fuzzy Hash: 6881BF35A042489FCB05CFA9D4809EEFBF2FF89310B1480A9E544AB362C735ED55DB60
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1588854169.0000000007470000.00000040.00000800.00020000.00000000.sdmp, Offset: 07470000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_7470000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: bf98cc95e70cc46c2f7200656bc368b0595cfeb7301e6ba08f3ca7e48c859d82
                                                                                                                              • Instruction ID: 5b46eb69982f76059a00718c97e6ac4c6ca28eab76b77c03f65a539b403208f9
                                                                                                                              • Opcode Fuzzy Hash: bf98cc95e70cc46c2f7200656bc368b0595cfeb7301e6ba08f3ca7e48c859d82
                                                                                                                              • Instruction Fuzzy Hash: 6E4117F1B0020ADBCB249F65C541BEBB7A3AFC5344F1584A7E8049B755D731DA82C7A2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1561756050.0000000004500000.00000040.00000800.00020000.00000000.sdmp, Offset: 04500000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_4500000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3275c43ea149f4a5f34aa71f817c3a3ec76852917a8458f2910b0e5ba542e6d1
                                                                                                                              • Instruction ID: b07d581d8743d19e827cff638770900412f075b51e4b6939152dd3fb8983ec5e
                                                                                                                              • Opcode Fuzzy Hash: 3275c43ea149f4a5f34aa71f817c3a3ec76852917a8458f2910b0e5ba542e6d1
                                                                                                                              • Instruction Fuzzy Hash: BE41A334A0A3958FD703DB7CD8605DABFB0BF4B21070545D7D485DB2A3C224AC49CBA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1561756050.0000000004500000.00000040.00000800.00020000.00000000.sdmp, Offset: 04500000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_4500000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: f7488d1597f59f82d94ce19e8139bb40b366ed8f12b0a36df3ce1d3553ba7046
                                                                                                                              • Instruction ID: 9ca4c7224986e340d328a2dbe48e36c5c8b8f50e213a21d470145a554cab35ea
                                                                                                                              • Opcode Fuzzy Hash: f7488d1597f59f82d94ce19e8139bb40b366ed8f12b0a36df3ce1d3553ba7046
                                                                                                                              • Instruction Fuzzy Hash: E521EA74A002099FCB04DF98D4909AAFBB5FF89310B1585AAE909E7352D735FD41CBA1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1560707621.000000000445D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0445D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_445d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8d0db9416991366625d1fb8b0a781eaeffa6e5aee03365cde22f53e64c4a3166
                                                                                                                              • Instruction ID: e820b99bc76f02920916690455329ccbdd38b239ed0c97d88fa1ecc3f16640ae
                                                                                                                              • Opcode Fuzzy Hash: 8d0db9416991366625d1fb8b0a781eaeffa6e5aee03365cde22f53e64c4a3166
                                                                                                                              • Instruction Fuzzy Hash: 1A012D6140D3C49FDB128B259D94752BFA4DF43624F19C0DBEC888F2A7C2695C45CB72
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1560707621.000000000445D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0445D000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_445d000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 4ae3dcd68f8b763427258b2b9da649c789e2e64b20614c1f40e93811e8a5237e
                                                                                                                              • Instruction ID: d9987d53dab2f6385a47b500dc2a6272e1b66cab3cdd0656b90966e5a76dd279
                                                                                                                              • Opcode Fuzzy Hash: 4ae3dcd68f8b763427258b2b9da649c789e2e64b20614c1f40e93811e8a5237e
                                                                                                                              • Instruction Fuzzy Hash: 7301FCB1904304AAEF204F25EC80757BB98EF41B28F08C05BDC481A353C274A446C6B2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000B.00000002.1561756050.0000000004500000.00000040.00000800.00020000.00000000.sdmp, Offset: 04500000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_11_2_4500000_powershell.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 809fbceb1bf8cec5c9738812468cf9020660ced838e0112820f6cde2bb260e1b
                                                                                                                              • Instruction ID: c1309ad25bfe63f0c7b5758fa96b6ee1cbd139d928e90da6c5d622a2e9a0dd41
                                                                                                                              • Opcode Fuzzy Hash: 809fbceb1bf8cec5c9738812468cf9020660ced838e0112820f6cde2bb260e1b
                                                                                                                              • Instruction Fuzzy Hash: 48F0D439A001099FDB15CF9DD894AEEF7B1FF88324F208199E515A72A1C736EC52CB60

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:5.9%
                                                                                                                              Dynamic/Decrypted Code Coverage:11.1%
                                                                                                                              Signature Coverage:7%
                                                                                                                              Total number of Nodes:631
                                                                                                                              Total number of Limit Nodes:32
                                                                                                                              execution_graph 40450 1000c7a7 40451 1000c7be 40450->40451 40457 1000c82c 40450->40457 40451->40457 40462 1000c7e6 GetModuleHandleA 40451->40462 40452 1000c872 40453 1000c835 GetModuleHandleA 40455 1000c83f 40453->40455 40455->40455 40455->40457 40458 1000c85f GetProcAddress 40455->40458 40456 1000c7dd 40456->40455 40456->40457 40459 1000c800 GetProcAddress 40456->40459 40457->40452 40457->40453 40457->40455 40458->40457 40459->40457 40460 1000c80d VirtualProtect 40459->40460 40460->40457 40461 1000c81c VirtualProtect 40460->40461 40461->40457 40463 1000c7ef 40462->40463 40469 1000c82c 40462->40469 40474 1000c803 GetProcAddress 40463->40474 40465 1000c872 40466 1000c835 GetModuleHandleA 40472 1000c83f 40466->40472 40467 1000c7f4 40468 1000c800 GetProcAddress 40467->40468 40467->40469 40468->40469 40470 1000c80d VirtualProtect 40468->40470 40469->40465 40469->40466 40469->40472 40470->40469 40471 1000c81c VirtualProtect 40470->40471 40471->40469 40472->40469 40473 1000c85f GetProcAddress 40472->40473 40473->40469 40475 1000c82c 40474->40475 40476 1000c80d VirtualProtect 40474->40476 40478 1000c835 GetModuleHandleA 40475->40478 40479 1000c872 40475->40479 40476->40475 40477 1000c81c VirtualProtect 40476->40477 40477->40475 40481 1000c83f 40478->40481 40480 1000c85f GetProcAddress 40480->40481 40481->40475 40481->40480 40482 4156ea 40483 4156b4 40482->40483 40483->40482 40485 411aed 40483->40485 40494 4041f1 40485->40494 40487 411b01 40501 40428c connect 40487->40501 40489 411b09 40523 404468 40489->40523 40491 411b36 40531 4045d5 40491->40531 40493 411b4c 40493->40483 40495 404206 socket 40494->40495 40496 4041fd 40494->40496 40498 404220 40495->40498 40499 404224 CreateEventW 40495->40499 40539 404262 WSAStartup 40496->40539 40498->40487 40499->40487 40500 404202 40500->40495 40500->40498 40502 4043e1 40501->40502 40509 4042b3 40501->40509 40503 4043e7 WSAGetLastError 40502->40503 40520 404338 40502->40520 40505 4043f7 40503->40505 40503->40520 40504 4042e8 40508 404306 40504->40508 40510 4042f7 40504->40510 40506 4043fc 40505->40506 40505->40510 40544 41bc76 FormatMessageA LocalFree 40506->40544 40513 40434c 40508->40513 40516 404315 40508->40516 40509->40504 40509->40520 40540 41a686 40509->40540 40514 41a686 GetLocalTime 40510->40514 40512 40440b 40515 41a686 GetLocalTime 40512->40515 40518 404359 40513->40518 40521 404389 40513->40521 40514->40520 40515->40520 40517 41a686 GetLocalTime 40516->40517 40517->40520 40519 41a686 GetLocalTime 40518->40519 40519->40520 40520->40489 40521->40520 40522 41a686 GetLocalTime 40521->40522 40522->40520 40524 40447b 40523->40524 40525 404507 WaitForSingleObject 40524->40525 40526 4044e7 40524->40526 40527 40451d 40525->40527 40528 4044f9 send 40526->40528 40529 404530 SetEvent 40527->40529 40530 404542 40528->40530 40529->40530 40530->40491 40532 4045ec 40531->40532 40534 404666 40532->40534 40545 40455b 40532->40545 40550 404688 40532->40550 40555 446ac5 40532->40555 40561 4047eb 40534->40561 40536 40466d 40536->40493 40539->40500 40541 41a69c GetLocalTime 40540->40541 40542 41a737 40540->40542 40543 41a6de 40541->40543 40542->40504 40543->40542 40544->40512 40546 404592 recv 40545->40546 40547 404565 WaitForSingleObject 40545->40547 40548 4045a5 40546->40548 40549 404581 SetEvent 40547->40549 40548->40532 40549->40548 40552 4046a3 40550->40552 40551 4047d8 40551->40532 40552->40551 40553 404772 CreateEventA CreateThread WaitForSingleObject CloseHandle 40552->40553 40569 411b60 40552->40569 40553->40552 40702 414b9b 40553->40702 40556 446ad0 RtlFreeHeap 40555->40556 40560 446af9 __dosmaperr 40555->40560 40557 446ae5 40556->40557 40556->40560 40745 445354 20 API calls __dosmaperr 40557->40745 40559 446aeb GetLastError 40559->40560 40560->40532 40562 4047ff 40561->40562 40563 404805 SetEvent CloseHandle 40562->40563 40564 40481c closesocket 40562->40564 40567 40483f 40563->40567 40565 404829 40564->40565 40566 404838 40565->40566 40565->40567 40746 404ab1 CreateEventA SetEvent WaitForSingleObject CloseHandle GetLocalTime 40566->40746 40567->40536 40571 411b72 40569->40571 40570 411c60 40570->40552 40571->40570 40575 411c81 GetModuleFileNameW 40571->40575 40573 411c50 40574 4047eb 8 API calls 40573->40574 40574->40570 40582 411cac 40575->40582 40576 41ab38 GetCurrentProcessId 40576->40582 40577 40c854 43 API calls 40577->40582 40578 4176b6 23 API calls 40578->40582 40579 41b61a CreateFileW GetFileSize ReadFile CloseHandle 40579->40582 40580 411f90 DeleteFileW 40580->40582 40581 411fc7 DeleteFileW 40581->40582 40582->40576 40582->40577 40582->40578 40582->40579 40582->40580 40582->40581 40583 412019 Sleep 40582->40583 40584 412003 DeleteFileW 40582->40584 40585 412090 40582->40585 40583->40582 40584->40582 40593 4123f7 40585->40593 40587 4120f4 40588 412274 40587->40588 40590 412125 40587->40590 40589 404468 3 API calls 40588->40589 40592 4121fc 40589->40592 40591 404468 3 API calls 40590->40591 40591->40592 40592->40573 40594 412435 40593->40594 40595 412406 40593->40595 40596 412444 40594->40596 40604 10001c5b 40594->40604 40601 410b0d 40595->40601 40596->40587 40609 410b19 40601->40609 40605 10001c6b ___scrt_fastfail 40604->40605 40660 100012ee 40605->40660 40607 10001c87 40607->40596 40608 410d8d SetLastError 40608->40594 40640 4105b9 40609->40640 40611 410b38 40612 4105b9 SetLastError 40611->40612 40626 410c1f SetLastError 40611->40626 40637 410b15 40611->40637 40614 410b5f 40612->40614 40615 410bbf GetNativeSystemInfo 40614->40615 40614->40626 40614->40637 40616 410bd6 40615->40616 40616->40626 40643 410abe VirtualAlloc 40616->40643 40618 410bfe 40619 410c26 GetProcessHeap RtlAllocateHeap 40618->40619 40653 410abe VirtualAlloc 40618->40653 40621 410c3d 40619->40621 40622 410c4f 40619->40622 40654 410ad5 VirtualFree 40621->40654 40625 4105b9 SetLastError 40622->40625 40623 410c16 40623->40619 40623->40626 40627 410c98 40625->40627 40626->40637 40628 410d45 40627->40628 40644 410abe VirtualAlloc 40627->40644 40655 410eb0 GetProcessHeap HeapFree 40628->40655 40631 410cb1 40645 4105cc SetLastError 40631->40645 40633 410cdd 40633->40628 40646 410975 SetLastError SetLastError 40633->40646 40635 410d04 40635->40628 40647 410769 40635->40647 40637->40608 40638 410d0f 40638->40628 40638->40637 40639 410d3a SetLastError 40638->40639 40639->40628 40641 4105c8 40640->40641 40642 4105bd SetLastError 40640->40642 40641->40611 40642->40611 40643->40618 40644->40631 40645->40633 40646->40635 40651 410790 40647->40651 40648 41087f 40649 4106d3 VirtualProtect 40648->40649 40650 410891 40649->40650 40650->40638 40651->40648 40651->40650 40656 4106d3 40651->40656 40653->40623 40654->40626 40655->40637 40657 4106dd 40656->40657 40659 4106e8 40656->40659 40658 410722 VirtualProtect 40657->40658 40657->40659 40658->40659 40659->40651 40661 10001324 ___scrt_fastfail 40660->40661 40662 100013b7 GetEnvironmentVariableW 40661->40662 40686 100010f1 40662->40686 40665 100010f1 57 API calls 40666 10001465 40665->40666 40667 100010f1 57 API calls 40666->40667 40668 10001479 40667->40668 40669 100010f1 57 API calls 40668->40669 40670 1000148d 40669->40670 40671 100010f1 57 API calls 40670->40671 40672 100014a1 40671->40672 40673 100010f1 57 API calls 40672->40673 40674 100014b5 lstrlenW 40673->40674 40675 100014d2 40674->40675 40676 100014d9 lstrlenW 40674->40676 40675->40607 40677 100010f1 57 API calls 40676->40677 40678 10001501 lstrlenW lstrcatW 40677->40678 40679 100010f1 57 API calls 40678->40679 40680 10001539 lstrlenW lstrcatW 40679->40680 40681 100010f1 57 API calls 40680->40681 40682 1000156b lstrlenW lstrcatW 40681->40682 40683 100010f1 57 API calls 40682->40683 40684 1000159d lstrlenW lstrcatW 40683->40684 40685 100010f1 57 API calls 40684->40685 40685->40675 40687 10001118 ___scrt_fastfail 40686->40687 40688 10001129 lstrlenW 40687->40688 40699 10002c40 40688->40699 40691 10001177 lstrlenW FindFirstFileW 40693 100011a0 40691->40693 40694 100011e1 40691->40694 40692 10001168 lstrlenW 40692->40691 40695 100011c7 FindNextFileW 40693->40695 40696 100011aa 40693->40696 40694->40665 40695->40693 40698 100011da FindClose 40695->40698 40696->40695 40701 10001000 57 API calls ___scrt_fastfail 40696->40701 40698->40694 40700 10001148 lstrcatW lstrlenW 40699->40700 40700->40691 40700->40692 40701->40696 40724 401fbd 40702->40724 40704 414bbd SetEvent 40705 414bd2 40704->40705 40706 414d8f 40705->40706 40707 414c37 GetTickCount 40705->40707 40709 414d8a 40705->40709 40706->40709 40722 414dad 40706->40722 40708 414c4d 40707->40708 40726 41aca0 GetLastInputInfo GetTickCount 40708->40726 40712 414c54 40727 41ac52 40712->40727 40714 414c6d 40715 404468 3 API calls 40714->40715 40716 414ce9 40715->40716 40716->40706 40717 414d69 40716->40717 40718 414d82 40717->40718 40719 414d77 40717->40719 40731 404915 40718->40731 40730 4049ba GetLocalTime GetLocalTime GetLocalTime 40719->40730 40740 404ab1 CreateEventA SetEvent WaitForSingleObject CloseHandle GetLocalTime 40722->40740 40723 414d7d 40723->40709 40725 401fcc 40724->40725 40725->40704 40726->40712 40728 41ac71 GetForegroundWindow GetWindowTextW 40727->40728 40729 41ac9b 40728->40729 40729->40714 40730->40723 40732 4049b1 40731->40732 40733 40492a 40731->40733 40732->40709 40734 404933 40733->40734 40735 404942 GetLocalTime 40733->40735 40736 404987 CreateEventA CreateThread 40733->40736 40734->40736 40737 40495b 40735->40737 40736->40732 40741 404b1d 40736->40741 40738 41a686 GetLocalTime 40737->40738 40739 40497c 40738->40739 40739->40736 40740->40723 40744 404b29 11 API calls 40741->40744 40743 404b26 40744->40743 40745->40559 40746->40567 40747 414dba 40752 41a51b 40747->40752 40749 414dc3 40750 404468 3 API calls 40749->40750 40751 414dde 40750->40751 40753 41a529 40752->40753 40759 446aff 40753->40759 40755 41a55c InternetReadFile 40756 41a57f 40755->40756 40756->40755 40757 41a5ac 40756->40757 40757->40749 40760 446b3d 40759->40760 40765 446b0d _strftime 40759->40765 40767 445354 20 API calls __dosmaperr 40760->40767 40762 446b28 RtlAllocateHeap 40763 41a533 InternetOpenW InternetOpenUrlW 40762->40763 40762->40765 40763->40755 40765->40760 40765->40762 40766 442200 7 API calls 2 library calls 40765->40766 40766->40765 40767->40763 40768 4339be 40769 4339ca __FrameHandler3::FrameUnwindToState 40768->40769 40804 4336b3 40769->40804 40771 4339d1 40772 433b24 40771->40772 40775 4339fb 40771->40775 40922 433b44 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 40772->40922 40774 433b2b 40923 4426be 28 API calls _Atexit 40774->40923 40786 433a3a ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 40775->40786 40916 4434d1 5 API calls CatchGuardHandler 40775->40916 40777 433b31 40924 442670 28 API calls _Atexit 40777->40924 40780 433a14 40782 433a1a 40780->40782 40917 443475 5 API calls CatchGuardHandler 40780->40917 40781 433b39 40925 43405d GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 40781->40925 40785 433b3f __scrt_common_main_seh 40787 433a9b 40786->40787 40918 43edf4 38 API calls 4 library calls 40786->40918 40815 433c5e 40787->40815 40793 433ab6 40919 433c94 GetModuleHandleW 40793->40919 40795 433abd 40795->40774 40796 433ac1 40795->40796 40797 433aca 40796->40797 40920 442661 28 API calls _Atexit 40796->40920 40921 433842 13 API calls 2 library calls 40797->40921 40800 433ad2 40800->40782 40805 4336bc 40804->40805 40926 433e0a IsProcessorFeaturePresent 40805->40926 40807 4336c8 40927 4379ee 10 API calls 3 library calls 40807->40927 40809 4336cd 40810 4336d1 40809->40810 40928 44335e IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 40809->40928 40810->40771 40812 4336da 40813 4336e8 40812->40813 40929 437a17 8 API calls 3 library calls 40812->40929 40813->40771 40930 436050 40815->40930 40817 433c71 GetStartupInfoW 40818 433aa1 40817->40818 40819 443422 40818->40819 40931 44ddc9 40819->40931 40821 433aaa 40824 40697b 40821->40824 40828 40d767 40821->40828 40913 40bed7 40821->40913 40822 44342b 40822->40821 40935 44e0d3 38 API calls 40822->40935 40825 40698f 40824->40825 40937 4124b7 RegOpenKeyExA 40825->40937 40940 41bce3 LoadLibraryA 40828->40940 40832 40d7eb 40832->40793 40833 40d9a4 40835 40bed7 2 API calls 40833->40835 40834 40d946 40834->40833 40837 4124b7 2 API calls 40834->40837 40842 40e134 40834->40842 40836 40d9aa 40835->40836 40836->40832 40947 41a463 40836->40947 40843 40d988 40837->40843 40838 40d79f 40838->40832 40838->40834 40839 4124b7 2 API calls 40838->40839 40839->40834 40841 40d9c5 40846 40697b 2 API calls 40841->40846 40850 40da18 40841->40850 41049 412902 RegOpenKeyExW RegDeleteValueW 40842->41049 40843->40833 41021 412902 RegOpenKeyExW RegDeleteValueW 40843->41021 40848 40d9e0 40846->40848 40847 40e14a 41050 4112b5 32 API calls 40847->41050 40851 40d9e4 40848->40851 40858 40d9ee 40848->40858 40854 40da2d 40850->40854 40865 40da32 40850->40865 41022 40699d RegOpenKeyExW RegDeleteValueW 40851->41022 41025 4069ba CreateProcessA 40854->41025 40855 40d9e9 41023 4064d0 6 API calls 40855->41023 40858->40850 40859 40da13 40858->40859 41024 4064d0 6 API calls 40859->41024 40861 40db08 40862 40db2c 40861->40862 40863 40dcaa 40861->40863 40867 40db35 40862->40867 40869 40dbb1 40862->40869 41040 41265d RegOpenKeyExA 40863->41040 40865->40861 41026 40c89e 40865->41026 41038 40bc67 52 API calls 40867->41038 40868 40dcef 40960 4126d2 RegCreateKeyA 40868->40960 40956 4128a2 40869->40956 40873 40dbac 40873->40869 40874 40dc45 40874->40868 40879 40dc70 40874->40879 40875 40dd3b 40876 40dd5e 40875->40876 40880 40dd81 40875->40880 41043 41beb0 8 API calls 40876->41043 40878 40dd65 40878->40880 41039 40e219 61 API calls 40879->41039 40884 41a686 GetLocalTime 40880->40884 40882 40dc8c 40882->40868 40883 40dc93 40882->40883 40883->40832 40885 40ddaa 40884->40885 40886 40de41 StrToIntA 40885->40886 40964 409517 40886->40964 40888 40df46 40889 40dfba 40888->40889 40896 40df81 40888->40896 40973 41a7a2 GetComputerNameExW GetUserNameW 40889->40973 40891 40de53 40891->40888 41044 40c854 40891->41044 40893 40dfc3 40894 40dfe0 SetProcessDEPPolicy 40893->40894 40895 40dfe3 CreateThread 40893->40895 40894->40895 40900 40dff8 40895->40900 41211 40e54f 40895->41211 41048 40b95c CreateThread RegOpenKeyExA RegQueryValueExA RegOpenKeyExA RegQueryValueExA 40896->41048 40898 40e067 40975 41246e RegOpenKeyExA 40898->40975 40900->40898 40904 41a686 GetLocalTime 40900->40904 40903 40e08b 40912 40e117 40903->40912 40978 412584 RegOpenKeyExW 40903->40978 40904->40898 40907 40e0ba 40908 40e0db Sleep 40907->40908 40910 40e0f4 40907->40910 40909 401e07 40908->40909 40909->40907 40981 41297a RegOpenKeyExW 40910->40981 40985 40cbac 40912->40985 41230 401e8f 40913->41230 40915 40bee1 CreateMutexA GetLastError 40915->40793 40916->40780 40917->40786 40918->40787 40919->40795 40920->40797 40921->40800 40922->40774 40923->40777 40924->40781 40925->40785 40926->40807 40927->40809 40928->40812 40929->40810 40930->40817 40932 44dddb 40931->40932 40933 44ddd2 40931->40933 40932->40822 40936 44dcc8 51 API calls 5 library calls 40933->40936 40935->40822 40936->40932 40938 4124e1 RegQueryValueExA 40937->40938 40939 406996 40937->40939 40938->40939 40939->40793 40941 41bd03 LoadLibraryA 40940->40941 40943 40d783 GetModuleFileNameW 40941->40943 40944 40e168 40943->40944 41051 41a63f FindResourceA 40944->41051 40946 40e183 40946->40838 41054 41b15b 40947->41054 40949 41a471 41058 412513 RegOpenKeyExA 40949->41058 40951 41a48f 40952 412513 2 API calls 40951->40952 40955 41a4e6 40951->40955 40953 41a4cd 40952->40953 40954 41a4d8 StrToIntA 40953->40954 40954->40955 40955->40841 40957 4128c0 40956->40957 40958 4126d2 2 API calls 40957->40958 40959 4128ef 40958->40959 40959->40874 40961 4126eb 40960->40961 40962 41271a 40960->40962 40963 4126fd RegSetValueExA 40961->40963 40962->40875 40963->40962 40965 409536 40964->40965 40966 409541 40965->40966 40967 409558 40965->40967 40969 40c89e 43 API calls 40966->40969 40968 40c89e 43 API calls 40967->40968 40972 409549 40968->40972 40969->40972 41061 409837 40972->41061 40974 41a7f1 40973->40974 40974->40893 40976 41248f RegQueryValueExA 40975->40976 40977 4124aa 40975->40977 40976->40977 40977->40903 40979 4125b0 RegQueryValueExW 40978->40979 40980 4125d4 40978->40980 40979->40980 40980->40907 40982 412992 RegDeleteValueW 40981->40982 40983 4129a6 40981->40983 40982->40983 40984 4129a2 40982->40984 40983->40912 40984->40912 40986 40cbc5 40985->40986 40987 41246e 2 API calls 40986->40987 40989 40cbcc 40987->40989 40988 40cbeb 40991 413fd4 40988->40991 40989->40988 41160 4127d5 RegCreateKeyA 40989->41160 40992 413feb 40991->40992 40993 414021 Sleep 40992->40993 40994 41402e 40992->40994 40993->40994 41163 404262 WSAStartup 40994->41163 40996 414065 41019 4140ed 40996->41019 41182 404101 GetLocalTime 40996->41182 40999 414244 WSAGetLastError 41183 41bc76 FormatMessageA LocalFree 40999->41183 41000 4041f1 3 API calls 41000->41019 41002 404915 14 API calls 41002->41019 41003 40428c 5 API calls 41003->41019 41004 4047eb 8 API calls 41004->41019 41005 414b80 Sleep 41005->41019 41006 41a686 GetLocalTime 41006->41019 41008 41265d 2 API calls 41008->41019 41009 412513 2 API calls 41009->41019 41011 4144ed GetTickCount 41011->41019 41013 41ac52 2 API calls 41013->41019 41015 404468 3 API calls 41015->41019 41016 4045d5 190 API calls 41016->41019 41017 414ae4 41017->41005 41184 40a767 6 API calls 41017->41184 41019->40999 41019->41000 41019->41002 41019->41003 41019->41004 41019->41006 41019->41008 41019->41009 41019->41011 41019->41013 41019->41015 41019->41016 41019->41017 41020 414b22 CreateThread 41019->41020 41164 413f9a 41019->41164 41170 41a96d 41019->41170 41173 40cbf1 41019->41173 41179 41aca0 GetLastInputInfo GetTickCount 41019->41179 41180 40e679 GetLocaleInfoA 41019->41180 41020->41019 41187 419e89 53 API calls 41020->41187 41021->40833 41022->40855 41023->40858 41024->40850 41025->40865 41027 40c8ba 41026->41027 41028 40c9c9 41027->41028 41029 40c8da 41027->41029 41030 40c90f 41027->41030 41031 40c8d0 41027->41031 41188 43a998 41028->41188 41201 41a74b GetModuleFileNameW 41029->41201 41032 41b15b 2 API calls 41030->41032 41034 40ca03 GetLongPathNameW 41031->41034 41032->41031 41036 40ca18 41034->41036 41035 40c8e3 41035->41031 41036->40861 41038->40873 41039->40882 41041 412683 RegQueryValueExA 41040->41041 41042 4126a3 41040->41042 41041->41042 41042->40868 41043->40878 41045 40c86b 41044->41045 41046 40c89e 43 API calls 41045->41046 41047 40c887 41046->41047 41047->40888 41048->40889 41049->40847 41052 41a683 41051->41052 41053 41a65c LoadResource LockResource SizeofResource 41051->41053 41052->40946 41053->41052 41055 41b183 41054->41055 41056 41b168 GetCurrentProcess IsWow64Process 41054->41056 41055->40949 41056->41055 41057 41b17f 41056->41057 41057->40949 41059 412541 RegQueryValueExA 41058->41059 41060 412565 41058->41060 41059->41060 41060->40951 41062 409855 41061->41062 41063 4124b7 2 API calls 41062->41063 41064 40985c 41063->41064 41065 409870 41064->41065 41066 40988a 41064->41066 41067 4095cf 41065->41067 41068 409875 41065->41068 41072 4098a5 41066->41072 41067->40891 41083 409959 CreateThread 41068->41083 41071 409888 41071->41067 41073 4098c3 41072->41073 41074 4098f6 41073->41074 41075 4098ce 41073->41075 41076 41a686 GetLocalTime 41074->41076 41084 40a876 SetEvent GetLocalTime wsprintfW 41075->41084 41078 409915 CreateThread 41076->41078 41080 409930 CreateThread 41078->41080 41081 40993c CreateThread 41078->41081 41091 4099a9 41078->41091 41079 4098ed 41079->41074 41080->41081 41088 409993 41080->41088 41082 409950 41081->41082 41085 4099b5 41081->41085 41082->41067 41083->41071 41159 40999f 46 API calls 41083->41159 41084->41079 41094 40a3f4 41085->41094 41087 4099be 41107 4099e4 41088->41107 41090 40999c 41116 409e48 41091->41116 41104 40a402 41094->41104 41095 40a5ff 41095->41087 41096 40a45c Sleep GetForegroundWindow GetWindowTextLengthW 41096->41104 41098 41aca0 GetLastInputInfo GetTickCount 41098->41104 41099 40a4a2 GetWindowTextW 41099->41104 41100 40a569 Sleep 41100->41104 41101 40a4f1 41101->41104 41105 40a876 SetEvent GetLocalTime wsprintfW 41101->41105 41103 409d58 SetEvent 41103->41104 41104->41095 41104->41096 41104->41098 41104->41099 41104->41100 41104->41101 41104->41103 41106 40ae58 SetEvent OpenClipboard GetClipboardData CloseClipboard 41104->41106 41105->41101 41106->41104 41108 409a63 GetMessageA 41107->41108 41109 4099ff SetWindowsHookExA 41107->41109 41110 409a75 TranslateMessage DispatchMessageA 41108->41110 41115 409a52 41108->41115 41109->41108 41112 409a1b GetLastError 41109->41112 41110->41108 41110->41115 41113 409a31 41112->41113 41114 41a686 GetLocalTime 41113->41114 41114->41115 41115->41090 41117 409e5d Sleep 41116->41117 41130 409d97 41117->41130 41119 4099b2 41120 409e9d CreateDirectoryW 41123 409e6f 41120->41123 41121 409eae GetFileAttributesW 41121->41123 41122 409ec5 SetFileAttributesW 41122->41123 41123->41117 41123->41119 41123->41120 41123->41121 41123->41122 41129 409f10 41123->41129 41141 41b58f 41123->41141 41125 409f3f PathFileExistsW 41125->41129 41127 40a048 SetFileAttributesW 41127->41123 41129->41123 41129->41125 41129->41127 41150 41b61a CreateFileW 41129->41150 41157 41b687 CreateFileW SetFilePointer WriteFile CloseHandle 41129->41157 41131 409e44 41130->41131 41134 409dad 41130->41134 41131->41123 41132 409dcc CreateFileW 41133 409dda GetFileSize 41132->41133 41132->41134 41133->41134 41135 409e0f CloseHandle 41133->41135 41134->41132 41134->41135 41136 409e04 Sleep 41134->41136 41137 409dfd 41134->41137 41139 409e21 41134->41139 41135->41134 41136->41135 41158 40a7f0 SetEvent UnhookWindowsHookEx GetLocalTime wsprintfW GetLocalTime 41137->41158 41139->41131 41140 4098a5 37 API calls 41139->41140 41140->41131 41142 41b5a2 CreateFileW 41141->41142 41144 41b5db 41142->41144 41145 41b5df 41142->41145 41144->41123 41146 41b5f6 WriteFile 41145->41146 41147 41b5e6 SetFilePointer 41145->41147 41148 41b60b CloseHandle 41146->41148 41149 41b609 41146->41149 41147->41146 41147->41148 41148->41144 41149->41148 41151 41b644 GetFileSize 41150->41151 41152 41b640 41150->41152 41153 41b658 41151->41153 41152->41129 41154 41b66a ReadFile 41153->41154 41155 41b677 41154->41155 41156 41b679 CloseHandle 41154->41156 41155->41156 41156->41152 41157->41129 41158->41136 41161 41280f 41160->41161 41162 4127ed RegSetValueExA 41160->41162 41161->40988 41162->41161 41163->40996 41165 413fb3 WSASetLastError 41164->41165 41166 413fa9 41164->41166 41165->41019 41185 413e37 GetSystemDirectoryA LoadLibraryA LoadLibraryA GetProcAddress 41166->41185 41168 413fae 41168->41165 41186 41a945 GlobalMemoryStatusEx 41170->41186 41172 41a982 41172->41019 41174 40cc0d 41173->41174 41175 41246e 2 API calls 41174->41175 41177 40cc14 41175->41177 41176 40cc2c 41176->41019 41177->41176 41178 4124b7 2 API calls 41177->41178 41178->41176 41179->41019 41181 40e69e 41180->41181 41181->41019 41182->41019 41183->41019 41184->41019 41185->41168 41186->41172 41191 43a9a4 __FrameHandler3::FrameUnwindToState std::_Locinfo::_Locinfo_dtor 41188->41191 41189 43a9b2 41207 445354 20 API calls __dosmaperr 41189->41207 41191->41189 41194 43a9dc 41191->41194 41192 43a9b7 41208 43a827 26 API calls __cftoe 41192->41208 41202 444acc RtlEnterCriticalSection 41194->41202 41196 43a9e7 41203 43aa88 41196->41203 41198 43a9c2 std::_Locinfo::_Locinfo_dtor 41198->41031 41201->41035 41202->41196 41204 43aa96 41203->41204 41206 43a9f2 41204->41206 41210 448416 39 API calls 2 library calls 41204->41210 41209 43aa0f RtlLeaveCriticalSection std::_Lockit::~_Lockit 41206->41209 41207->41192 41208->41198 41209->41198 41210->41204 41213 40e56a 41211->41213 41212 4124b7 2 API calls 41212->41213 41213->41212 41214 40e59c 41213->41214 41215 40e5fe Sleep 41213->41215 41217 40e60e 41213->41217 41214->41215 41220 4126d2 2 API calls 41214->41220 41226 40bf04 29 API calls 41214->41226 41227 412774 RegCreateKeyW RegSetValueExW 41214->41227 41215->41213 41228 412774 RegCreateKeyW RegSetValueExW 41217->41228 41220->41214 41221 40e638 41222 4126d2 2 API calls 41221->41222 41223 40e668 41222->41223 41229 411699 TerminateProcess WaitForSingleObject 41223->41229 41225 40e670 ExitProcess 41227->41214 41228->41221 41229->41225 41231 401e94 41230->41231 41231->40915 41232 43360d 41233 433612 41232->41233 41234 43362c 41233->41234 41236 43362e std::_Facet_Register 41233->41236 41241 442200 7 API calls 2 library calls 41233->41241 41237 433dec std::_Facet_Register 41236->41237 41242 437bd7 RaiseException 41236->41242 41243 437bd7 RaiseException 41237->41243 41239 433e09 41241->41233 41242->41237 41243->41239

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 909 417245-417262 910 417266-4172d9 909->910 919 4175cd 910->919 920 4172df-4172e6 910->920 922 4175cf-4175d9 919->922 920->919 921 4172ec-4172f3 920->921 921->919 923 4172f9-4172fb 921->923 923->919 924 417301-41732d 923->924 924->919 927 417333-41733e 924->927 927->919 928 417344-417374 CreateProcessW 927->928 929 4175c7 GetLastError 928->929 930 41737a-4173a2 VirtualAlloc Wow64GetThreadContext 928->930 929->919 931 417593-4175c5 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 930->931 932 4173a8-4173c8 ReadProcessMemory 930->932 931->919 932->931 933 4173ce-4173ee NtCreateSection 932->933 933->931 934 4173f4-417401 933->934 935 417403-41740e NtUnmapViewOfSection 934->935 936 417414-417436 NtMapViewOfSection 934->936 935->936 937 417477-41749e GetCurrentProcess NtMapViewOfSection 936->937 938 417438-417466 VirtualFree NtClose TerminateProcess 936->938 940 417591 937->940 941 4174a4-4174a6 937->941 938->919 939 41746c-417472 938->939 939->910 940->931 942 4174a8-4174ac 941->942 943 4174af-4174d6 941->943 942->943 945 417516-417520 943->945 946 4174d8-4174e2 943->946 948 417522-417528 945->948 949 41753e-417542 945->949 947 4174e6-417509 946->947 959 41750b-417512 947->959 948->949 950 41752a-41753b call 417651 948->950 951 417544-417560 WriteProcessMemory 949->951 952 417566-41757d Wow64SetThreadContext 949->952 950->949 951->931 954 417562 951->954 952->931 955 41757f-41758b ResumeThread 952->955 954->952 955->931 958 41758d-41758f 955->958 958->922 959->945
                                                                                                                              APIs
                                                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 0041736C
                                                                                                                              • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 00417384
                                                                                                                              • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 0041739A
                                                                                                                              • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004173C0
                                                                                                                              • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004173E6
                                                                                                                              • NtUnmapViewOfSection.NTDLL(?,?), ref: 0041740E
                                                                                                                              • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041742E
                                                                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00417440
                                                                                                                              • NtClose.NTDLL(?), ref: 0041744A
                                                                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 00417454
                                                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041748B
                                                                                                                              • NtMapViewOfSection.NTDLL(?,00000000), ref: 00417496
                                                                                                                              • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00417558
                                                                                                                              • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 00417575
                                                                                                                              • ResumeThread.KERNEL32(?), ref: 00417582
                                                                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 0041759A
                                                                                                                              • GetCurrentProcess.KERNEL32(?), ref: 004175A5
                                                                                                                              • NtUnmapViewOfSection.NTDLL(00000000), ref: 004175AC
                                                                                                                              • NtClose.NTDLL(?), ref: 004175B6
                                                                                                                              • TerminateProcess.KERNEL32(?,00000000), ref: 004175BF
                                                                                                                              • GetLastError.KERNEL32 ref: 004175C7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$Section$View$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmapWow64$AllocErrorLastReadResumeWrite
                                                                                                                              • String ID: `Wu$ntdll
                                                                                                                              • API String ID: 2813502504-3657445416
                                                                                                                              • Opcode ID: bed19215e1ee462be55f0caaedf1beca1b54ad8a9f8af9374d2a49f9eda5156c
                                                                                                                              • Instruction ID: f03761d26bac9a2bfb1ad98f85ac7da09ef0bd98ba300517d6d91d37beebd467
                                                                                                                              • Opcode Fuzzy Hash: bed19215e1ee462be55f0caaedf1beca1b54ad8a9f8af9374d2a49f9eda5156c
                                                                                                                              • Instruction Fuzzy Hash: EEA17C71508304AFD7209F65DC45B6B7BF9FF48345F00082AF689C2661E775E984CB6A

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1420 4099e4-4099fd 1421 409a63-409a73 GetMessageA 1420->1421 1422 4099ff-409a19 SetWindowsHookExA 1420->1422 1423 409a75-409a8d TranslateMessage DispatchMessageA 1421->1423 1424 409a8f 1421->1424 1422->1421 1427 409a1b-409a61 GetLastError call 41ad46 call 404c9e call 401f66 call 41a686 call 401eea 1422->1427 1423->1421 1423->1424 1426 409a91-409a96 1424->1426 1427->1426
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00409A01
                                                                                                                              • SetWindowsHookExA.USER32(0000000D,004099D0,00000000), ref: 00409A0F
                                                                                                                              • GetLastError.KERNEL32 ref: 00409A1B
                                                                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00409A6B
                                                                                                                              • TranslateMessage.USER32(?), ref: 00409A7A
                                                                                                                              • DispatchMessageA.USER32(?), ref: 00409A85
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                                              • String ID: @[F$`Wu
                                                                                                                              • API String ID: 3219506041-1661598857
                                                                                                                              • Opcode ID: 09b5a9a9f98a313868436291bbcc86794eb8ee4705e3653ca754bd08b07fcff1
                                                                                                                              • Instruction ID: 76b292cdb4e6355f9a4176d1f10d626d2d11be3de55f9aee7ae49bf60faff0c2
                                                                                                                              • Opcode Fuzzy Hash: 09b5a9a9f98a313868436291bbcc86794eb8ee4705e3653ca754bd08b07fcff1
                                                                                                                              • Instruction Fuzzy Hash: 201194716043015BC710AB7AAC4996B77ECAB94B15B10057FFC45D2291FB34DE01CBAB

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1438 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1445 10001177-1000119e lstrlenW FindFirstFileW 1438->1445 1446 10001168-10001172 lstrlenW 1438->1446 1447 100011a0-100011a8 1445->1447 1448 100011e1-100011e9 1445->1448 1446->1445 1449 100011c7-100011d8 FindNextFileW 1447->1449 1450 100011aa-100011c4 call 10001000 1447->1450 1449->1447 1452 100011da-100011db FindClose 1449->1452 1450->1449 1452->1448
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1083526818-0
                                                                                                                              • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                              • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                                                                              • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                                                                              • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                                • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                                • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                              • Sleep.KERNEL32(00000BB8), ref: 0040E603
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040E672
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                                              • String ID: hHgF$pth_unenc$BG
                                                                                                                              • API String ID: 2281282204-2498983548
                                                                                                                              • Opcode ID: 96f855e70242bb7aa32fe4833ee5ea59a66a7e4798cfecf5ed6862be313f6a2c
                                                                                                                              • Instruction ID: 346becae97c590b24629de205d3f766cc2ad037e5fc603921d36f10068cff0f4
                                                                                                                              • Opcode Fuzzy Hash: 96f855e70242bb7aa32fe4833ee5ea59a66a7e4798cfecf5ed6862be313f6a2c
                                                                                                                              • Instruction Fuzzy Hash: 6B21A131B0030027C608767A891BA6F359A9B91719F90443EF805A76D7EE7D8A6083DF
                                                                                                                              APIs
                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?), ref: 0040456A
                                                                                                                              • SetEvent.KERNEL32(?,?,0040460E,00000000,?), ref: 00404588
                                                                                                                              • recv.WS2_32(?,00000000,00000000,00000000), ref: 0040459F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EventObjectSingleWaitrecv
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 311754179-0
                                                                                                                              • Opcode ID: f607482e4343822148b028568a10a35340e8017a1e546fdda455ad4df8589c88
                                                                                                                              • Instruction ID: 26c9fa113e50de76ad78d978a7fe27ea9b76c3f20528cd6e12f8aa4c3c3b2b63
                                                                                                                              • Opcode Fuzzy Hash: f607482e4343822148b028568a10a35340e8017a1e546fdda455ad4df8589c88
                                                                                                                              • Instruction Fuzzy Hash: 3FF08236108212BFD7018B14FC08E1AFBA2FB88721F10863AF614522A19771EC20DB59
                                                                                                                              APIs
                                                                                                                              • GetComputerNameExW.KERNEL32(00000001,?,?,00474358), ref: 0041A7BF
                                                                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 0041A7D7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Name$ComputerUser
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4229901323-0
                                                                                                                              • Opcode ID: f3e21b17a5d8a19e2687fa05b240d0301e1fcdfe38c042d63901ddde5ca2efef
                                                                                                                              • Instruction ID: 0a408ea7b536296bc4698588bf682dce528bd2697060893402f21fe22c13e40a
                                                                                                                              • Opcode Fuzzy Hash: f3e21b17a5d8a19e2687fa05b240d0301e1fcdfe38c042d63901ddde5ca2efef
                                                                                                                              • Instruction Fuzzy Hash: 8801FF7290011CAADB14EB90DC45ADDBBBCEF44715F10017AB501B21D5EFB4AB898A98
                                                                                                                              APIs
                                                                                                                              • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,004145AD,00473EE8,00474A10,00473EE8,00000000,00473EE8,?,00473EE8,0046673C), ref: 0040E68D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InfoLocale
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2299586839-0
                                                                                                                              • Opcode ID: 8f670c9bc9cf5537f4d47deeb1742176d0e9de48ba061163cdb10aa1aaaa222a
                                                                                                                              • Instruction ID: fdf89a5244b67fc368892e36cd71d3b7bc7b33248e42f87f25a9228cb5794c84
                                                                                                                              • Opcode Fuzzy Hash: 8f670c9bc9cf5537f4d47deeb1742176d0e9de48ba061163cdb10aa1aaaa222a
                                                                                                                              • Instruction Fuzzy Hash: E6D05E607002197BEA109291DC0AE9B7A9CE700B66F000165BA01E72C0E9A0AF008AE1

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 0 40d767-40d7e9 call 41bce3 GetModuleFileNameW call 40e168 call 401fbd * 2 call 41afc3 call 40e8bd call 401d8c 16 40d835-40d8fd call 401d64 call 401e8f call 401d64 call 404cbf call 405ce6 call 401eef call 401eea * 2 call 401d64 call 401ebd call 40541d call 401d64 call 404bb1 call 401d64 call 404bb1 0->16 17 40d7eb-40d830 call 40e986 call 401d64 call 401e8f call 40fcba call 40e937 call 40e155 0->17 63 40d950-40d96b call 401d64 call 40b125 16->63 64 40d8ff-40d94a call 4085b4 call 401eef call 401eea call 401e8f call 4124b7 16->64 42 40dc96-40dca7 call 401eea 17->42 73 40d9a5-40d9ac call 40bed7 63->73 74 40d96d-40d98c call 401e8f call 4124b7 63->74 64->63 96 40e134-40e154 call 401e8f call 412902 call 4112b5 64->96 84 40d9b5-40d9bc 73->84 85 40d9ae-40d9b0 73->85 74->73 92 40d98e-40d9a4 call 401e8f call 412902 74->92 89 40d9c0-40d9cc call 41a463 84->89 90 40d9be 84->90 88 40dc95 85->88 88->42 97 40d9d5-40d9d9 89->97 98 40d9ce-40d9d0 89->98 90->89 92->73 102 40da18-40da2b call 401d64 call 401e8f 97->102 103 40d9db-40d9e2 call 40697b 97->103 98->97 122 40da32-40daba call 401d64 call 41ae08 call 401e18 call 401e13 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f 102->122 123 40da2d call 4069ba 102->123 115 40d9e4-40d9e9 call 40699d call 4064d0 103->115 116 40d9ee-40da01 call 401d64 call 401e8f 103->116 115->116 116->102 132 40da03-40da09 116->132 157 40db22-40db26 122->157 158 40dabc-40dad5 call 401d64 call 401e8f 122->158 123->122 132->102 134 40da0b-40da11 132->134 134->102 136 40da13 call 4064d0 134->136 136->102 160 40dcaa-40dd01 call 4022f8 call 401e8f * 2 call 41265d call 4082d7 157->160 161 40db2c-40db33 157->161 158->157 182 40dad7-40db1d call 401d64 call 401e8f call 401d64 call 401e8f call 40c89e call 401e18 call 401e13 158->182 208 40dd06-40dd5c call 401d64 call 401e8f call 401f66 call 401e8f call 4126d2 call 401d64 call 401e8f 160->208 162 40dbb1-40dbbb call 4082d7 161->162 163 40db35-40dbaf call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 40bc67 161->163 171 40dbc0-40dbe4 call 4022f8 162->171 163->171 190 40dbf3 171->190 191 40dbe6-40dbf1 171->191 182->157 193 40dbf5-40dc40 call 401e07 call 4022f8 call 401e8f call 4022f8 call 401e8f call 4128a2 190->193 191->193 246 40dc45-40dc6a call 401d64 call 40b125 193->246 259 40dd79-40dd7b 208->259 260 40dd5e 208->260 246->208 261 40dc70-40dc91 call 401d64 call 41ae08 call 40e219 246->261 263 40dd81 259->263 264 40dd7d-40dd7f 259->264 262 40dd60-40dd77 call 41beb0 260->262 261->208 279 40dc93 261->279 268 40dd87-40de66 call 401f66 * 2 call 41a686 call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f call 401d64 call 401e8f StrToIntA call 409517 call 401d64 call 401e8f 262->268 263->268 264->262 317 40dea1 268->317 318 40de68-40de9f call 401d64 call 401e8f 268->318 279->88 319 40dea3-40debb call 401d64 call 401e8f 317->319 318->319 328 40def9-40df0c call 401d64 call 401e8f 319->328 329 40debd-40def4 call 401d64 call 401e8f 319->329 339 40df6c-40df7f call 401d64 call 401e8f 328->339 340 40df0e-40df67 call 401d64 call 401e8f call 401d64 call 401e8f call 40c854 call 401e18 call 401e13 328->340 329->328 353 40df81-40dfb5 call 401d64 call 401e8f call 401d64 call 401e8f call 40b95c 339->353 354 40dfba-40dfde call 41a7a2 call 401e18 call 401e13 339->354 340->339 353->354 373 40dfe0-40dfe1 SetProcessDEPPolicy 354->373 374 40dfe3-40dff6 CreateThread 354->374 373->374 378 40e004-40e00b 374->378 379 40dff8-40e001 374->379 381 40e019-40e020 378->381 382 40e00d-40e016 378->382 379->378 385 40e022-40e025 381->385 386 40e033-40e038 381->386 382->381 389 40e073-40e08e call 401e8f call 41246e 385->389 390 40e027-40e031 385->390 391 40e03d-40e06e call 401f66 call 404c9e call 401f66 call 41a686 call 401eea 386->391 400 40e094-40e0d4 call 41ae08 call 401e07 call 412584 call 401e13 call 401e07 389->400 401 40e12a-40e12f call 40cbac call 413fd4 389->401 390->391 391->389 420 40e0ed-40e0f2 400->420 401->96 422 40e0f4-40e125 call 41ae08 call 401e07 call 41297a call 401e13 * 2 420->422 423 40e0d6-40e0d9 420->423 422->401 423->422 424 40e0db-40e0e8 Sleep call 401e07 423->424 424->420
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041BCE3: LoadLibraryA.KERNEL32(0046BE5C,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe,00000104), ref: 0040D790
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileLibraryLoadModuleName
                                                                                                                              • String ID: ,fF$0DG$@CG$@CG$Access Level: $C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe$Exe$Rmc-R1T905$Software\$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$XCG$`=G$dCG$exepath$BG$BG$BG$BG$BG
                                                                                                                              • API String ID: 1159719554-2480746820
                                                                                                                              • Opcode ID: 7bed6d618ee81da02e5920aeaab0abd1f30ed840c40f4c2849e8955e45a0a951
                                                                                                                              • Instruction ID: 4071723a11783d2da8da933f82134b9c6f3815e49c8d87d463163304bf45e319
                                                                                                                              • Opcode Fuzzy Hash: 7bed6d618ee81da02e5920aeaab0abd1f30ed840c40f4c2849e8955e45a0a951
                                                                                                                              • Instruction Fuzzy Hash: 4032A360B043406ADA18B776DC57BBE269A8FC1748F04443FB8467B2E2DE7C9D45839E

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 435 413fd4-41401f call 401faa call 41aa73 call 401faa call 401d64 call 401e8f 447 414021-414028 Sleep 435->447 448 41402e-41407c call 401f66 call 401d64 call 401fbd call 41afc3 call 404262 call 401d64 call 40b125 435->448 447->448 463 4140f0-41418a call 401f66 call 401d64 call 401fbd call 41afc3 call 401d64 * 2 call 4085b4 call 4027cb call 401eef call 401eea * 2 call 401d64 call 405422 448->463 464 41407e-4140ed call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 401d64 call 4022f8 call 401d64 call 401e8f call 404101 448->464 517 41419a-4141a1 463->517 518 41418c-414198 463->518 464->463 519 4141a6-414242 call 40541d call 404cbf call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 2 call 401d64 call 401e8f call 401d64 call 401e8f call 413f9a 517->519 518->519 546 414244-41428a WSAGetLastError call 41bc76 call 404c9e call 401f66 call 41a686 call 401eea 519->546 547 41428f-41429d call 4041f1 519->547 570 414b54-414b66 call 4047eb call 4020b4 546->570 553 4142ca-4142df call 404915 call 40428c 547->553 554 41429f-4142c5 call 401f66 * 2 call 41a686 547->554 569 4142e5-414432 call 401d64 * 2 call 404cbf call 405ce6 call 4027cb call 405ce6 call 4027cb call 401f66 call 41a686 call 401eea * 4 call 41a96d call 413683 call 4082dc call 401d64 call 401fbd call 4022f8 call 401e8f * 2 call 41265d 553->569 553->570 554->570 632 414434-414441 call 40541d 569->632 633 414446-41446d call 401e8f call 412513 569->633 582 414b68-414b88 call 401d64 call 401e8f Sleep 570->582 583 414b8e-414b96 call 401d8c 570->583 582->583 583->463 632->633 639 414474-414abb call 403b40 call 40cbf1 call 41adee call 41aec8 call 41ad46 call 401d64 GetTickCount call 41ad46 call 41aca0 call 41ad46 * 2 call 41ac52 call 41aec8 * 5 call 40e679 call 41aec8 call 4027ec call 40275c call 4027cb call 40275c call 4027cb * 3 call 40275c call 4027cb call 405ce6 call 4027cb call 405ce6 call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 40275c call 4027cb call 405ce6 call 4027cb * 5 call 40275c call 4027cb call 40275c call 4027cb * 7 call 40275c call 404468 call 401eea * 50 call 401e13 call 401eea * 6 call 401e13 call 4045d5 633->639 640 41446f-414471 633->640 885 414ac0-414ac7 639->885 640->639 886 414ac9-414ad0 885->886 887 414adb-414ae2 885->887 886->887 888 414ad2-414ad4 886->888 889 414ae4-414ae9 call 40a767 887->889 890 414aee-414b20 call 405415 call 401f66 * 2 call 41a686 887->890 888->887 889->890 901 414b22-414b2e CreateThread 890->901 902 414b34-414b4f call 401eea * 2 call 401e13 890->902 901->902 902->570
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00000000,00000000), ref: 00414028
                                                                                                                              • WSAGetLastError.WS2_32 ref: 00414249
                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00414B88
                                                                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep$ErrorLastLocalTime
                                                                                                                              • String ID: @CG$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe$Connected | $Connecting | $Connection Error: $Exe$Rmc-R1T905$TLS Off$TLS On $TUF$XCG$XCG$XCG$`=G$dCG$>G$>G$BG
                                                                                                                              • API String ID: 524882891-3024261457
                                                                                                                              • Opcode ID: 80625349acd9d1b545edb6c8a6596fe91598f67afc63d626cf62b10ce9937dfa
                                                                                                                              • Instruction ID: a0bb0b13232d9f5991351636829aab2dda2428bc81dc0b9639db3628de0ead2f
                                                                                                                              • Opcode Fuzzy Hash: 80625349acd9d1b545edb6c8a6596fe91598f67afc63d626cf62b10ce9937dfa
                                                                                                                              • Instruction Fuzzy Hash: 58524E31A001145ADB18F771DDA6AEE73A59F90708F1041BFB80A771E2EF385E85CA9D

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                                                                                • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                                                                                • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001151
                                                                                                                                • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                                                                                • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                                                                                • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                                                                                • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                                                                                • Part of subcall function 100010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 100011D0
                                                                                                                                • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                                                                              • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                                                                              • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                                                                              • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                                                                              • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                                                                              • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                                                                              • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                                                                              • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                                                                              • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                                                                              • String ID: )$Foxmail$ProgramFiles
                                                                                                                              • API String ID: 672098462-2938083778
                                                                                                                              • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                              • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                                                                              • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                                                                              • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00001388), ref: 00409E62
                                                                                                                                • Part of subcall function 00409D97: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                                                • Part of subcall function 00409D97: GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                                                • Part of subcall function 00409D97: Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                                                • Part of subcall function 00409D97: CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00409E9E
                                                                                                                              • GetFileAttributesW.KERNEL32(00000000), ref: 00409EAF
                                                                                                                              • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 00409EC6
                                                                                                                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 00409F40
                                                                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                              • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00465900,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A049
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                                              • String ID: @CG$@CG$XCG$XCG$xAG$xAG
                                                                                                                              • API String ID: 3795512280-3163867910
                                                                                                                              • Opcode ID: 877950ae7b0bd9b45028e34a911ad9e1986cf018aa671b7711b2068c48f27938
                                                                                                                              • Instruction ID: b7dfc09a395f5416f32c5fe597dbb364f69b6ed32616efff49b152d1c9b912f4
                                                                                                                              • Opcode Fuzzy Hash: 877950ae7b0bd9b45028e34a911ad9e1986cf018aa671b7711b2068c48f27938
                                                                                                                              • Instruction Fuzzy Hash: 30518D716043005ACB05BB72D866ABF769AAFD1309F00053FF886B71E2DF3D9D44869A

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1096 411c81-411cca GetModuleFileNameW call 401faa * 3 1103 411ccc-411d56 call 41ab38 call 401e8f call 40c854 call 401eea call 41ab38 call 401e8f call 40c854 call 401eea call 41ab38 call 401e8f call 40c854 call 401eea 1096->1103 1128 411d58-411de8 call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 4176b6 call 401e13 * 4 1103->1128 1151 411df8 1128->1151 1152 411dea-411df2 1128->1152 1153 411dfa-411e8a call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 4176b6 call 401e13 * 4 1151->1153 1152->1128 1152->1151 1177 411e9a 1153->1177 1178 411e8c-411e94 1153->1178 1179 411e9c-411f2c call 401e8f call 403b40 call 403cbb call 403cdc call 4028cf call 401e07 call 4176b6 call 401e13 * 4 1177->1179 1178->1153 1178->1177 1203 411f3c-411f60 1179->1203 1204 411f2e-411f36 1179->1204 1205 411f64-411f80 call 401e07 call 41b61a 1203->1205 1204->1179 1204->1203 1211 411f82-411f91 call 401e07 DeleteFileW 1205->1211 1212 411f97-411fb3 call 401e07 call 41b61a 1205->1212 1211->1212 1219 411fd0 1212->1219 1220 411fb5-411fce call 401e07 DeleteFileW 1212->1220 1222 411fd4-411ff0 call 401e07 call 41b61a 1219->1222 1220->1222 1228 411ff2-412004 call 401e07 DeleteFileW 1222->1228 1229 41200a-41200c 1222->1229 1228->1229 1230 412019-412024 Sleep 1229->1230 1231 41200e-412010 1229->1231 1230->1205 1234 41202a-41203c call 408339 1230->1234 1231->1230 1233 412012-412017 1231->1233 1233->1230 1233->1234 1238 412092-4120b1 call 401e13 * 3 1234->1238 1239 41203e-41204c call 408339 1234->1239 1250 4120b6-41211f call 40b027 call 401e07 call 401fbd call 4123f7 call 401e13 call 405422 1238->1250 1239->1238 1245 41204e-41205c call 408339 1239->1245 1245->1238 1251 41205e-41208a call 401e13 * 3 1245->1251 1272 412125-41226f call 41aec8 call 41ad46 call 4027ec call 4027cb * 6 call 40275c call 4027cb call 40275c call 404468 call 401eea * 10 1250->1272 1273 412274-41231b call 41aec8 call 4027ec call 4027cb * 6 call 40275c call 404468 1250->1273 1251->1103 1268 412090 1251->1268 1268->1250 1342 41236f-4123cf call 401eea call 401e13 call 401eea * 7 1272->1342 1312 412320-41236b call 401eea * 7 1273->1312 1312->1342 1372 4123d4-4123f6 call 401eea * 2 1342->1372
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00411C9A
                                                                                                                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,00457288,00000000,?,?,?,?,00465900,0040C07B,004661E4), ref: 0041AB5F
                                                                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411F91
                                                                                                                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00411FC8
                                                                                                                              • DeleteFileW.KERNEL32(00000000,00465324,00465324,00465324), ref: 00412004
                                                                                                                              • Sleep.KERNEL32(000001F4,00465324,00465324,00465324), ref: 0041201E
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Delete$CloseHandle$CurrentModuleNameProcessSleepsend
                                                                                                                              • String ID: HDG$HDG$>G$>G
                                                                                                                              • API String ID: 1351907930-1666402509
                                                                                                                              • Opcode ID: 42277b3b42eb109334dd24111a89349f796790d7aa6157c0bb389f63487bc69c
                                                                                                                              • Instruction ID: 1febf249a593eb43810efab42e14b6693ac358e03ba90545e56d33427da79e18
                                                                                                                              • Opcode Fuzzy Hash: 42277b3b42eb109334dd24111a89349f796790d7aa6157c0bb389f63487bc69c
                                                                                                                              • Instruction Fuzzy Hash: 960243315083414AC325FB61D891AEFB7D5AFD4308F50493FF88A931E2EF785A49C69A

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1377 41bce3-41bd10 LoadLibraryA 1379 41bd22-41bd39 1377->1379 1380 41bd12-41bd1d 1377->1380 1385 41bd4b-41be6e LoadLibraryA 1379->1385 1386 41bd3b-41bd46 1379->1386 1380->1379 1386->1385
                                                                                                                              APIs
                                                                                                                              • LoadLibraryA.KERNEL32(0046BE5C,GetProcessImageFileNameW,?,?,?,?,0040D783), ref: 0041BCF8
                                                                                                                              • LoadLibraryA.KERNEL32(Iphlpapi,0046BFAC,?,?,?,?,0040D783), ref: 0041BE50
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad
                                                                                                                              • String ID: GetProcessImageFileNameW$Iphlpapi$SetProcessDpiAwareness$`Wu$kernel32$ntdll
                                                                                                                              • API String ID: 1029625771-2176502075
                                                                                                                              • Opcode ID: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                                              • Instruction ID: 894fbade80705e672e772900be83df88f70523cf1842e1027a1ce5ee2e2841b6
                                                                                                                              • Opcode Fuzzy Hash: 0789f4e3f810de028ed60e0db8f6a6efc83e65cfda48e5b03c752fe52fb7e632
                                                                                                                              • Instruction Fuzzy Hash: 2831EDA0E4031C7ADA107FB69C49E5B7E9CD944B953110827B508D3162FBBDA9809EEE

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1454 4126d2-4126e9 RegCreateKeyA 1455 412722 1454->1455 1456 4126eb-412712 call 4022f8 call 401e8f RegSetValueExA 1454->1456 1457 412724-412730 call 401eea 1455->1457 1464 41271a-412720 1456->1464 1464->1457
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyA.ADVAPI32(80000001,00000000,<gF), ref: 004126E1
                                                                                                                              • RegSetValueExA.KERNEL32(<gF,?,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,hHgF,0046673C), ref: 00412709
                                                                                                                              • RegCloseKey.KERNEL32(?,?,?,0040E5FB,hHgF,0046673C), ref: 00412714
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValue
                                                                                                                              • String ID: hu$<gF$pth_unenc
                                                                                                                              • API String ID: 1818849710-422784625
                                                                                                                              • Opcode ID: 36534823d3ce9f98563c4483b9d5abfbf4d581a051d435d494d2af73573a8983
                                                                                                                              • Instruction ID: d7c223529d0a909ac1d5b5cf1be9cbd74eb10d05c00374dbcf2eb8abb0eb8976
                                                                                                                              • Opcode Fuzzy Hash: 36534823d3ce9f98563c4483b9d5abfbf4d581a051d435d494d2af73573a8983
                                                                                                                              • Instruction Fuzzy Hash: 98F09032040104FBCB019FA0ED55EEF37ACEF04751F108139FD06A61A1EA75DE04EA94

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1465 1000c7e6-1000c7ed GetModuleHandleA 1466 1000c82d 1465->1466 1467 1000c7ef-1000c7fe call 1000c803 1465->1467 1468 1000c82f-1000c833 1466->1468 1476 1000c800-1000c80b GetProcAddress 1467->1476 1477 1000c865 1467->1477 1470 1000c872 call 1000c877 1468->1470 1471 1000c835-1000c83d GetModuleHandleA 1468->1471 1474 1000c83f-1000c847 1471->1474 1474->1474 1478 1000c849-1000c84c 1474->1478 1476->1466 1480 1000c80d-1000c81a VirtualProtect 1476->1480 1479 1000c866-1000c86e 1477->1479 1478->1468 1481 1000c84e-1000c850 1478->1481 1487 1000c870 1479->1487 1483 1000c82c 1480->1483 1484 1000c81c-1000c82a VirtualProtect 1480->1484 1485 1000c852-1000c854 1481->1485 1486 1000c856-1000c85e 1481->1486 1483->1466 1484->1483 1488 1000c85f-1000c860 GetProcAddress 1485->1488 1486->1488 1487->1478 1488->1477
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                              • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                                • Part of subcall function 1000C803: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                                • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2099061454-0
                                                                                                                              • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                              • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                                                                              • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                                                                              • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1537 409d97-409da7 1538 409e44-409e47 1537->1538 1539 409dad-409daf 1537->1539 1540 409db2-409dd8 call 401e07 CreateFileW 1539->1540 1543 409e18 1540->1543 1544 409dda-409de8 GetFileSize 1540->1544 1545 409e1b-409e1f 1543->1545 1546 409dea 1544->1546 1547 409e0f-409e16 CloseHandle 1544->1547 1545->1540 1550 409e21-409e24 1545->1550 1548 409df4-409dfb 1546->1548 1549 409dec-409df2 1546->1549 1547->1545 1551 409e04-409e09 Sleep 1548->1551 1552 409dfd-409dff call 40a7f0 1548->1552 1549->1547 1549->1548 1550->1538 1553 409e26-409e2d 1550->1553 1551->1547 1552->1551 1553->1538 1555 409e2f-409e3f call 4082dc call 4098a5 1553->1555 1555->1538
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00409E6F), ref: 00409DCD
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00409E6F), ref: 00409DDC
                                                                                                                              • Sleep.KERNEL32(00002710,?,?,?,00409E6F), ref: 00409E09
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,00409E6F), ref: 00409E10
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateHandleSizeSleep
                                                                                                                              • String ID: `AG
                                                                                                                              • API String ID: 1958988193-3058481221
                                                                                                                              • Opcode ID: 75e7fd678ed2f7c0c2e949815b1bdc0f2cc1c3ddce83e06ffb6a35647be39129
                                                                                                                              • Instruction ID: 61dc848fc85204ea7fc5a67171cad01df1347b3512dd41eabc6ad436608203b4
                                                                                                                              • Opcode Fuzzy Hash: 75e7fd678ed2f7c0c2e949815b1bdc0f2cc1c3ddce83e06ffb6a35647be39129
                                                                                                                              • Instruction Fuzzy Hash: 3A11C4303407406AE731E764E88962B7A9AAB91311F44057EF18562AE3D7389CD1829D

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1559 4127d5-4127eb RegCreateKeyA 1560 412818-41281b 1559->1560 1561 4127ed-412807 RegSetValueExA 1559->1561 1562 41280f-412812 1561->1562 1562->1560 1563 412814-412817 1562->1563
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                              • RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValue
                                                                                                                              • String ID: hu$TUF
                                                                                                                              • API String ID: 1818849710-3459243726
                                                                                                                              • Opcode ID: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                                              • Instruction ID: 4d8f19d4f5fba69279ea975c705bdc3302fb28fe13ea63ccb444db4f968143a5
                                                                                                                              • Opcode Fuzzy Hash: 386e33d00f3fb5cef405d4ff1ae12e7e359dce24562d3d83ccac8fce873b9f24
                                                                                                                              • Instruction Fuzzy Hash: 8DE03071540204BFEF115B909C05FDB3BA8EB05B95F004161FA05F6191D271CE14D7A4

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 1564 410b19-410b3a call 4105b9 1567 410b40-410b49 1564->1567 1568 410d6f 1564->1568 1569 410d64 1567->1569 1570 410b4f-410b61 call 4105b9 1567->1570 1571 410d71-410d78 1568->1571 1573 410d69 SetLastError 1569->1573 1570->1568 1575 410b67-410b72 1570->1575 1573->1568 1575->1569 1576 410b78-410b81 1575->1576 1576->1569 1577 410b87-410b8b 1576->1577 1577->1569 1578 410b91-410b9e 1577->1578 1579 410ba0 1578->1579 1580 410bbf-410be5 GetNativeSystemInfo call 4105ab * 2 1578->1580 1581 410ba3-410bbd 1579->1581 1580->1569 1586 410beb-410c05 call 410abe 1580->1586 1581->1580 1581->1581 1589 410c07-410c1d call 410abe 1586->1589 1590 410c26-410c3b GetProcessHeap RtlAllocateHeap 1586->1590 1589->1590 1597 410c1f-410c21 1589->1597 1592 410c3d-410c4d call 410ad5 1590->1592 1593 410c4f-410c9a call 4105b9 1590->1593 1592->1597 1600 410ca0-410ce2 call 410abe call 4105cc 1593->1600 1601 410d45-410d4c call 410eb0 1593->1601 1597->1573 1600->1601 1609 410ce4-410cec 1600->1609 1601->1568 1610 410cf7-410cf9 1609->1610 1611 410cee-410cf5 call 4108d5 1609->1611 1613 410cfa-410d06 call 410975 1610->1613 1611->1613 1613->1601 1617 410d08-410d0a call 410769 1613->1617 1619 410d0f-410d11 1617->1619 1619->1601 1620 410d13-410d1c call 4108a4 1619->1620 1620->1601 1623 410d1e-410d25 1620->1623 1624 410d27-410d2d 1623->1624 1625 410d5c 1623->1625 1626 410d57-410d5a 1624->1626 1627 410d2f-410d38 1624->1627 1628 410d60-410d62 1625->1628 1626->1628 1630 410d3a-410d3f SetLastError 1627->1630 1631 410d4e-410d55 1627->1631 1628->1571 1630->1601 1631->1628
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004105B9: SetLastError.KERNEL32(0000000D,00410B38,?,00000000), ref: 004105BF
                                                                                                                              • GetNativeSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410BC4
                                                                                                                              • GetProcessHeap.KERNEL32(00000008,00000040,?,?,00000000), ref: 00410C2A
                                                                                                                              • RtlAllocateHeap.NTDLL(00000000), ref: 00410C31
                                                                                                                              • SetLastError.KERNEL32(0000045A), ref: 00410D3F
                                                                                                                              • SetLastError.KERNEL32(000000C1,?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00410B15), ref: 00410D69
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$Heap$AllocateInfoNativeProcessSystem
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4001361727-0
                                                                                                                              • Opcode ID: d5c2a01c5980a64f5d2f421047647a0a2e4768dfdee4cbdfd5f87c29c1642d81
                                                                                                                              • Instruction ID: 414678d8c61d87a8872ee73c425a8c4ab38aff0ef96490e16bc3f9b9534d1ba0
                                                                                                                              • Opcode Fuzzy Hash: d5c2a01c5980a64f5d2f421047647a0a2e4768dfdee4cbdfd5f87c29c1642d81
                                                                                                                              • Instruction Fuzzy Hash: 1861C270200301ABD720DF66C981BA77BE6BF44744F04412AF9058B786EBF8E8C5CB99
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(000001F4), ref: 0040A461
                                                                                                                              • GetForegroundWindow.USER32 ref: 0040A467
                                                                                                                              • GetWindowTextLengthW.USER32(00000000), ref: 0040A470
                                                                                                                              • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040A4A4
                                                                                                                              • Sleep.KERNEL32(000003E8), ref: 0040A574
                                                                                                                                • Part of subcall function 00409D58: SetEvent.KERNEL32(?,?,00000000,0040A91C,00000000), ref: 00409D84
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$SleepText$EventForegroundLength
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 828943121-0
                                                                                                                              • Opcode ID: 84c26744dd58c7185c74d7688628fa4462404656743dfceada16ed6b0df6dbe2
                                                                                                                              • Instruction ID: 0ecdfa35f4bf358d0b6072dbfc0ad8fc4f94b2a12b5a089c7f39fa9b67fb4d59
                                                                                                                              • Opcode Fuzzy Hash: 84c26744dd58c7185c74d7688628fa4462404656743dfceada16ed6b0df6dbe2
                                                                                                                              • Instruction Fuzzy Hash: C451DF316083005BC614FB21D84AAAE7794BF84318F50493FF846A62E2EF7C9E55C69F
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                                • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                                                                                • Part of subcall function 1000C7E6: GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                                • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                                • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProcProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2099061454-0
                                                                                                                              • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                              • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                                                                              • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                              • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                                                                              APIs
                                                                                                                              • GetProcAddress.KERNEL32(00000000,1000C7F4), ref: 1000C804
                                                                                                                              • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                                                                              • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                                                                              • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 1000C860
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProcProtectVirtual$HandleModule
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2152742572-0
                                                                                                                              • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                              • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                                                                              • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                                                                              • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                                                                              APIs
                                                                                                                              • send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,00000000,LAL), ref: 0040450E
                                                                                                                              • SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00414CE9,0000004C), ref: 0040453C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EventObjectSingleWaitsend
                                                                                                                              • String ID: LAL
                                                                                                                              • API String ID: 3963590051-3302426157
                                                                                                                              • Opcode ID: c01045b0fc5ec34aa7b775e7f5bd8615eb1627d72fad9cc7689b2927337d7a5d
                                                                                                                              • Instruction ID: 68c7e6670e460543dd9c105572fcb78fed3a06f13f8c8b410ea91b680b50408d
                                                                                                                              • Opcode Fuzzy Hash: c01045b0fc5ec34aa7b775e7f5bd8615eb1627d72fad9cc7689b2927337d7a5d
                                                                                                                              • Instruction Fuzzy Hash: 192143B29001196BDF04BBA5DC96DEE777CFF54358B00013EF916B21E1EA78A604D6A4
                                                                                                                              APIs
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,004099A9,?,00000000,00000000), ref: 0040992A
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00008993,?,00000000,00000000), ref: 0040993A
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,004099B5,?,00000000,00000000), ref: 00409946
                                                                                                                                • Part of subcall function 0040A876: GetLocalTime.KERNEL32(?,00465B24,?), ref: 0040A884
                                                                                                                                • Part of subcall function 0040A876: wsprintfW.USER32 ref: 0040A905
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateThread$LocalTimewsprintf
                                                                                                                              • String ID: $[F
                                                                                                                              • API String ID: 465354869-116741908
                                                                                                                              • Opcode ID: 93ecc38ed16a6538b3b5d77cafd7e2b75f2939c3509e8f5ca6e04fd81c74ac6b
                                                                                                                              • Instruction ID: 73cd13916ef890eca76c0e29a3751801184202c96e3ca0ae9416a03768ca9078
                                                                                                                              • Opcode Fuzzy Hash: 93ecc38ed16a6538b3b5d77cafd7e2b75f2939c3509e8f5ca6e04fd81c74ac6b
                                                                                                                              • Instruction Fuzzy Hash: CF11ABB15003097AD220BA36DC87CBF765CDA813A8B40053EF845225D3EA785E54C6FB
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                              • RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 3677997916-423011080
                                                                                                                              • Opcode ID: a4cfaa0bc036f6297b31860654aeca297227e6615f7ad86a9e1c4f74b1318917
                                                                                                                              • Instruction ID: 155fce86b91483c744b9f02885d56de91ccd1cdd8f33956e2d71fd22bd1c87ae
                                                                                                                              • Opcode Fuzzy Hash: a4cfaa0bc036f6297b31860654aeca297227e6615f7ad86a9e1c4f74b1318917
                                                                                                                              • Instruction Fuzzy Hash: F0F08176900118BBCB209BA1ED48DEF7FBDEB44751F004066BA06E2150D6749E55DBA8
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                              • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                              • RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 3677997916-423011080
                                                                                                                              • Opcode ID: e356916b1740155a69653a68473027dca2ca6835ab0d3846d735c0fff301d5eb
                                                                                                                              • Instruction ID: c18416eb0b1572374c3e2b3be0649ca89fc6f9e16ed4320a44d925c8ae57db2a
                                                                                                                              • Opcode Fuzzy Hash: e356916b1740155a69653a68473027dca2ca6835ab0d3846d735c0fff301d5eb
                                                                                                                              • Instruction Fuzzy Hash: BD018131404229FBDF216FA1DC45DDF7F78EF11754F004065BA04A21A1D7758AB5DBA8
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                              • RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 3677997916-423011080
                                                                                                                              • Opcode ID: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                                              • Instruction ID: 3c8b5742b91bab9b7a0bfd6479237677f271592d1db5ef4b45a1d16c6b8d7bbd
                                                                                                                              • Opcode Fuzzy Hash: 9045fb9a7a6208df116313aaf282ceb7280aaf27367a6f7e2add9e4d3bf57581
                                                                                                                              • Instruction Fuzzy Hash: C0F03A76900208BFDF119FA0AC45FDF7BB9EB04B55F1040A1FA05F6291D670DA54EB98
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,0040B996,004660E0), ref: 00412485
                                                                                                                              • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,0040B996,004660E0), ref: 00412499
                                                                                                                              • RegCloseKey.KERNEL32(?,?,?,0040B996,004660E0), ref: 004124A4
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 3677997916-423011080
                                                                                                                              • Opcode ID: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                                              • Instruction ID: 2a31b93e49ffe9e6f23ef690bd11c8afd6de107f9352384350bf23698ee7218d
                                                                                                                              • Opcode Fuzzy Hash: e297991b72ec1606279c96c89a25a7ac8737aea41b7b6b8683e2e1c686c69e22
                                                                                                                              • Instruction Fuzzy Hash: 46E06531405234BBDF314BA2AD0DDDB7FACEF16BA17004061BC09A2251D2658E50E6E8
                                                                                                                              APIs
                                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,?), ref: 00404778
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,?,?,00000000,00000000), ref: 0040478C
                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000,00000000,?,?,00000000), ref: 00404797
                                                                                                                              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,?,00000000), ref: 004047A0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3360349984-0
                                                                                                                              • Opcode ID: efe72d8fb6a6ee886ba62aacab9348a51a2dbb0c49a4b7b3a8455bef6ef49e3e
                                                                                                                              • Instruction ID: f4983b6e647f91c6eb1a16b69ab68a2f9d5597509a23169db7b615edd0c6cdea
                                                                                                                              • Opcode Fuzzy Hash: efe72d8fb6a6ee886ba62aacab9348a51a2dbb0c49a4b7b3a8455bef6ef49e3e
                                                                                                                              • Instruction Fuzzy Hash: 34417171508301ABC700FB61CC55D7FB7E9AFD5315F00093EF892A32E2EA389909866A
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNEL32(00000080,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,00466330), ref: 0041B5CE
                                                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5EB
                                                                                                                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B5FF
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0041B60C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateHandlePointerWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3604237281-0
                                                                                                                              • Opcode ID: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                                              • Instruction ID: 083799f3d1f95ebfb1fb2bbe8bc155d348f6fb5eb74ded268dd94cd43ec1eb57
                                                                                                                              • Opcode Fuzzy Hash: cba3a97e1e2bda49592f8a8e1d6d35a5d6160c6c563f13c2ae5fe5c742252b28
                                                                                                                              • Instruction Fuzzy Hash: 7501F5712092157FE6104F28AC89EBB739EEB86379F10063AF552C22C0D725CD8586BE
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0041B647
                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041B66C
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0041B67A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateHandleReadSize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3919263394-0
                                                                                                                              • Opcode ID: b60cbf6297e9a3f4f3584772fc93096cb31a77e7bd5814ad1416a09da33a0235
                                                                                                                              • Instruction ID: 0a6fce4b3becde4f67ebc64a516323d43c368a538d14007d95c0a1c89629aad3
                                                                                                                              • Opcode Fuzzy Hash: b60cbf6297e9a3f4f3584772fc93096cb31a77e7bd5814ad1416a09da33a0235
                                                                                                                              • Instruction Fuzzy Hash: B3F0F6B12053047FE6101B25FC85FBF375CDB867A5F00023EFC01A22D1DA658C459179
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CountEventTick
                                                                                                                              • String ID: >G
                                                                                                                              • API String ID: 180926312-1296849874
                                                                                                                              • Opcode ID: fd07dc4cc586dca5c4ac7e515bf5341b65f4a5f6b26874f91a29a8c60f9ed1de
                                                                                                                              • Instruction ID: d5b3ec7783a4dd7183bbf31121b5a8e130ff38f85bff4fd723ced1f164cd3d8d
                                                                                                                              • Opcode Fuzzy Hash: fd07dc4cc586dca5c4ac7e515bf5341b65f4a5f6b26874f91a29a8c60f9ed1de
                                                                                                                              • Instruction Fuzzy Hash: 1A5170315042409AC624FB71D8A2AEF73A5AFD1314F40853FF94A671E2EF389949C69A
                                                                                                                              APIs
                                                                                                                              • connect.WS2_32(?,00000000,00000000), ref: 004042A5
                                                                                                                              • WSAGetLastError.WS2_32(?,?,?,0040192B), ref: 004043E7
                                                                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLastLocalTimeconnect
                                                                                                                              • String ID: 8TF
                                                                                                                              • API String ID: 227477821-2488340943
                                                                                                                              • Opcode ID: 47a1fee59ce2290342178283e748e5839752625c488d337efedbbd69557cff8c
                                                                                                                              • Instruction ID: b196b808fbc66b1ac8da6b4b51d7f626a0d3d22bc4cde50e21f83cd2c7739b74
                                                                                                                              • Opcode Fuzzy Hash: 47a1fee59ce2290342178283e748e5839752625c488d337efedbbd69557cff8c
                                                                                                                              • Instruction Fuzzy Hash: ED4128B1B00202A7CB04B77A8C5B66D7A55AB81368B40007FF901676D3EE7DAD6087DF
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,004664C4,00000000), ref: 0041B16C
                                                                                                                                • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,004664C4,00000000), ref: 0041B173
                                                                                                                                • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                                • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                                • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                              • StrToIntA.SHLWAPI(00000000,0046BC48,?,00000000,00000000,00474358,00000003,00000000,00000032,00000000,0046662C,00000000,0000000E,00000000,0046556C,00000003), ref: 0041A4D9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                                                                              • String ID: (32 bit)$ (64 bit)
                                                                                                                              • API String ID: 782494840-3091455541
                                                                                                                              • Opcode ID: 18824b54de241898270a4da41a27c94fe4149e7eff7bcdfff674197cad82ef89
                                                                                                                              • Instruction ID: 19977b185b3bcff34fa520d2ecc4782d624f476aadfe6515b429a208ce335d2f
                                                                                                                              • Opcode Fuzzy Hash: 18824b54de241898270a4da41a27c94fe4149e7eff7bcdfff674197cad82ef89
                                                                                                                              • Instruction Fuzzy Hash: EF11E9A060020166C704B365DCABDBF765ADB90304F50443FB906E31D2EB6C9E9683EE
                                                                                                                              APIs
                                                                                                                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040D9AA,0000000D,00000033,00000000,00000032,00000000,0046662C,00000000,0000000E,00000000,0046556C,00000003), ref: 0040BEE6
                                                                                                                              • GetLastError.KERNEL32 ref: 0040BEF1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateErrorLastMutex
                                                                                                                              • String ID: Rmc-R1T905
                                                                                                                              • API String ID: 1925916568-946744068
                                                                                                                              • Opcode ID: 4fc6c8ab555f373811983012bc0278dbf8eaec47087625f02d3033a79dd31813
                                                                                                                              • Instruction ID: f970ec9d0541ab61c93bafde2a4f59c5c821b48a7874ab2150ad5935bc14b509
                                                                                                                              • Opcode Fuzzy Hash: 4fc6c8ab555f373811983012bc0278dbf8eaec47087625f02d3033a79dd31813
                                                                                                                              • Instruction Fuzzy Hash: 75D012707083009BD7181774BC8A77D3555E784703F00417AB90FD55E1CB6888409919
                                                                                                                              APIs
                                                                                                                              • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041A53E
                                                                                                                              • InternetOpenUrlW.WININET(00000000,0046B95C,00000000,00000000,80000000,00000000), ref: 0041A554
                                                                                                                              • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041A56D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Internet$Open$FileRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 72386350-0
                                                                                                                              • Opcode ID: 812c1102ec2e06a4b0b6814efceb2098019f208c8c20a7b493144be5d6568b9f
                                                                                                                              • Instruction ID: 402fbdb1aff19a1981f8347c65821a4f206ec005c70a85ea4635686413b1fe25
                                                                                                                              • Opcode Fuzzy Hash: 812c1102ec2e06a4b0b6814efceb2098019f208c8c20a7b493144be5d6568b9f
                                                                                                                              • Instruction Fuzzy Hash: 2711C87110A3126BD214AA169C45DBF7FDCEF46365F00053EF905D2191DB689C48C6B6
                                                                                                                              APIs
                                                                                                                              • SetEvent.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404808
                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?,00404B8E,?,?,?,00404B26), ref: 00404811
                                                                                                                              • closesocket.WS2_32(000000FF), ref: 0040481F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseEventHandleclosesocket
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 803913606-0
                                                                                                                              • Opcode ID: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                                                                                              • Instruction ID: 5504d0c870acfe65fd0076db90b097e51f0e6d2514c589c74abed5ba37c9c78a
                                                                                                                              • Opcode Fuzzy Hash: 5ad18bbf4ae7feaed2857fa056367bca8483678701d03ea676763946d5c1548a
                                                                                                                              • Instruction Fuzzy Hash: 3C212C71104B149FCB216B26EC45A27BBE1EF40325F104A7EF2E612AF1CB76E851DB48
                                                                                                                              APIs
                                                                                                                              • GetLocalTime.KERNEL32(?,00473EE8,004745A8,00000000), ref: 00404946
                                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00473EE8,004745A8,00000000), ref: 00404994
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_00003B1D,?,00000000,00000000), ref: 004049A7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Create$EventLocalThreadTime
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2532271599-0
                                                                                                                              • Opcode ID: c66e3a453f584b82e2038408cb0ec16b21edc18dfa6e32afa4d5b91d633256c6
                                                                                                                              • Instruction ID: c7daaf492e0cec12b0841424890a61be8e5b61f5a3177df3d8f4b9063cedc03f
                                                                                                                              • Opcode Fuzzy Hash: c66e3a453f584b82e2038408cb0ec16b21edc18dfa6e32afa4d5b91d633256c6
                                                                                                                              • Instruction Fuzzy Hash: 38113AB19042547AC710A7BA8C49BCB7F9C9F86364F00407BF40462192C7789845CBFA
                                                                                                                              APIs
                                                                                                                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041A959
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: GlobalMemoryStatus
                                                                                                                              • String ID: @
                                                                                                                              • API String ID: 1890195054-2766056989
                                                                                                                              • Opcode ID: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                                                              • Instruction ID: dd145fffdacd7bda74fa2c6e5abe56fe406d4b7e613986be5c07feff288e4f4e
                                                                                                                              • Opcode Fuzzy Hash: 6a5e85952f382d12afcc854e62baf2dc0b8e461fb7fe04101b075e185c2318ef
                                                                                                                              • Instruction Fuzzy Hash: EFD067B99013189FCB20DFA8E945A8DBBF8FB48214F004529E946E3344E774E945CB95
                                                                                                                              APIs
                                                                                                                              • socket.WS2_32(00000000,00000001,00000006), ref: 00404212
                                                                                                                                • Part of subcall function 00404262: WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                                              • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404252
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateEventStartupsocket
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1953588214-0
                                                                                                                              • Opcode ID: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                                              • Instruction ID: 6d5c4ce7eefecebe47fda3b025552a79fd8a61a73b62065855ea20d17e135052
                                                                                                                              • Opcode Fuzzy Hash: 854d00471859da485f7a9b00171063840124e4cdae7de36f8ad07afc2a8c10ec
                                                                                                                              • Instruction Fuzzy Hash: A20171B05087809ED7358F38B8456977FE0AB15314F044DAEF1D697BA1C3B5A481CB18
                                                                                                                              APIs
                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433DE7
                                                                                                                                • Part of subcall function 00437BD7: RaiseException.KERNEL32(?,?,?,>C,?,?,?,?,?,?,?,?,00433E09,?,0046D5EC), ref: 00437C37
                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00433E04
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3476068407-0
                                                                                                                              • Opcode ID: 41f5bfb3cf2b31f65518166d0ab32b8bf848d4a3699c0758e808abc190c4af71
                                                                                                                              • Instruction ID: 1b32a2814776e74a5aaecdac66354fa275a8f3c838098619b8de34dc4906cb01
                                                                                                                              • Opcode Fuzzy Hash: 41f5bfb3cf2b31f65518166d0ab32b8bf848d4a3699c0758e808abc190c4af71
                                                                                                                              • Instruction Fuzzy Hash: 33F02B30C0020D77CB14BEA5E80699D772C4D08319F20923BB920915E1EF7CEB05858D
                                                                                                                              APIs
                                                                                                                              • GetForegroundWindow.USER32 ref: 0041AC74
                                                                                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041AC87
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$ForegroundText
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 29597999-0
                                                                                                                              • Opcode ID: da59836496d8ff89768ab60032630715300c65a21ebecdd14f5850d887cc1f1d
                                                                                                                              • Instruction ID: 3cf16c2a8257e52241c70e3f2477159e0ff99a2dafdd86ddfb3cfc0a4d760bbd
                                                                                                                              • Opcode Fuzzy Hash: da59836496d8ff89768ab60032630715300c65a21ebecdd14f5850d887cc1f1d
                                                                                                                              • Instruction Fuzzy Hash: 56E04875A0031467EB24A765AC4EFDA766C9704715F0000B9BA19D21C3E9B4EA04CBE4
                                                                                                                              APIs
                                                                                                                              • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 0040CA04
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LongNamePath
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 82841172-0
                                                                                                                              • Opcode ID: 0aed9ec59981cee5dc30913d76a2f12fed1bf19adaefaa5d03a6754d969e8596
                                                                                                                              • Instruction ID: 51cedb133b73bca78a9fc1065318242b3d6e678e936cb09da4a185c9a299c852
                                                                                                                              • Opcode Fuzzy Hash: 0aed9ec59981cee5dc30913d76a2f12fed1bf19adaefaa5d03a6754d969e8596
                                                                                                                              • Instruction Fuzzy Hash: 39413A721442009BC214FB21DD96DAFB7A4AE90759F10063FB546720E2EE7CAA49C69F
                                                                                                                              APIs
                                                                                                                              • VirtualProtect.KERNEL32(?,00410B02,?,00000000,?,00000000,00000000,00410891), ref: 0041075D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 1f5f5bcb50df5eab6b4ca8934853e6c5058cb0001586a28dc2c421d47bf62857
                                                                                                                              • Instruction ID: f15b865ef06e6e56f0e3155fe6c262580cd03049418ed3f125d30449dfe24c6e
                                                                                                                              • Opcode Fuzzy Hash: 1f5f5bcb50df5eab6b4ca8934853e6c5058cb0001586a28dc2c421d47bf62857
                                                                                                                              • Instruction Fuzzy Hash: 0B11CE72700101AFD6149A18C880BA6B766FF80710F5942AEE115CB292DBB5FCD2CA94
                                                                                                                              APIs
                                                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00446B31
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocateHeap
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1279760036-0
                                                                                                                              • Opcode ID: e1cbf0f418dbd952f962d5c9e60cb55fb82008d236692bd9a6b06c1f3f012db4
                                                                                                                              • Instruction ID: 23017b4f7b15ec8d1e6c8205d578d5100ba2a3a3bb6c043e3f5ab96588fe2cc9
                                                                                                                              • Opcode Fuzzy Hash: e1cbf0f418dbd952f962d5c9e60cb55fb82008d236692bd9a6b06c1f3f012db4
                                                                                                                              • Instruction Fuzzy Hash: 16E0E5312002B556FB202A6A9C05F5B7A88DB437A4F160133AC09D62D0CF5CEC4181AF
                                                                                                                              APIs
                                                                                                                              • WSAStartup.WS2_32(00000202,00000000), ref: 00404277
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Startup
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 724789610-0
                                                                                                                              • Opcode ID: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                                              • Instruction ID: eac2355bac846bce9fd0ddf676e945afe2a4b646382637a0be3cadb4b1fbcda1
                                                                                                                              • Opcode Fuzzy Hash: 95a2dab67d29c7ac03eac8c0eb79289a66407e1e5cc97b6f0f8b459783d59ee5
                                                                                                                              • Instruction Fuzzy Hash: E1D012325596084ED610AAB8AC0F8A47B5CD317611F0003BA6CB5826E3E640661CC6AB
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Deallocate
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1075933841-0
                                                                                                                              • Opcode ID: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                                              • Instruction ID: a98dd8728e001a7547a03d6555be836c7c4d92c50a1b5b3c87ce8ff60de75990
                                                                                                                              • Opcode Fuzzy Hash: fa11f090124af29c98583f2c3e9d30177ae40f5e0afd44ce9742dc7edc058cff
                                                                                                                              • Instruction Fuzzy Hash: 69A0123300C2016AC9852E00DD05C0ABFA1EB90360F20C41FF086140F0CB32A0B0A705
                                                                                                                              APIs
                                                                                                                              • VirtualAlloc.KERNEL32(?,?,?,?,00410BFE,?,00000000,00003000,00000040,00000000,?,00000000), ref: 00410ACE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AllocVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4275171209-0
                                                                                                                              • Opcode ID: 9702951664480ae04aaa1f1f49bea02567c4bdffe4003b29d8b2a531ebe9342b
                                                                                                                              • Instruction ID: 38694f91ddd66904e98ee13f1febf2482794bae3131ffd3a876a6d6af10a8f86
                                                                                                                              • Opcode Fuzzy Hash: 9702951664480ae04aaa1f1f49bea02567c4bdffe4003b29d8b2a531ebe9342b
                                                                                                                              • Instruction Fuzzy Hash: 29B00832418382EFCF02DF90DD0492ABAA2BB88712F084C6CB2A14017187228428EB16
                                                                                                                              APIs
                                                                                                                              • NtdllDefWindowProc_A.NTDLL(?,00000401,?,?), ref: 0041CAE9
                                                                                                                              • GetCursorPos.USER32(?), ref: 0041CAF8
                                                                                                                              • SetForegroundWindow.USER32(?), ref: 0041CB01
                                                                                                                              • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041CB1B
                                                                                                                              • Shell_NotifyIcon.SHELL32(00000002,00473B50), ref: 0041CB6C
                                                                                                                              • ExitProcess.KERNEL32 ref: 0041CB74
                                                                                                                              • CreatePopupMenu.USER32 ref: 0041CB7A
                                                                                                                              • AppendMenuA.USER32(00000000,00000000,00000000,0046C11C), ref: 0041CB8F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyNtdllProc_ProcessShell_Track
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1665278180-0
                                                                                                                              • Opcode ID: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                                              • Instruction ID: a66ed96c0d91d71762f770de87d5f41dd37c70c4e97b210e23d221b2b7ccacbc
                                                                                                                              • Opcode Fuzzy Hash: 17791859dac929b483a24ff72816a8478769eebc5405c417f6cbcdd658e3cffe
                                                                                                                              • Instruction Fuzzy Hash: 68212B71188209FFDB064F64FD4EAAA3F65EB04342F044135B906D40B2D7B9EA90EB18
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 0$1$2$3$4$5$6$7
                                                                                                                              • API String ID: 0-3177665633
                                                                                                                              • Opcode ID: 9b02e51a1cc6672d7d2f4342b27c01cb84a2fdb077451789e1e817f40a25d538
                                                                                                                              • Instruction ID: 2879f211a781d1662389055333b9a248a4bc7621c6500268a6892da51c348380
                                                                                                                              • Opcode Fuzzy Hash: 9b02e51a1cc6672d7d2f4342b27c01cb84a2fdb077451789e1e817f40a25d538
                                                                                                                              • Instruction Fuzzy Hash: CC61A370508301AEDB00EF21D862FEA77E4AF85754F40485EFA91672E1DF789A48C797
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004748F8), ref: 004198D8
                                                                                                                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 00419927
                                                                                                                              • GetLastError.KERNEL32 ref: 00419935
                                                                                                                              • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041996D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3587775597-0
                                                                                                                              • Opcode ID: 33ae8668460a34f99b5d88d781eb236d1c9b02fb7fa3c7b922b6d76dcea17702
                                                                                                                              • Instruction ID: 5304d2aa3016a1bb8b693e548c532b43deb082133906afc562c92feca393f19d
                                                                                                                              • Opcode Fuzzy Hash: 33ae8668460a34f99b5d88d781eb236d1c9b02fb7fa3c7b922b6d76dcea17702
                                                                                                                              • Instruction Fuzzy Hash: 37812F711083049BC614FB21DC959AFB7A8BF94718F50493EF582521E2EF78AA05CB9A
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F2B
                                                                                                                              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 004514C3
                                                                                                                              • IsValidCodePage.KERNEL32(00000000), ref: 0045151E
                                                                                                                              • IsValidLocale.KERNEL32(?,00000001), ref: 0045152D
                                                                                                                              • GetLocaleInfoW.KERNEL32(?,00001001,<D,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 00451575
                                                                                                                              • GetLocaleInfoW.KERNEL32(?,00001002,00000004,00000040), ref: 00451594
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                                              • String ID: <D$<D$<D
                                                                                                                              • API String ID: 745075371-3495170934
                                                                                                                              • Opcode ID: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                                              • Instruction ID: fdda48fcf8ef828b158f806230e01f9d82b9b72a6df542884d0e4dc3e0683d2c
                                                                                                                              • Opcode Fuzzy Hash: 5c8e94395c66df2641350def7a129c2a5847567c9c00908226c609ff7e549d11
                                                                                                                              • Instruction Fuzzy Hash: 5A51D571900205ABEF10EFA5CC40BBF73B8AF05702F14056BFD11EB262E7789A488769
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 0041B489
                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0041B4BB
                                                                                                                              • SetFileAttributesW.KERNEL32(?,00000080), ref: 0041B529
                                                                                                                              • DeleteFileW.KERNEL32(?), ref: 0041B536
                                                                                                                                • Part of subcall function 0041B42F: RemoveDirectoryW.KERNEL32(?), ref: 0041B50C
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0041B561
                                                                                                                              • RemoveDirectoryW.KERNEL32(00000000), ref: 0041B568
                                                                                                                              • GetLastError.KERNEL32 ref: 0041B570
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0041B583
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2341273852-0
                                                                                                                              • Opcode ID: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                                                              • Instruction ID: e81c2b0307560c21eb772b723951cbad4d8c7a866ea933437d0d5d39764c0eb1
                                                                                                                              • Opcode Fuzzy Hash: e3c00313fe9feb441b7390d1c72d337a5a5a4ab260ce0f05f37d8840b2d05d0a
                                                                                                                              • Instruction Fuzzy Hash: 0031627184921CAACB20D7B1AC89ADA77BCAF04309F4405EBF505D3181EB799AC5CE69
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,?,?,00474358), ref: 0040E233
                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,00474358), ref: 0040E25E
                                                                                                                              • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040E27A
                                                                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E2FD
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E30C
                                                                                                                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                                • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00474358), ref: 0040E371
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Close$CreateHandleProcess32$FileFirstModuleNameNextSnapshotToolhelp32Value
                                                                                                                              • String ID: BG
                                                                                                                              • API String ID: 726551946-3469110568
                                                                                                                              • Opcode ID: 9ae3f2eadca4b2b5020d36e28c341c045e358a7d03037eefbbae4030054e5340
                                                                                                                              • Instruction ID: ae31f71cb8b9f969ca9e83e5ca698076ed3bac053ed440982de07d1dc4d90588
                                                                                                                              • Opcode Fuzzy Hash: 9ae3f2eadca4b2b5020d36e28c341c045e358a7d03037eefbbae4030054e5340
                                                                                                                              • Instruction Fuzzy Hash: ED7172311083019BC714FB61D8519EF77A5BF91358F400D3EF986631E2EF38A959CA9A
                                                                                                                              APIs
                                                                                                                              • GetForegroundWindow.USER32 ref: 00409B3F
                                                                                                                              • GetWindowThreadProcessId.USER32(00000000,?), ref: 00409B4B
                                                                                                                              • GetKeyboardLayout.USER32(00000000), ref: 00409B52
                                                                                                                              • GetKeyState.USER32(00000010), ref: 00409B5C
                                                                                                                              • GetKeyboardState.USER32(?), ref: 00409B67
                                                                                                                              • ToUnicodeEx.USER32(00471BC0,?,?,?,00000010,00000000,00000000), ref: 00409C1C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                                                                                                              • String ID: 8[G
                                                                                                                              • API String ID: 3566172867-1691237782
                                                                                                                              • Opcode ID: a0d965aba47a8e542f40a1de740b2151b45cc5136cfd401da1c7b97c9ab4e1ec
                                                                                                                              • Instruction ID: f24a8317de74a0bbad47f265c67a45df51816e9018bfad09e00086f3728f1c27
                                                                                                                              • Opcode Fuzzy Hash: a0d965aba47a8e542f40a1de740b2151b45cc5136cfd401da1c7b97c9ab4e1ec
                                                                                                                              • Instruction Fuzzy Hash: EE318172508309AFD700DF90DC85FDBB7ECEB48715F00083ABA45961A1D6B5E948DB96
                                                                                                                              APIs
                                                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 0040B3B4
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040B3CE
                                                                                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B4F1
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040B517
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Find$CloseFile$FirstNext
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1164774033-0
                                                                                                                              • Opcode ID: d02c0825ba036a950cfaa8aadbfdf33c5fc79443b63d77beb3dd83211add2011
                                                                                                                              • Instruction ID: 89bba1744b34cafda07904381260291e44814ca984bf7dbd554ee600cd7873bd
                                                                                                                              • Opcode Fuzzy Hash: d02c0825ba036a950cfaa8aadbfdf33c5fc79443b63d77beb3dd83211add2011
                                                                                                                              • Instruction Fuzzy Hash: 4D512C319042195ADB14FBA1EC96AEE7768EF50318F50007FF805B31E2EF389A45CA9D
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00418EBF
                                                                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CreateFindFirst
                                                                                                                              • String ID: @CG$XCG$`HG$`HG$>G
                                                                                                                              • API String ID: 41799849-3780268858
                                                                                                                              • Opcode ID: c84b2157906eefc811eddadbbc396006860ea39ff9546330905ae9a52cc1840b
                                                                                                                              • Instruction ID: 861c71bda04042c44626cba1538e35c757a91b728f0af2478fb4c1063bb13cc5
                                                                                                                              • Opcode Fuzzy Hash: c84b2157906eefc811eddadbbc396006860ea39ff9546330905ae9a52cc1840b
                                                                                                                              • Instruction Fuzzy Hash: B08141315042405BC314FB62C892EEFB3A5AFD1718F50493FF946671E2EF389A49C69A
                                                                                                                              APIs
                                                                                                                              • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 0040B5B2
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040B5CC
                                                                                                                              • FindNextFileA.KERNEL32(00000000,?), ref: 0040B68C
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040B6B2
                                                                                                                              • FindClose.KERNEL32(00000000), ref: 0040B6D1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Find$Close$File$FirstNext
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3527384056-0
                                                                                                                              • Opcode ID: bb82511a4725d26c17b85528e43e7b57156d006e3afddd54477d4ce53050198a
                                                                                                                              • Instruction ID: 41d59f58487c11b5b23c2ebc8e3123b77d6604a8f5f59a85184e8f88ff1ca84c
                                                                                                                              • Opcode Fuzzy Hash: bb82511a4725d26c17b85528e43e7b57156d006e3afddd54477d4ce53050198a
                                                                                                                              • Instruction Fuzzy Hash: 65413A319042196ACB14F7A1EC569EE7768EE21318F50017FF801B31E2EF399A458A9E
                                                                                                                              APIs
                                                                                                                              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 0045127C
                                                                                                                              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,00451502,?,00000000), ref: 004512A5
                                                                                                                              • GetACP.KERNEL32(?,?,00451502,?,00000000), ref: 004512BA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InfoLocale
                                                                                                                              • String ID: ACP$OCP
                                                                                                                              • API String ID: 2299586839-711371036
                                                                                                                              • Opcode ID: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                                              • Instruction ID: bcb6c1b5649eca6e102b6d6ca9fa22aa61ab34f591545d84575f60c76f210f03
                                                                                                                              • Opcode Fuzzy Hash: 3e26eff85c0b030be7827b2fbb91fc7191fc27f2fce1bf15d40cdf94764cc661
                                                                                                                              • Instruction Fuzzy Hash: 50212722600100A6D7348F54D900BAB73A6AB40B66F1645E6FD09E7322F736DD49C799
                                                                                                                              APIs
                                                                                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                                                                                                              • _free.LIBCMT ref: 00448067
                                                                                                                                • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                                              • _free.LIBCMT ref: 00448233
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1286116820-0
                                                                                                                              • Opcode ID: 17a28fad9feb98d453baddc32b8ce2263c138f19eec085efd07942d5ff16946e
                                                                                                                              • Instruction ID: adcac59616ce0bf4d9b6f5e4feac4fc1c4b096f081e8a0f87c9a15d47e4c4f65
                                                                                                                              • Opcode Fuzzy Hash: 17a28fad9feb98d453baddc32b8ce2263c138f19eec085efd07942d5ff16946e
                                                                                                                              • Instruction Fuzzy Hash: 13510B719002099BE714DF69DC819AFB7BCEF41354F10456FE454A32A1EF389E46CB58
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 00416AC4
                                                                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00416ACB
                                                                                                                              • LookupPrivilegeValueA.ADVAPI32(00000000,0046BA18,?), ref: 00416ADD
                                                                                                                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00416AFC
                                                                                                                              • GetLastError.KERNEL32 ref: 00416B02
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3534403312-0
                                                                                                                              • Opcode ID: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                                              • Instruction ID: c28276ca820f5d67da4083ad645d4fedab17ddc29f560671af9b7c8b6b4fa774
                                                                                                                              • Opcode Fuzzy Hash: e04eb0b34037921419aad719b93aaa051d7dc20f4e189cf25d4eb9764effedfd
                                                                                                                              • Instruction Fuzzy Hash: 25F0D4B5805229BBDB10ABA1EC4DEEF7EBCEF05656F100061B805E2192D6748A44CAB5
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: m@E$m@E
                                                                                                                              • API String ID: 0-1909896462
                                                                                                                              • Opcode ID: 09a0945fa07873fb91c821a9c4a5358b420b0090a8a1551dfd4d9694090d3221
                                                                                                                              • Instruction ID: cffdc6bb8eb20f5336ace8b102e865ec7dcfb2cf624fb46ac032ba80a60d6a90
                                                                                                                              • Opcode Fuzzy Hash: 09a0945fa07873fb91c821a9c4a5358b420b0090a8a1551dfd4d9694090d3221
                                                                                                                              • Instruction Fuzzy Hash: 8A024C71E002199BEF14CFA9C9806AEBBF1FF88314F25826AD919E7350D735AD45CB84
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406ADD
                                                                                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00406BA5
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFind$FirstNextsend
                                                                                                                              • String ID: x@G$x@G
                                                                                                                              • API String ID: 4113138495-3390264752
                                                                                                                              • Opcode ID: 8f6245aba206ea80dcd21599642527e967778f8035267cf4038544236cb48fd5
                                                                                                                              • Instruction ID: 9df0c8526107c53e8273efc1e688d8f669138e67c86485f4ac558c26d22f9560
                                                                                                                              • Opcode Fuzzy Hash: 8f6245aba206ea80dcd21599642527e967778f8035267cf4038544236cb48fd5
                                                                                                                              • Instruction Fuzzy Hash: B42147725043015BC714FB61D8959AF77A8AFD1358F40093EF996A31D1EF38AA088A9B
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00443CF3,?,?,?,?,?,?,00000004), ref: 00450B61
                                                                                                                              • _wcschr.LIBVCRUNTIME ref: 00450BF1
                                                                                                                              • _wcschr.LIBVCRUNTIME ref: 00450BFF
                                                                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00443CF3,00000000,00443E13), ref: 00450CA2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4212172061-0
                                                                                                                              • Opcode ID: 2f1efdd49f250f153a7c8dca19099ac794f5d0f52f96597e3c8d2ebbc38e997e
                                                                                                                              • Instruction ID: a02e79dc60b90d06ce6287b0e519d5a2a37574338541b46fb9e412c2f7ec0900
                                                                                                                              • Opcode Fuzzy Hash: 2f1efdd49f250f153a7c8dca19099ac794f5d0f52f96597e3c8d2ebbc38e997e
                                                                                                                              • Instruction Fuzzy Hash: D7613B79600306AAD729AB75CC82AAB73ACEF05316F14052FFD05D7243E778E909C768
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,?,?,0041981A,00000000,00000000), ref: 00419BCD
                                                                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,?,0041981A,00000000,00000000), ref: 00419BE2
                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000,?,?,0041981A,00000000,00000000), ref: 00419BEF
                                                                                                                              • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,?,0041981A,00000000,00000000), ref: 00419BFA
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Service$Open$CloseHandleManagerStart
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2553746010-0
                                                                                                                              • Opcode ID: e25c39d92a846a462b53c10185a272e0ad60f5790e3d5b6c3523f631f015873d
                                                                                                                              • Instruction ID: 9ab78235182221d9a13884b701025ebbd4d22640777282bd149d85cf0e5c5631
                                                                                                                              • Opcode Fuzzy Hash: e25c39d92a846a462b53c10185a272e0ad60f5790e3d5b6c3523f631f015873d
                                                                                                                              • Instruction Fuzzy Hash: 46F0E971404314AFD2115B31FC88DBF2AACEF85BA2B00043AF54193191CF68CD4595B9
                                                                                                                              APIs
                                                                                                                              • FindResourceA.KERNEL32(0046BC64,0000000A,00000000), ref: 0041A650
                                                                                                                              • LoadResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A664
                                                                                                                              • LockResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A66B
                                                                                                                              • SizeofResource.KERNEL32(00000000,?,?,0040E183,00000000), ref: 0041A67A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3473537107-0
                                                                                                                              • Opcode ID: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                                              • Instruction ID: 83a829ee02157d331b98a48cb758db5ec39b6d120b3a3db205f860a33549a403
                                                                                                                              • Opcode Fuzzy Hash: e32b0715ad7aadeb38a8c4a618404dc1e86643bbbf9351d1ef3d996740a46f90
                                                                                                                              • Instruction Fuzzy Hash: 3EE01A3A200710ABCB211BA5BC8CD477E39E7867633140036F90582331DA358850CA59
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(00000000,?), ref: 00408E24
                                                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 00408E4D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFind$FirstNext
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1690352074-0
                                                                                                                              • Opcode ID: 93b373ded8de746f8dae62271f43dbd0e30d1148ac19aae5c5455e4b7ce1dff2
                                                                                                                              • Instruction ID: 60446431aa0b45b5fc099c057f6d50f3e7887136e12703af2d86415be67689ac
                                                                                                                              • Opcode Fuzzy Hash: 93b373ded8de746f8dae62271f43dbd0e30d1148ac19aae5c5455e4b7ce1dff2
                                                                                                                              • Instruction Fuzzy Hash: 357140328001099BCB15EBA1DC919EE7778AF54318F10427FE856B71E2EF386E45CB98
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNEL32(00000000,?,00465AA0,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B4A
                                                                                                                              • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407B6E
                                                                                                                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00407C76
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Find$File$CloseFirstNext
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3541575487-0
                                                                                                                              • Opcode ID: 41a783eebac27e52ab0c36b15521a89ad0f9566ac3c2cd9b8cb047674ec061c1
                                                                                                                              • Instruction ID: c296e4c637b16ec180f1d25cf2666c4e6f2336455dd814d501b84ef2841b6e91
                                                                                                                              • Opcode Fuzzy Hash: 41a783eebac27e52ab0c36b15521a89ad0f9566ac3c2cd9b8cb047674ec061c1
                                                                                                                              • Instruction Fuzzy Hash: 485173329041085ACB14FB65DD969DD7778AF50318F50417EB806B31E2EF38AB498B99
                                                                                                                              APIs
                                                                                                                              • ExitWindowsEx.USER32(00000000), ref: 0041595B
                                                                                                                              • LoadLibraryA.KERNEL32(0046B9C0,0046B9B0), ref: 00415970
                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00415977
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressExitLibraryLoadProcWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1366546845-0
                                                                                                                              • Opcode ID: aab80925934ccae96f8741da06f504ff3c5000924578288a6a0d4697c1601134
                                                                                                                              • Instruction ID: 6bc3f647bab7108089c0dcdc07fd09c9fbb8658020a1caf9a12050c3981919ea
                                                                                                                              • Opcode Fuzzy Hash: aab80925934ccae96f8741da06f504ff3c5000924578288a6a0d4697c1601134
                                                                                                                              • Instruction Fuzzy Hash: DA217F70604701E6CB10F7B19856AEF225A9F81748F54883FB802A72D2EF7CDC85865F
                                                                                                                              APIs
                                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0043A755
                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0043A75F
                                                                                                                              • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 0043A76C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3906539128-0
                                                                                                                              • Opcode ID: 8927051c792ea5fcfde74a911610789cb41c0badf1ce26303590c400d5146ce6
                                                                                                                              • Instruction ID: 15fc2c217458336097e8e19d69e2940e7c5a4b77666d4e23b7e272f62fea865b
                                                                                                                              • Opcode Fuzzy Hash: 8927051c792ea5fcfde74a911610789cb41c0badf1ce26303590c400d5146ce6
                                                                                                                              • Instruction Fuzzy Hash: 2D31D47490121CABCB21DF64D98979DBBB8BF08310F5052EAE81CA7251E7349F81CF49
                                                                                                                              APIs
                                                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 100061E4
                                                                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 100061F1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3906539128-0
                                                                                                                              • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                              • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                                                                              • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                                                                              • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                                                                              APIs
                                                                                                                              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,004325C5,00000034), ref: 0043294C
                                                                                                                              • CryptGenRandom.ADVAPI32(?,00000034,?,?,00000000,00000000,00000001,F0000000,?,?,004325C5,00000034), ref: 00432962
                                                                                                                              • CryptReleaseContext.ADVAPI32(?,00000000,?,00000034,?,?,00000000,00000000,00000001,F0000000,?,?,004325C5,00000034), ref: 00432974
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1815803762-0
                                                                                                                              • Opcode ID: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                                              • Instruction ID: 80435fde6f6b62f03973a002229794bf261f16e8857de4c024377aa862d1bdf3
                                                                                                                              • Opcode Fuzzy Hash: 04772303a0a25dfd0b8e93efaf4bd4cd6a07a437a7117abaa9b2762516ca9460
                                                                                                                              • Instruction Fuzzy Hash: 11E06D31308211BBEB310E25BC08F573F94AF89B71F71053AB211E40E4C2A188419A1C
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32(00000000,?,0044252A,00000000,0046DAE0,0000000C,00442681,00000000,00000002,00000000), ref: 00442575
                                                                                                                              • TerminateProcess.KERNEL32(00000000,?,0044252A,00000000,0046DAE0,0000000C,00442681,00000000,00000002,00000000), ref: 0044257C
                                                                                                                              • ExitProcess.KERNEL32 ref: 0044258E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1703294689-0
                                                                                                                              • Opcode ID: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                                              • Instruction ID: 6e58600c80f72e94ca833af3256d2da28fe7ef7edb4b61bff2e48710a34f1207
                                                                                                                              • Opcode Fuzzy Hash: 7c471b5b7a391410b3ce269feae26e49b4a02911a71997b74fd7744fcc246e6d
                                                                                                                              • Instruction Fuzzy Hash: 65E08C31004648BFDF016F14EE18A893F29EF10346F408475F80A8A632CFB9DE92CB88
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                                                                              • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                                                                              • ExitProcess.KERNEL32 ref: 10004AEE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1703294689-0
                                                                                                                              • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                              • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                                                                              • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                                                                              • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                                                                              APIs
                                                                                                                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150C3), ref: 0041ACCC
                                                                                                                              • NtSuspendProcess.NTDLL(00000000), ref: 0041ACD9
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,004150C3), ref: 0041ACE2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CloseHandleOpenSuspend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1999457699-0
                                                                                                                              • Opcode ID: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                                                                                                              • Instruction ID: f0940f0a464cb9da12e036c8bcda16370f3965740af83b573a45ae51f9acba0f
                                                                                                                              • Opcode Fuzzy Hash: 25604720b1c4003eaa4d94084830c6d0564ffd887a8d5c6f711170065f3891c4
                                                                                                                              • Instruction Fuzzy Hash: E7D0A733605131638221176A7C0CC87EE6CDFC1EB37024136F404C3220DA30C84186F4
                                                                                                                              APIs
                                                                                                                              • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,004150E8), ref: 0041ACF8
                                                                                                                              • NtResumeProcess.NTDLL(00000000), ref: 0041AD05
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,004150E8), ref: 0041AD0E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CloseHandleOpenResume
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3614150671-0
                                                                                                                              • Opcode ID: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                                                                                                              • Instruction ID: b64f47c6af987b25b68fadd97e6a7e629856a7b738c344dffca8a71896aa998e
                                                                                                                              • Opcode Fuzzy Hash: ac01971c7a5820b8bc970b7b2339e0980474906f6b9316b65cb607f099f400ad
                                                                                                                              • Instruction Fuzzy Hash: DFD0A733504132638220176A7C0CC87EDADDFC5EB37024236F404C3621DA34C841C6F4
                                                                                                                              APIs
                                                                                                                              • OpenClipboard.USER32(00000000), ref: 0040AE21
                                                                                                                              • GetClipboardData.USER32(0000000D), ref: 0040AE2D
                                                                                                                              • CloseClipboard.USER32 ref: 0040AE35
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Clipboard$CloseDataOpen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2058664381-0
                                                                                                                              • Opcode ID: cfa778264f57a8a116f17f37051d88ccacc8ff9770acf02ecd02cad442be8df3
                                                                                                                              • Instruction ID: 95e153bd68fdccc55220e0a799c072a9f76a89096ec554d0853145a40c9ddfaa
                                                                                                                              • Opcode Fuzzy Hash: cfa778264f57a8a116f17f37051d88ccacc8ff9770acf02ecd02cad442be8df3
                                                                                                                              • Instruction Fuzzy Hash: 76E0EC31689311ABC2126B60EC09B9BBA589F40B62F44843ABE45A62D1D678CC10D6EA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: .
                                                                                                                              • API String ID: 0-248832578
                                                                                                                              • Opcode ID: d33565c3b8237891e4a7f321393d851df39cf541f0fea920c0677957b5d75714
                                                                                                                              • Instruction ID: db76f937e81630575b2700384d205b0ac401e8f874fa32e43cac1aabc581782c
                                                                                                                              • Opcode Fuzzy Hash: d33565c3b8237891e4a7f321393d851df39cf541f0fea920c0677957b5d75714
                                                                                                                              • Instruction Fuzzy Hash: CB310471900209AFEB249E79CC84EEB7BBDDB86318F1101AEF91897251E6389D458B64
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: .
                                                                                                                              • API String ID: 0-248832578
                                                                                                                              • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                              • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                                                                              • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                                                                              • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                                                                              APIs
                                                                                                                              • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041BC6C
                                                                                                                                • Part of subcall function 004126D2: RegCreateKeyA.ADVAPI32(80000001,00000000,<gF), ref: 004126E1
                                                                                                                                • Part of subcall function 004126D2: RegSetValueExA.KERNEL32(<gF,?,00000000,?,00000000,00000000,004742F8,?,?,0040E5FB,hHgF,0046673C), ref: 00412709
                                                                                                                                • Part of subcall function 004126D2: RegCloseKey.KERNEL32(?,?,?,0040E5FB,hHgF,0046673C), ref: 00412714
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateInfoParametersSystemValue
                                                                                                                              • String ID: Control Panel\Desktop
                                                                                                                              • API String ID: 4127273184-27424756
                                                                                                                              • Opcode ID: 009af8fa814201267122ee3b5958dfbbe0a45010e1ebb7388be65a4a218e9340
                                                                                                                              • Instruction ID: a6c166168c7895b99543370299e99232025f4d6daba66cbb636fef562e17b9dc
                                                                                                                              • Opcode Fuzzy Hash: 009af8fa814201267122ee3b5958dfbbe0a45010e1ebb7388be65a4a218e9340
                                                                                                                              • Instruction Fuzzy Hash: 06112432B8060433D514303A4E6FBAE1806D356B60FA4415FF6026A6DAFA9E5AE103DF
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                              • EnumSystemLocalesW.KERNEL32(00450E6A,00000001,00000000,?,<D,?,00451497,00000000,?,?,?), ref: 00450DB4
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                              • String ID: <D
                                                                                                                              • API String ID: 1084509184-3866323178
                                                                                                                              • Opcode ID: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                                                                                                              • Instruction ID: b1cdb4a87285138648e71eec5b58018a028c0508cbf90fbfa4a5e64eba390ba2
                                                                                                                              • Opcode Fuzzy Hash: 99518e0148a584110f8bf4689e731d5402797eff59b4f7bbd4ab81c0230e503e
                                                                                                                              • Instruction Fuzzy Hash: 9C11293B2007055FDB189F79D8916BAB7A1FF8031AB14442DE94647741D375B846C744
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                              • EnumSystemLocalesW.KERNEL32(004510BA,00000001,?,?,<D,?,0045145B,<D,?,?,?,?,?,00443CEC,?,?), ref: 00450E29
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                              • String ID: <D
                                                                                                                              • API String ID: 1084509184-3866323178
                                                                                                                              • Opcode ID: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                                                                                                              • Instruction ID: d323619e2976bd52c5edaa4f55efd93dda7e8b303aa23e489220a9c0c916f3e4
                                                                                                                              • Opcode Fuzzy Hash: e0c48b72e2c1269c4cdc51d0e461bd75820cdd7fcb75359b91497d16354a5322
                                                                                                                              • Instruction Fuzzy Hash: 5BF0223A2003045FDB145F3AD882AAB7B95EF81729B25842EFD058B782D275AC42C644
                                                                                                                              APIs
                                                                                                                              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004475EA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InfoLocale
                                                                                                                              • String ID: GetLocaleInfoEx
                                                                                                                              • API String ID: 2299586839-2904428671
                                                                                                                              • Opcode ID: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                                              • Instruction ID: 80a81796b135a3e0eaabc3ca7fb48afb6b687e063e78a0117ef0368584b3b56e
                                                                                                                              • Opcode Fuzzy Hash: 8dab955c83ead38f4190d8cd68b3baa1d28bcda2227728d0cef18aa89ebed625
                                                                                                                              • Instruction Fuzzy Hash: 82F0F031A44308BBDB11AF61EC06F6E7B25EF04712F00416AFC046A2A2CB359E11969E
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F2B
                                                                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1663032902-0
                                                                                                                              • Opcode ID: a9a0ef56855296d69f28970e91aa7ff08aa6ba5c63fbad7abcadd9e72279b5a0
                                                                                                                              • Instruction ID: 725ff80feb3504da526bb6f16fdbe645276de1ecdd37ac2f1e7666d8a95350e0
                                                                                                                              • Opcode Fuzzy Hash: a9a0ef56855296d69f28970e91aa7ff08aa6ba5c63fbad7abcadd9e72279b5a0
                                                                                                                              • Instruction Fuzzy Hash: 2D21B332500606ABDB249A25DC46B7B73A8EB09316F1041BBFE01C6252EB79DD48CB99
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00451088,00000000,00000000,?), ref: 00451316
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2692324296-0
                                                                                                                              • Opcode ID: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                                                              • Instruction ID: 964a9937ac5a020d26487979adcc3deadbef587b10f76395f6381cc8137ce6dd
                                                                                                                              • Opcode Fuzzy Hash: b6b1206c8d774c000a1b4b507e47eef55c4aaf57ff81984432bbf3fd36f42e7a
                                                                                                                              • Instruction Fuzzy Hash: 10F07D32500111BBEB286A25CC16BFF7758EB00716F15046BEC06A3651FA38FD49C6D4
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446F1E
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F2B
                                                                                                                              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0045110E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1663032902-0
                                                                                                                              • Opcode ID: 4212ded64dadb858f7b9047d54d552c22db04ab694f8e949cf2fb7f250b93237
                                                                                                                              • Instruction ID: 83e899f3f0ce4bc039fd4adeec5eb70681bf0f5e82991b324e7185bd9ae61388
                                                                                                                              • Opcode Fuzzy Hash: 4212ded64dadb858f7b9047d54d552c22db04ab694f8e949cf2fb7f250b93237
                                                                                                                              • Instruction Fuzzy Hash: 7A012632A411059BDB04EF34DC45ABA73A8DF09311F0041FFFE02DB242DA38AD048758
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00444ACC: RtlEnterCriticalSection.NTDLL(?), ref: 00444ADB
                                                                                                                              • EnumSystemLocalesW.KERNEL32(00447068,00000001,0046DC48,0000000C), ref: 004470E6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1272433827-0
                                                                                                                              • Opcode ID: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                                                              • Instruction ID: 877f7ae5c491a2fbf36f534f7b8138893028b6a81f24f5c3744eb9f6a7677366
                                                                                                                              • Opcode Fuzzy Hash: 294c88a1965c44704c377604ff0a5917817e93c6b6b84f866ad5a3c5a2dedf6a
                                                                                                                              • Instruction Fuzzy Hash: F6F04932A10200EFEB04EF68E806B4D77B0EB44725F10816AF414DB2E2DB7889818B49
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                              • EnumSystemLocalesW.KERNEL32(00450C4E,00000001,?,?,?,004514B9,<D,?,?,?,?,?,00443CEC,?,?,?), ref: 00450D2E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1084509184-0
                                                                                                                              • Opcode ID: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                                                              • Instruction ID: ec648f77c102ae861fabd43d141f98194b25f4d0b1f390d0839222eb7000fb0b
                                                                                                                              • Opcode Fuzzy Hash: 8c2bccbfd0fc102635c006ca31f830fd57f68f19690e6c985b1f52cdbb333b18
                                                                                                                              • Instruction Fuzzy Hash: CBF05C3D30020557CB159F35D81576B7F94EFC2711B07405AFE098B381C239D846C754
                                                                                                                              APIs
                                                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_00005CE3,004339B1), ref: 00433CDC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3192549508-0
                                                                                                                              • Opcode ID: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                                                              • Instruction ID: 83953e3dca8a62111c248ad4478ddd9c1373f985a30770e5fc8846644fe13ce9
                                                                                                                              • Opcode Fuzzy Hash: 3670727f3e8651977646328ecd403d2a1b3c6ba49dd5bfb528ab2007e995f695
                                                                                                                              • Instruction Fuzzy Hash:
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HeapProcess
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 54951025-0
                                                                                                                              • Opcode ID: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                                                                                              • Instruction ID: 1e6cba0042ebf2c12c09a4b69519b161692f08ba8376aa17aabccb2fe2e68a66
                                                                                                                              • Opcode Fuzzy Hash: 460c158515a4b2323efe0f0dc9aa5714cfdfaf7ec70cb60f3b96f32d1927db1d
                                                                                                                              • Instruction Fuzzy Hash: 81A01130A002228FE3208F308A8A30E3AACAA002C0B00803AE80CC0028EB30C0028B00
                                                                                                                              APIs
                                                                                                                              • CreateMutexA.KERNEL32(00000000,00000001,00000000,004742F8,?,00000000), ref: 004112D4
                                                                                                                              • ExitProcess.KERNEL32 ref: 0041151D
                                                                                                                                • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                                • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                                • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,?,00000000), ref: 0041135B
                                                                                                                              • OpenProcess.KERNEL32(00100000,00000000,T@,?,?,?,?,00000000), ref: 0041136A
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 00411375
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 0041137C
                                                                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 00411382
                                                                                                                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                                • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                              • PathFileExistsW.SHLWAPI(?,?,?,?,?,00000000), ref: 004113B3
                                                                                                                              • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000000), ref: 0041140F
                                                                                                                              • GetTempFileNameW.KERNEL32(?,0046B7CC,00000000,?,?,?,?,?,?,?,?,00000000), ref: 00411429
                                                                                                                              • lstrcatW.KERNEL32(?,0046B7D8,?,?,?,?,?,?,?,00000000), ref: 0041143B
                                                                                                                                • Part of subcall function 0041B58F: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041B5EB
                                                                                                                                • Part of subcall function 0041B58F: WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041B5FF
                                                                                                                                • Part of subcall function 0041B58F: CloseHandle.KERNEL32(00000000), ref: 0041B60C
                                                                                                                              • Sleep.KERNEL32(000001F4,?,?,?,?,00000000), ref: 004114C4
                                                                                                                              • OpenProcess.KERNEL32(00100000,00000000,?,?,?,?,?,00000000), ref: 004114D9
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,00000000), ref: 004114E4
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000), ref: 004114EB
                                                                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,?,00000000), ref: 004114F1
                                                                                                                                • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000080,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,00466330), ref: 0041B5CE
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateProcess$HandleOpen$CurrentObjectPathSingleTempValueWait$ExistsExitMutexNamePointerQuerySleepWritelstrcat
                                                                                                                              • String ID: 0DG$@CG$T@$WDH$exepath
                                                                                                                              • API String ID: 1212092484-1888628005
                                                                                                                              • Opcode ID: 4d0f0e3457b03c9c472909321222222eba6b5b3cbb9dfdba7dddfa544213c3c8
                                                                                                                              • Instruction ID: b1cd6038c3dd2fca16f1d1fb39a824579eeb1b45f376adef666059b0b2e54ae4
                                                                                                                              • Opcode Fuzzy Hash: 4d0f0e3457b03c9c472909321222222eba6b5b3cbb9dfdba7dddfa544213c3c8
                                                                                                                              • Instruction Fuzzy Hash: D751B671A043156BDB00A7A0AC49EFE736D9B44715F1041BBF905A72D2EF7C8E828A9D
                                                                                                                              APIs
                                                                                                                              • CreateDCA.GDI32(0046BAC8,00000000,00000000,00000000), ref: 00417FB9
                                                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 00417FC4
                                                                                                                                • Part of subcall function 00418452: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00418482
                                                                                                                              • CreateCompatibleBitmap.GDI32(?,00000000), ref: 00418045
                                                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 0041806B
                                                                                                                              • StretchBlt.GDI32(00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00CC0020), ref: 00418093
                                                                                                                              • GetCursorInfo.USER32(?), ref: 004180B5
                                                                                                                              • GetIconInfo.USER32(?,?), ref: 004180CB
                                                                                                                              • DeleteObject.GDI32(?), ref: 004180FA
                                                                                                                              • DeleteObject.GDI32(?), ref: 00418107
                                                                                                                              • DrawIcon.USER32(00000000,?,?,?), ref: 00418114
                                                                                                                              • BitBlt.GDI32(00000000,00000000,00000000,00000000,?,00471DE4,00000000,00000000,00660046), ref: 00418144
                                                                                                                              • GetObjectA.GDI32(?,00000018,?), ref: 00418173
                                                                                                                              • LocalAlloc.KERNEL32(00000040,00000028), ref: 004181BC
                                                                                                                              • LocalAlloc.KERNEL32(00000040,00000001), ref: 004181DF
                                                                                                                              • GlobalAlloc.KERNEL32(00000000,?), ref: 00418248
                                                                                                                              • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041826B
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00418285
                                                                                                                              • GlobalFree.KERNEL32(00CC0020), ref: 00418290
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 00418344
                                                                                                                              • GlobalFree.KERNEL32(?), ref: 0041834B
                                                                                                                              • DeleteObject.GDI32(?), ref: 004183A1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Object$Delete$AllocCreateGlobal$CompatibleFreeIconInfoLocal$BitmapBitsCursorDisplayDrawEnumSelectSettingsStretch
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 615876539-0
                                                                                                                              • Opcode ID: 260974d0d9b84fd7b55234f57605bd05161d1d9a57aec9af59f29cb3bbe85775
                                                                                                                              • Instruction ID: f05cd178694609e891ba83f5bdf02bb76ea447df34f4969275af8919d08089d1
                                                                                                                              • Opcode Fuzzy Hash: 260974d0d9b84fd7b55234f57605bd05161d1d9a57aec9af59f29cb3bbe85775
                                                                                                                              • Instruction Fuzzy Hash: 12C17C31508345AFD3209F25DC44BABBBE9FF88751F04082EF989932A1DB34E945CB5A
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 10001CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                                                • Part of subcall function 10001CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                                                • Part of subcall function 10001CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                                              • _strlen.LIBCMT ref: 10001855
                                                                                                                              • _strlen.LIBCMT ref: 10001869
                                                                                                                              • _strlen.LIBCMT ref: 1000188B
                                                                                                                              • _strlen.LIBCMT ref: 100018AE
                                                                                                                              • _strlen.LIBCMT ref: 100018C8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _strlen$File$CopyCreateDelete
                                                                                                                              • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                                                                              • API String ID: 3296212668-3023110444
                                                                                                                              • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                              • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                                                                              • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                                                                              • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _strlen
                                                                                                                              • String ID: %m$~$Gon~$~F@7$~dra
                                                                                                                              • API String ID: 4218353326-230879103
                                                                                                                              • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                              • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                                                                              • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                                                                              • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$EnvironmentVariable$_wcschr
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3899193279-0
                                                                                                                              • Opcode ID: 317a8c111b24aacd46124282a5803ba334ec842b1fe1378c2c4d64ce1a5be6ed
                                                                                                                              • Instruction ID: 8ac3cd9939a067627e1c481289c57a7f9f94b657261427fab31af25724b0c78e
                                                                                                                              • Opcode Fuzzy Hash: 317a8c111b24aacd46124282a5803ba334ec842b1fe1378c2c4d64ce1a5be6ed
                                                                                                                              • Instruction Fuzzy Hash: 96D13C719007007FFB25AF7B9881A6F7BA4BF02314F0541AFF905A7381E63989418B9D
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 0041B1D6
                                                                                                                              • lstrlenW.KERNEL32(?), ref: 0041B207
                                                                                                                              • FindFirstVolumeW.KERNEL32(?,00000104), ref: 0041B242
                                                                                                                              • GetLastError.KERNEL32 ref: 0041B255
                                                                                                                              • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041B299
                                                                                                                              • lstrcmpW.KERNEL32(?,?), ref: 0041B2B4
                                                                                                                              • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041B2CC
                                                                                                                              • FindVolumeClose.KERNEL32(?), ref: 0041B2FB
                                                                                                                              • GetLastError.KERNEL32 ref: 0041B313
                                                                                                                              • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041B340
                                                                                                                              • lstrcatW.KERNEL32(?,?), ref: 0041B359
                                                                                                                              • lstrcpyW.KERNEL32(?,?), ref: 0041B368
                                                                                                                              • GetLastError.KERNEL32 ref: 0041B370
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuerylstrcatlstrcmplstrcpy
                                                                                                                              • String ID: ?
                                                                                                                              • API String ID: 1756451316-1684325040
                                                                                                                              • Opcode ID: a6103885494d84df2676d9fd4c3624434a4fe82cfecd76dcde1cff843fd7ed43
                                                                                                                              • Instruction ID: 2e0df54dd889987763cd5022c3700ac4418931210c184d5857636408485aa128
                                                                                                                              • Opcode Fuzzy Hash: a6103885494d84df2676d9fd4c3624434a4fe82cfecd76dcde1cff843fd7ed43
                                                                                                                              • Instruction Fuzzy Hash: 8B416F71508305AAD7209FA1EC8C9EBB7E8EB49715F00096BF541C2261EB78C98887D6
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040C38B
                                                                                                                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C39E
                                                                                                                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                                • Part of subcall function 0041B58F: CreateFileW.KERNEL32(00000080,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00465900,00000000,00000000,0040C267,00000000,00000000,00466330), ref: 0041B5CE
                                                                                                                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0040C632
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040C63E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Terminate$FileProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                              • String ID: 0cF$@CG$On Error Resume Next$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$`=G$exepath$fso.DeleteFolder "$while fso.FileExists("
                                                                                                                              • API String ID: 1454597144-601162243
                                                                                                                              • Opcode ID: 24f6752152ce2ba220cb64ecdb3057bb4e8c4046efc9aef06aa7754e46fba82d
                                                                                                                              • Instruction ID: c8b5e11b4abf5c95f8ab28b2bb359051ef64700817c412cd349ec45860bdb676
                                                                                                                              • Opcode Fuzzy Hash: 24f6752152ce2ba220cb64ecdb3057bb4e8c4046efc9aef06aa7754e46fba82d
                                                                                                                              • Instruction Fuzzy Hash: EB9175316042005AC314FB25D852ABF7799AF91718F10453FF98A631E2EF7CAD49C69E
                                                                                                                              APIs
                                                                                                                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00475C08,00475CDC), ref: 004051E7
                                                                                                                              • Sleep.KERNEL32(0000012C,00000093,?), ref: 0040523F
                                                                                                                              • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00405264
                                                                                                                              • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 00405291
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              • WriteFile.KERNEL32(00000000,00000000,?,00000000,00473F98,00465570,00000062,00465554), ref: 0040538E
                                                                                                                              • Sleep.KERNEL32(00000064,00000062,00465554), ref: 004053A8
                                                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 004053C1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileProcessSleep$CreateNamedPeekPipeReadTerminateWritesend
                                                                                                                              • String ID: P\G$P\G$P\G$P\G$P\G$XUF
                                                                                                                              • API String ID: 729113801-2988598417
                                                                                                                              • Opcode ID: 5398e035e800431b311999d4849b11114577166c26f5adcbb6e4ac8fa4996701
                                                                                                                              • Instruction ID: b18bac6d60c4c725a58799f80733fb47b3e4e6a61b1262bf76379e9ec18ff918
                                                                                                                              • Opcode Fuzzy Hash: 5398e035e800431b311999d4849b11114577166c26f5adcbb6e4ac8fa4996701
                                                                                                                              • Instruction Fuzzy Hash: A691E5716007056FD705BB65AC41A6F37A8EB80348F50403FF94ABA1E2EEBC9C448B6D
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C013
                                                                                                                              • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040C026
                                                                                                                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                                • Part of subcall function 0040AFBA: UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                                • Part of subcall function 0040AFBA: TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,00457288,00000000,?,?,?,?,00465900,0040C07B,004661E4), ref: 0041AB5F
                                                                                                                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0040C280
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040C287
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProcessTerminate$Thread$CurrentDeleteExecuteExitFileHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                                              • String ID: @CG$On Error Resume Next$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$`=G$exepath$fso.DeleteFolder "$pth_unenc$while fso.FileExists("
                                                                                                                              • API String ID: 97251228-1730539264
                                                                                                                              • Opcode ID: fc0ffd3b236c05d4f4164c9eea88da4018c2635399e637bc8c2060073dd49b9e
                                                                                                                              • Instruction ID: 1063ce1f4075510d90626cdc8b34ac690c3cf2dc76fa2c9c3337a4c1feab76e8
                                                                                                                              • Opcode Fuzzy Hash: fc0ffd3b236c05d4f4164c9eea88da4018c2635399e637bc8c2060073dd49b9e
                                                                                                                              • Instruction Fuzzy Hash: B78191316042005BC315FB21D862ABF77A9ABD1308F10453FF586A71E2EF7CAD49869E
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$Info
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2509303402-0
                                                                                                                              • Opcode ID: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                                                                                                              • Instruction ID: 0af7f9009007d8880989bd470fdb3e4a62bb8e65dbd2af1b74ff5c8893cb1db7
                                                                                                                              • Opcode Fuzzy Hash: 4f311dc35998d231116b4ef065710eb7bf66da857f64ae236b680615c36f9f73
                                                                                                                              • Instruction Fuzzy Hash: D0B18F71900605AFEF11DFA9C881BEEBBF4BF49304F14406EF855B7242DA79A8458B64
                                                                                                                              APIs
                                                                                                                              • ___free_lconv_mon.LIBCMT ref: 004500B1
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F300
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F312
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F324
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F336
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F348
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F35A
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F36C
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F37E
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F390
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3A2
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3B4
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3C6
                                                                                                                                • Part of subcall function 0044F2E3: _free.LIBCMT ref: 0044F3D8
                                                                                                                              • _free.LIBCMT ref: 004500A6
                                                                                                                                • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                                              • _free.LIBCMT ref: 004500C8
                                                                                                                              • _free.LIBCMT ref: 004500DD
                                                                                                                              • _free.LIBCMT ref: 004500E8
                                                                                                                              • _free.LIBCMT ref: 0045010A
                                                                                                                              • _free.LIBCMT ref: 0045011D
                                                                                                                              • _free.LIBCMT ref: 0045012B
                                                                                                                              • _free.LIBCMT ref: 00450136
                                                                                                                              • _free.LIBCMT ref: 0045016E
                                                                                                                              • _free.LIBCMT ref: 00450175
                                                                                                                              • _free.LIBCMT ref: 00450192
                                                                                                                              • _free.LIBCMT ref: 004501AA
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 161543041-0
                                                                                                                              • Opcode ID: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                                              • Instruction ID: 6df0fc8d0da410edbfddc8482cd9dc810a80ebbb5b2f86b8c24a0bb33e3d08c7
                                                                                                                              • Opcode Fuzzy Hash: bcc467a133590e08c2246ffecdc9577bb20b6303625806e8b1892e2aaa35b24d
                                                                                                                              • Instruction Fuzzy Hash: 96317235500B00AFEB20AA35D845B5B73E5AF42355F15841FF849E7292DF39AC98CB1A
                                                                                                                              APIs
                                                                                                                              • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                                                                                • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                                                                              • _free.LIBCMT ref: 10007CFB
                                                                                                                                • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                              • _free.LIBCMT ref: 10007D1D
                                                                                                                              • _free.LIBCMT ref: 10007D32
                                                                                                                              • _free.LIBCMT ref: 10007D3D
                                                                                                                              • _free.LIBCMT ref: 10007D5F
                                                                                                                              • _free.LIBCMT ref: 10007D72
                                                                                                                              • _free.LIBCMT ref: 10007D80
                                                                                                                              • _free.LIBCMT ref: 10007D8B
                                                                                                                              • _free.LIBCMT ref: 10007DC3
                                                                                                                              • _free.LIBCMT ref: 10007DCA
                                                                                                                              • _free.LIBCMT ref: 10007DE7
                                                                                                                              • _free.LIBCMT ref: 10007DFF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 161543041-0
                                                                                                                              • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                              • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                                                                              • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                                                                              • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                                                                              APIs
                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00410F45
                                                                                                                                • Part of subcall function 004127D5: RegCreateKeyA.ADVAPI32(80000001,00000000,TUF), ref: 004127E3
                                                                                                                                • Part of subcall function 004127D5: RegSetValueExA.KERNEL32(TUF,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 004127FE
                                                                                                                                • Part of subcall function 004127D5: RegCloseKey.ADVAPI32(?,?,?,?,0040B94C,004660E0,00000001,000000AF,00465554), ref: 00412809
                                                                                                                              • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00410F81
                                                                                                                              • CreateThread.KERNEL32(00000000,00000000,00411637,00000000,00000000,00000000), ref: 00410FE6
                                                                                                                                • Part of subcall function 004124B7: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004124D7
                                                                                                                                • Part of subcall function 004124B7: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,004742F8), ref: 004124F5
                                                                                                                                • Part of subcall function 004124B7: RegCloseKey.KERNEL32(?), ref: 00412500
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00410F90
                                                                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                              • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 0041125A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpen$CreateProcessValue$CurrentHandleLocalMutexQueryThreadTime
                                                                                                                              • String ID: 0DG$TTF$WDH$BG
                                                                                                                              • API String ID: 65172268-1505503698
                                                                                                                              • Opcode ID: ee01b3908e858d1d280920f6ac525ba57b37a08b442cff479b49059057ff2c26
                                                                                                                              • Instruction ID: 2ec41641ff7d981187ed77e29e7d519fc89a207972baa733902a05010441332b
                                                                                                                              • Opcode Fuzzy Hash: ee01b3908e858d1d280920f6ac525ba57b37a08b442cff479b49059057ff2c26
                                                                                                                              • Instruction Fuzzy Hash: 97719E3160420157C614FB32D8579AE77A8AED4718F40053FF582A21F2EF7CAA49869F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 0-3907804496
                                                                                                                              • Opcode ID: 04894e0a93b524abfc38153a41ff29de28cc7cf8ead271b478220501d6c19c9b
                                                                                                                              • Instruction ID: 1e235cce983953b2f50cc3566bc78ab2d8216d31b9fa4c429b6f00869d8f9d70
                                                                                                                              • Opcode Fuzzy Hash: 04894e0a93b524abfc38153a41ff29de28cc7cf8ead271b478220501d6c19c9b
                                                                                                                              • Instruction Fuzzy Hash: 27C1D774D04249AFEF11DFA9C8417AEBBB4FF4A304F14405AE814A7392C778D941CBA9
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,00000000,?), ref: 004393B9
                                                                                                                              • GetLastError.KERNEL32 ref: 004393C6
                                                                                                                              • __dosmaperr.LIBCMT ref: 004393CD
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,?), ref: 004393F9
                                                                                                                              • GetLastError.KERNEL32 ref: 00439403
                                                                                                                              • __dosmaperr.LIBCMT ref: 0043940A
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,?,00000000,00000000), ref: 0043944D
                                                                                                                              • GetLastError.KERNEL32 ref: 00439457
                                                                                                                              • __dosmaperr.LIBCMT ref: 0043945E
                                                                                                                              • _free.LIBCMT ref: 0043946A
                                                                                                                              • _free.LIBCMT ref: 00439471
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2441525078-0
                                                                                                                              • Opcode ID: 2ae200d90bd4707cf84e44c7e7c38afbf302cb9e64b43d1da2d1331bd94df5e0
                                                                                                                              • Instruction ID: 902c93592471d116807dca9985149206a76c62e8192f2f9a6cc20a0486345b12
                                                                                                                              • Opcode Fuzzy Hash: 2ae200d90bd4707cf84e44c7e7c38afbf302cb9e64b43d1da2d1331bd94df5e0
                                                                                                                              • Instruction Fuzzy Hash: F531F17140820ABBEF11AFA5DC449AF3B78EF09364F14016AF81066291DB79CC12DBA9
                                                                                                                              APIs
                                                                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000,00474358,00000005,00000004,00000000,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,0046662C,00000000,0000000E), ref: 0040BC8E
                                                                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040BDDC
                                                                                                                              • CloseHandle.KERNEL32 ref: 0040BE9B
                                                                                                                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000001), ref: 0040BEB9
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040BED0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                                              • String ID: 6$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe$BG$BG
                                                                                                                              • API String ID: 2323119506-2245298408
                                                                                                                              • Opcode ID: 2ab649c3ba73a70816a6e43179e3de047985b58abb1f551d321f2ad11d541b57
                                                                                                                              • Instruction ID: b3868b96a5a73c1b880f625a38b4c220dd420420d05b0a2cc1e840e3cd02b35d
                                                                                                                              • Opcode Fuzzy Hash: 2ab649c3ba73a70816a6e43179e3de047985b58abb1f551d321f2ad11d541b57
                                                                                                                              • Instruction Fuzzy Hash: D251B0212043406BD609B722EC52EBF77999F81719F10443FF985A66E2DF3CAD4582EE
                                                                                                                              APIs
                                                                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 004191EB
                                                                                                                              • Sleep.KERNEL32(000003E8), ref: 0041926D
                                                                                                                              • GetLocalTime.KERNEL32(?), ref: 0041927C
                                                                                                                              • Sleep.KERNEL32(00000000), ref: 00419365
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep$CreateDirectoryLocalTime
                                                                                                                              • String ID: XCG$XCG$XCG$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                                                                                              • API String ID: 714869764-65789007
                                                                                                                              • Opcode ID: c7bc54353a1d767515a198076c521806ba28780cbe70b1c861849df8d7860609
                                                                                                                              • Instruction ID: b922dce7c629cfc9b1bb11cb74a08c0e3353b39699bf4d86e46594d10c943285
                                                                                                                              • Opcode Fuzzy Hash: c7bc54353a1d767515a198076c521806ba28780cbe70b1c861849df8d7860609
                                                                                                                              • Instruction Fuzzy Hash: 33519F71A002449ACB14BBB5C856AFE7BA9AB55304F00407FF84AB71D2EF3C5E85C799
                                                                                                                              APIs
                                                                                                                              • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                                              • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                                              • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                                                                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                              • String ID: (UF$8UF$DUF
                                                                                                                              • API String ID: 2956720200-3365735178
                                                                                                                              • Opcode ID: a912e76e171359e42424e11d747a7f112729df081f2e4d905df9d17e13ef68f8
                                                                                                                              • Instruction ID: a70547b48422ce96676d24762269450ce3f1821fc9982c67352fb5fd346d99ba
                                                                                                                              • Opcode Fuzzy Hash: a912e76e171359e42424e11d747a7f112729df081f2e4d905df9d17e13ef68f8
                                                                                                                              • Instruction Fuzzy Hash: F741BFB16043016BC714FB75DC5A8AE77A9ABC1714F40093EF906A31E6EF38DA05C79A
                                                                                                                              APIs
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                                                              • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00416EF0
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                                              • String ID: <$@$@FG$@FG$TUF
                                                                                                                              • API String ID: 1107811701-3315534519
                                                                                                                              • Opcode ID: 0e2d6ad79a080fb4cd8cf88aeb906b0622b8e54a3b7bb188f4510e64744bb246
                                                                                                                              • Instruction ID: 21bac8b1790940aaec7d6d8591dec239f7d6dde33bc15b5890dc9a9e7f2861e5
                                                                                                                              • Opcode Fuzzy Hash: 0e2d6ad79a080fb4cd8cf88aeb906b0622b8e54a3b7bb188f4510e64744bb246
                                                                                                                              • Instruction Fuzzy Hash: E8319C319002099BCB04FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 00446DDF
                                                                                                                                • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                                              • _free.LIBCMT ref: 00446DEB
                                                                                                                              • _free.LIBCMT ref: 00446DF6
                                                                                                                              • _free.LIBCMT ref: 00446E01
                                                                                                                              • _free.LIBCMT ref: 00446E0C
                                                                                                                              • _free.LIBCMT ref: 00446E17
                                                                                                                              • _free.LIBCMT ref: 00446E22
                                                                                                                              • _free.LIBCMT ref: 00446E2D
                                                                                                                              • _free.LIBCMT ref: 00446E38
                                                                                                                              • _free.LIBCMT ref: 00446E46
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                                              • Instruction ID: b6db37451886405a3c03f61b360184b61b1678451e8b30ee63348233c964278a
                                                                                                                              • Opcode Fuzzy Hash: 97a3f4e44069bc11c8e401312368c96959fa26c4fc1008248271593ee2688753
                                                                                                                              • Instruction Fuzzy Hash: F011E975100408BFEB01EF55C842CDD3B65EF46354B06C0AAF9086F222DA35DE649F85
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 100059EA
                                                                                                                                • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                              • _free.LIBCMT ref: 100059F6
                                                                                                                              • _free.LIBCMT ref: 10005A01
                                                                                                                              • _free.LIBCMT ref: 10005A0C
                                                                                                                              • _free.LIBCMT ref: 10005A17
                                                                                                                              • _free.LIBCMT ref: 10005A22
                                                                                                                              • _free.LIBCMT ref: 10005A2D
                                                                                                                              • _free.LIBCMT ref: 10005A38
                                                                                                                              • _free.LIBCMT ref: 10005A43
                                                                                                                              • _free.LIBCMT ref: 10005A51
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                              • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                                                                              • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                                                                              • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNEL32(00000000), ref: 00407F4C
                                                                                                                              • GetFileSizeEx.KERNEL32(00000000,00000000), ref: 00407FC2
                                                                                                                              • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040810D
                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408128
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00408200
                                                                                                                              • CloseHandle.KERNEL32(00000000,00000052,00000000,?), ref: 0040821A
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00408256
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseHandle$CreatePointerReadSize
                                                                                                                              • String ID: >G
                                                                                                                              • API String ID: 1759864157-1296849874
                                                                                                                              • Opcode ID: 08a36d21eef71703fd6b88c2b68337bccc5a602bc99244dcb7bb2b0ccce8c164
                                                                                                                              • Instruction ID: 222450ca6543349723abdfa1177da379b39b5876d7444fbb960ea0ab75079841
                                                                                                                              • Opcode Fuzzy Hash: 08a36d21eef71703fd6b88c2b68337bccc5a602bc99244dcb7bb2b0ccce8c164
                                                                                                                              • Instruction Fuzzy Hash: DAB191316083409BC214FB25C892AAFB7E5AFD4314F40492EF885632D2EF789945C79B
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Eventinet_ntoa
                                                                                                                              • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$>G
                                                                                                                              • API String ID: 3578746661-4192532303
                                                                                                                              • Opcode ID: f1d638ae5b083e4c62121f07696c5a341b3e0c0ba6996e444e93261733465799
                                                                                                                              • Instruction ID: 9533851bb4e74ac183efc1d320b4a1154e984465ef7073577260c431c5a81f81
                                                                                                                              • Opcode Fuzzy Hash: f1d638ae5b083e4c62121f07696c5a341b3e0c0ba6996e444e93261733465799
                                                                                                                              • Instruction Fuzzy Hash: E8518471A042009BC714F779D85AAAE36A59B80318F40453FF849972E2DF7CAD85CB9F
                                                                                                                              APIs
                                                                                                                              • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041A2B2
                                                                                                                              • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,00465554), ref: 0041A2EE
                                                                                                                              • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,?,00000000), ref: 0041A2FF
                                                                                                                              • SetEvent.KERNEL32 ref: 0041A38A
                                                                                                                              • WaitForSingleObject.KERNEL32(000001F4), ref: 0041A39B
                                                                                                                              • CloseHandle.KERNEL32 ref: 0041A3AB
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Event$CloseCreateExistsFileHandleObjectPathSendSingleStringWait
                                                                                                                              • String ID: TUF$open "
                                                                                                                              • API String ID: 1811012380-2979349893
                                                                                                                              • Opcode ID: a13cad6031b8f459ce87e1bac6fc86a33f567f9bf89c91429c39f5aa6750865f
                                                                                                                              • Instruction ID: 9d48d6c6e0579c1e833a8367b0d02802659df9f73890df0c3e8ff2b6504ede8e
                                                                                                                              • Opcode Fuzzy Hash: a13cad6031b8f459ce87e1bac6fc86a33f567f9bf89c91429c39f5aa6750865f
                                                                                                                              • Instruction Fuzzy Hash: 9A51C2712443056AD214BB31DC82EBF3B5CEB91758F10043FF455A21E2EE389D9986AF
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: 65535$udp
                                                                                                                              • API String ID: 0-1267037602
                                                                                                                              • Opcode ID: c63398c9cc0ec048329e95ce5e2acb82a87246096d5a026bb1d939c025f6990a
                                                                                                                              • Instruction ID: a76ad32841e4dbbb66723cf4e0556afe3febbbe66cdf8f55616d13ac9502c32b
                                                                                                                              • Opcode Fuzzy Hash: c63398c9cc0ec048329e95ce5e2acb82a87246096d5a026bb1d939c025f6990a
                                                                                                                              • Instruction Fuzzy Hash: 9D4118716083019BD7209F29E905BAB7BD8EF85706F04082FF84197391E76DCEC186AE
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00412CC1
                                                                                                                                • Part of subcall function 004129AA: RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                                                • Part of subcall function 004129AA: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              • RegCloseKey.ADVAPI32(TUFTUF,00465554,00465554,00465900,00465900,00000071), ref: 00412E31
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseEnumInfoOpenQuerysend
                                                                                                                              • String ID: hu$TUF$TUFTUF$>G$DG$DG
                                                                                                                              • API String ID: 3114080316-134696479
                                                                                                                              • Opcode ID: 694946f2647773e1458cdad1cd0ab7c95e2cace96e0f33e8d2b526e6a8fd5b5b
                                                                                                                              • Instruction ID: 92049c6ae7fba3f13a57cd60a3827c89810429dfa6cf24b756c0ab1f01d338b1
                                                                                                                              • Opcode Fuzzy Hash: 694946f2647773e1458cdad1cd0ab7c95e2cace96e0f33e8d2b526e6a8fd5b5b
                                                                                                                              • Instruction Fuzzy Hash: 0141A2316042009BC224F635D9A2AEF7394AFD0708F50843FF94A671E2EF7C5D4986AE
                                                                                                                              APIs
                                                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,00465554), ref: 00416F24
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00416F2D
                                                                                                                              • DeleteFileA.KERNEL32(00000000), ref: 00416F3C
                                                                                                                              • ShellExecuteEx.SHELL32(0000003C), ref: 00416EF0
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                                                                                              • String ID: <$@$@FG$TUF
                                                                                                                              • API String ID: 1107811701-3349172182
                                                                                                                              • Opcode ID: a1f6bd0cc37c977826e24e358f289da51cf617f234a93153f5eb971c1b7c1500
                                                                                                                              • Instruction ID: 7f028cae0c7a73d8ed5ab45bf4c11d392e633d4b2c4227d8a6dec9809f335675
                                                                                                                              • Opcode Fuzzy Hash: a1f6bd0cc37c977826e24e358f289da51cf617f234a93153f5eb971c1b7c1500
                                                                                                                              • Instruction Fuzzy Hash: 4D319C319002099BCB14FBA1DC56AFE7775AF50308F00417EF906760E2EF785A8ACB99
                                                                                                                              APIs
                                                                                                                              • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040197B
                                                                                                                              • waveInOpen.WINMM(00471AF8,000000FF,00471B00,Function_00000A8E,00000000), ref: 00401A11
                                                                                                                              • waveInPrepareHeader.WINMM(00471AC0,00000020,00000000), ref: 00401A66
                                                                                                                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401A75
                                                                                                                              • waveInStart.WINMM ref: 00401A81
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                                              • String ID: XCG$`=G$x=G
                                                                                                                              • API String ID: 1356121797-903574159
                                                                                                                              • Opcode ID: 639beb0dc559cec5d127ee0a4c8e46ba4cdf3287560edeb3c52f6ac370c1f448
                                                                                                                              • Instruction ID: 1c4952ee711c82e1d68262a7885cb64ec938acb60d992cd4a46dee1db52e037b
                                                                                                                              • Opcode Fuzzy Hash: 639beb0dc559cec5d127ee0a4c8e46ba4cdf3287560edeb3c52f6ac370c1f448
                                                                                                                              • Instruction Fuzzy Hash: 87215C316012009BC704DF7EFD1696A7BA9FB85742B00843AF50DE76B0EBB89880CB4C
                                                                                                                              APIs
                                                                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D1B
                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 10001D37
                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D4B
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D72
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D7D
                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D8A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1454806937-0
                                                                                                                              • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                              • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                                                                              • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                                                                              • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00446EBF: GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                                • Part of subcall function 00446EBF: _free.LIBCMT ref: 00446EF6
                                                                                                                                • Part of subcall function 00446EBF: SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                                • Part of subcall function 00446EBF: _abort.LIBCMT ref: 00446F3D
                                                                                                                              • _memcmp.LIBVCRUNTIME ref: 004446A3
                                                                                                                              • _free.LIBCMT ref: 00444714
                                                                                                                              • _free.LIBCMT ref: 0044472D
                                                                                                                              • _free.LIBCMT ref: 0044475F
                                                                                                                              • _free.LIBCMT ref: 00444768
                                                                                                                              • _free.LIBCMT ref: 00444774
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                                              • String ID: C
                                                                                                                              • API String ID: 1679612858-1037565863
                                                                                                                              • Opcode ID: 579d7e2a62f6981d87f9a4ad96af010217d858673daa7a5e06e8848126a1823a
                                                                                                                              • Instruction ID: 3c523a64da6f7cdf058c983f33271b3c05ff2f19a58e511a78fa6d1555c07658
                                                                                                                              • Opcode Fuzzy Hash: 579d7e2a62f6981d87f9a4ad96af010217d858673daa7a5e06e8848126a1823a
                                                                                                                              • Instruction Fuzzy Hash: 19B13975A012199FEB24DF18C885BAEB7B4FB49304F1485AEE909A7350D739AE90CF44
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 00447EBC
                                                                                                                              • _free.LIBCMT ref: 00447EE0
                                                                                                                              • _free.LIBCMT ref: 00448067
                                                                                                                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045D478), ref: 00448079
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0047179C,000000FF,00000000,0000003F,00000000,?,?), ref: 004480F1
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,004717F0,000000FF,?,0000003F,00000000,?), ref: 0044811E
                                                                                                                              • _free.LIBCMT ref: 00448233
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 314583886-0
                                                                                                                              • Opcode ID: 26083faf47cffd3d2099a304f33ee384e1e3c604107b23c77252bac54a1ea658
                                                                                                                              • Instruction ID: d74e55ca02e924b9256a88f94e7be2aa31ce1fd8fbfcff02d88bcfbefc6cbd9d
                                                                                                                              • Opcode Fuzzy Hash: 26083faf47cffd3d2099a304f33ee384e1e3c604107b23c77252bac54a1ea658
                                                                                                                              • Instruction Fuzzy Hash: 32C12871904205ABFB24DF799C41AAE7BB8EF46314F2441AFE484A7351EB388E47C758
                                                                                                                              APIs
                                                                                                                              • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00452E03,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00452BD6
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452C59
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,00452E03,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452CEC
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D03
                                                                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00446B31
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00452E03,00000000,00000000,?,00000001,?,?,?,?), ref: 00452D7F
                                                                                                                              • __freea.LIBCMT ref: 00452DAA
                                                                                                                              • __freea.LIBCMT ref: 00452DB6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2829977744-0
                                                                                                                              • Opcode ID: b1c83994ecbe3f941fd24685bb9664c395dd4006a3bd2ce5fbc620e0f8a5dfb4
                                                                                                                              • Instruction ID: c0da75549b7b47b94c7346473649b17197e9394d7568cc7349c1d05b16f9ad8a
                                                                                                                              • Opcode Fuzzy Hash: b1c83994ecbe3f941fd24685bb9664c395dd4006a3bd2ce5fbc620e0f8a5dfb4
                                                                                                                              • Instruction Fuzzy Hash: F391D872E002169BDF218E64CA51EEF7BB5AF0A315F14055BEC04E7243D7A9DC48CB68
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: udp
                                                                                                                              • API String ID: 0-4243565622
                                                                                                                              • Opcode ID: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                                                              • Instruction ID: e59cad8d3053530f07be13ad944632c35d9115139dfdf9e987abb4c2b311e0ee
                                                                                                                              • Opcode Fuzzy Hash: feee9516c16efef68815b89ade9cbffe5bf55ce5106af849680fee818ce7e4b0
                                                                                                                              • Instruction Fuzzy Hash: 9171AB316083128FDB24CE5584847ABB6E4AF84746F10043FF885A7352E778DE85CB9A
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 269201875-0
                                                                                                                              • Opcode ID: 5969c94153c7b7bc47658fb7421fb2dc5c6178a12c9a66a46f54a64434edbe96
                                                                                                                              • Instruction ID: 5fecc71d39e6a90402c47f7728bb4f6831cdfeb90858b0dfc168023e2edb8b83
                                                                                                                              • Opcode Fuzzy Hash: 5969c94153c7b7bc47658fb7421fb2dc5c6178a12c9a66a46f54a64434edbe96
                                                                                                                              • Instruction Fuzzy Hash: 2361BFB1900205AFEB20DF69C841BAABBF4EB45720F24417BE944FB392E7349D45CB59
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$AllocateHeap
                                                                                                                              • String ID: J7D
                                                                                                                              • API String ID: 3033488037-1677391033
                                                                                                                              • Opcode ID: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                                                                                                                              • Instruction ID: b5a2c1f2d034459fb850ff781f480331835685433a1d37f27cfcf8091ebf3f31
                                                                                                                              • Opcode Fuzzy Hash: e789079c2bca6bbabae9b3291a6a7c0d52dcd5a72fb4a21e852c8be1410d12d6
                                                                                                                              • Instruction Fuzzy Hash: 9251E371A00604AFEB20DF6AC841B6AB3F4EF95724F14416EE909D7251E739ED15CB88
                                                                                                                              APIs
                                                                                                                              • GetConsoleCP.KERNEL32(?,?,?,?,?,?,?,?,?,0044A838,?,?,?,?,?,?), ref: 0044A105
                                                                                                                              • __fassign.LIBCMT ref: 0044A180
                                                                                                                              • __fassign.LIBCMT ref: 0044A19B
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000005,00000000,00000000), ref: 0044A1C1
                                                                                                                              • WriteFile.KERNEL32(?,?,00000000,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A1E0
                                                                                                                              • WriteFile.KERNEL32(?,?,00000001,0044A838,00000000,?,?,?,?,?,?,?,?,?,0044A838,?), ref: 0044A219
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1324828854-0
                                                                                                                              • Opcode ID: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                                              • Instruction ID: b40464c9ec282996611fef5cbd20273031f87559cdf671a411eba52403cbf28d
                                                                                                                              • Opcode Fuzzy Hash: c2a57007ecaabeafdb2dea6b541a07f99f491d21749d301156e70ae2fc22959b
                                                                                                                              • Instruction Fuzzy Hash: DB51E270E002099FEB10CFA8D881AEEBBF8FF09300F14416BE815E3391D6749951CB6A
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free
                                                                                                                              • String ID: HE$HE
                                                                                                                              • API String ID: 269201875-1978648262
                                                                                                                              • Opcode ID: 9646bc9111d8c011bc6d4e57164ebf3b30a2777ab51848a7cb2f829f5b6e271b
                                                                                                                              • Instruction ID: 4134de32792d44acead4bb36f8da9b5b282593f8ffe10db144b1eaf4d9577b64
                                                                                                                              • Opcode Fuzzy Hash: 9646bc9111d8c011bc6d4e57164ebf3b30a2777ab51848a7cb2f829f5b6e271b
                                                                                                                              • Instruction Fuzzy Hash: 90412A31A009106BEF24AABA8CD5A7F3B64DF45375F14031BFC1896293D67C8C4996AA
                                                                                                                              APIs
                                                                                                                              • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,10009C07,?,00000000,?,00000000,00000000), ref: 100094D4
                                                                                                                              • __fassign.LIBCMT ref: 1000954F
                                                                                                                              • __fassign.LIBCMT ref: 1000956A
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                                                                              • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095AF
                                                                                                                              • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000,?,?,?,?,?,?,?,?,?,10009C07,?), ref: 100095E8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1324828854-0
                                                                                                                              • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                              • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                                                                              • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                                                                              • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                                                                              APIs
                                                                                                                              • RtlExitUserThread.NTDLL(00000000), ref: 004017F4
                                                                                                                              • waveInUnprepareHeader.WINMM(00001E64,00000020,00000000,?,00000020,00473EE8,00000000), ref: 00401902
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ExitHeaderThreadUnprepareUserwave
                                                                                                                              • String ID: T=G$p[G$>G$>G
                                                                                                                              • API String ID: 799343363-2461731529
                                                                                                                              • Opcode ID: b2580688079fa86a780eb9510493151aabbd3c1859bc783d66d1da9b41e64297
                                                                                                                              • Instruction ID: b2aa677fe1363808454ef9d3704f93b9908b7cd688e3fd59dcdd6ad405d7ff49
                                                                                                                              • Opcode Fuzzy Hash: b2580688079fa86a780eb9510493151aabbd3c1859bc783d66d1da9b41e64297
                                                                                                                              • Instruction Fuzzy Hash: 0D41A0316042019BC324FB65DCA6EAE73A4EB94318F00453FF54AA71F2DF78A945C65E
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041B15B: GetCurrentProcess.KERNEL32(?,?,?,0040C914,004664C4,00000000), ref: 0041B16C
                                                                                                                                • Part of subcall function 0041B15B: IsWow64Process.KERNEL32(00000000,?,?,0040C914,004664C4,00000000), ref: 0041B173
                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040E6C1
                                                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0040E6E5
                                                                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E6F4
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040E8AB
                                                                                                                                • Part of subcall function 0041B187: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040E4D0,00000000,?,?,00474358), ref: 0041B19C
                                                                                                                                • Part of subcall function 0041B187: IsWow64Process.KERNEL32(00000000,?,?,?,00474358), ref: 0041B1A7
                                                                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040E89C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                                              • String ID: PgF
                                                                                                                              • API String ID: 2180151492-654241383
                                                                                                                              • Opcode ID: d8baab23e8f93a52954a3b3f0fba960a7d0f49789b297e08acff3ba4af2fb08a
                                                                                                                              • Instruction ID: 1ccfc3ca83e07eb3b8bade3b71d1bee95701cef3987deea6625860c00c24977f
                                                                                                                              • Opcode Fuzzy Hash: d8baab23e8f93a52954a3b3f0fba960a7d0f49789b297e08acff3ba4af2fb08a
                                                                                                                              • Instruction Fuzzy Hash: F641E1311083415BC325F761D8A1AEFB7E9EFA4305F50453EF84A931E1EF389A49C65A
                                                                                                                              APIs
                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                                                                              • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                              • String ID: csm
                                                                                                                              • API String ID: 1170836740-1018135373
                                                                                                                              • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                              • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                                                                              • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                                                                              • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 3d69e70559af274fcb655f0a897680ba9bb64504a1d54728d155f8b0882cbcc9
                                                                                                                              • Instruction ID: 969edc756a0dffe936139f0dc9bce31aed38431af2e56c5058bd22e5c2f4fad6
                                                                                                                              • Opcode Fuzzy Hash: 3d69e70559af274fcb655f0a897680ba9bb64504a1d54728d155f8b0882cbcc9
                                                                                                                              • Instruction Fuzzy Hash: 991124B1508654FBDB202F769C4493B3B6CEF82376B10016FFC15D7242DA7C8805C2AA
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0044FA22: _free.LIBCMT ref: 0044FA4B
                                                                                                                              • _free.LIBCMT ref: 0044FD29
                                                                                                                                • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                                              • _free.LIBCMT ref: 0044FD34
                                                                                                                              • _free.LIBCMT ref: 0044FD3F
                                                                                                                              • _free.LIBCMT ref: 0044FD93
                                                                                                                              • _free.LIBCMT ref: 0044FD9E
                                                                                                                              • _free.LIBCMT ref: 0044FDA9
                                                                                                                              • _free.LIBCMT ref: 0044FDB4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                                              • Instruction ID: b6f47af98b99390d2ca34363280ce03bc5e4d1be0f6c4f29549f69d6ae0d3a9a
                                                                                                                              • Opcode Fuzzy Hash: 7c29d87e7d6a666a6374703866dd42c53a280d6db8acc668fe4e1522d65ba280
                                                                                                                              • Instruction Fuzzy Hash: 5F119031711B04B6F520FBB2CC07FCBB7DC9F42308F814C2EB29E76152E628A9184645
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                                                                              • _free.LIBCMT ref: 100092AB
                                                                                                                                • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                              • _free.LIBCMT ref: 100092B6
                                                                                                                              • _free.LIBCMT ref: 100092C1
                                                                                                                              • _free.LIBCMT ref: 10009315
                                                                                                                              • _free.LIBCMT ref: 10009320
                                                                                                                              • _free.LIBCMT ref: 1000932B
                                                                                                                              • _free.LIBCMT ref: 10009336
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                              • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                                                                              • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                                                                              • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041C988
                                                                                                                                • Part of subcall function 0041CA1F: RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                                                                • Part of subcall function 0041CA1F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                                                                • Part of subcall function 0041CA1F: GetLastError.KERNEL32 ref: 0041CA91
                                                                                                                              • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041C9BF
                                                                                                                              • lstrcpyn.KERNEL32(00473B68,0046C104,00000080), ref: 0041C9D9
                                                                                                                              • Shell_NotifyIcon.SHELL32(00000000,00473B50), ref: 0041C9EF
                                                                                                                              • TranslateMessage.USER32(?), ref: 0041C9FB
                                                                                                                              • DispatchMessageA.USER32(?), ref: 0041CA05
                                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041CA12
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1970332568-0
                                                                                                                              • Opcode ID: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                                              • Instruction ID: 0af2178feff80faf092f0d4c6bffee9b758878d1eb04e36c9ad6546aee081b39
                                                                                                                              • Opcode Fuzzy Hash: 3916a83a2764b610bd39468394578f6b6e569060e520b3e5816c6a16bad35c1f
                                                                                                                              • Instruction Fuzzy Hash: 760121B1944344ABD7109FA5FC4CEDA7BBCAB45B16F004035F605E2162D7B8A285DB2D
                                                                                                                              Strings
                                                                                                                              • Rmc-R1T905, xrefs: 0040693F
                                                                                                                              • BG, xrefs: 00406909
                                                                                                                              • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe, xrefs: 00406927
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe$Rmc-R1T905$BG
                                                                                                                              • API String ID: 0-1952558893
                                                                                                                              • Opcode ID: 80050a427f5642be038ed20f9cc5897f2179df45ad3656bea1b8b3f18dea3d61
                                                                                                                              • Instruction ID: a0817f974ad937f6cb5b9dd001e5131ae01746641b95ac10126ddf8aadfa6e31
                                                                                                                              • Opcode Fuzzy Hash: 80050a427f5642be038ed20f9cc5897f2179df45ad3656bea1b8b3f18dea3d61
                                                                                                                              • Instruction Fuzzy Hash: 05F096B17022109BDB103774BC1967A3645A780356F01847BF94BFA6E5DB3C8851869C
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyW.ADVAPI32(80000001,00000000,BG), ref: 0041277F
                                                                                                                              • RegSetValueExW.ADVAPI32(BG,?,00000000,00000001,00000000,00000000,004742F8,?,0040E5CB,pth_unenc,004742E0), ref: 004127AD
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,0040E5CB,pth_unenc,004742E0), ref: 004127B8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValue
                                                                                                                              • String ID: hu$pth_unenc$BG
                                                                                                                              • API String ID: 1818849710-3117873485
                                                                                                                              • Opcode ID: f5d5f4cec46e144fe93207e59d11bf108328240b0917a9579c7bf5bbb869924d
                                                                                                                              • Instruction ID: fff2d7bcc465bc574364a4979b4b77ba115ffea085319746951fe37a0eeb78e5
                                                                                                                              • Opcode Fuzzy Hash: f5d5f4cec46e144fe93207e59d11bf108328240b0917a9579c7bf5bbb869924d
                                                                                                                              • Instruction Fuzzy Hash: 9FF0CD31500218BBDF109FA0ED46EEF37ACAB40B50F104539F902A60A1E675DB14DAA4
                                                                                                                              APIs
                                                                                                                              • __allrem.LIBCMT ref: 00439789
                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397A5
                                                                                                                              • __allrem.LIBCMT ref: 004397BC
                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004397DA
                                                                                                                              • __allrem.LIBCMT ref: 004397F1
                                                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043980F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1992179935-0
                                                                                                                              • Opcode ID: d36a6b772fc6e9566a205129c4ee7c3f2aa8f456d505afcc67e1d95a291563b1
                                                                                                                              • Instruction ID: 29148231e9435c1f59b8c02308e8e4f0c882d016d38a0f6ab7871d26eba04b65
                                                                                                                              • Opcode Fuzzy Hash: d36a6b772fc6e9566a205129c4ee7c3f2aa8f456d505afcc67e1d95a291563b1
                                                                                                                              • Instruction Fuzzy Hash: 7A811B726017069BE724AE79CC82B6F73A8AF49328F24512FF511D66C1E7B8DD018B58
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,?,?,?,?,00449BA1,00000001,00000001,?), ref: 004499AA
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,?,?,?,00449BA1,00000001,00000001,?), ref: 00449A30
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00449B2A
                                                                                                                              • __freea.LIBCMT ref: 00449B37
                                                                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00446B31
                                                                                                                              • __freea.LIBCMT ref: 00449B40
                                                                                                                              • __freea.LIBCMT ref: 00449B65
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1414292761-0
                                                                                                                              • Opcode ID: 81d70c20703e66394a8e6e24da3589bfc2c015b76e7b2aedf7d205086cdaf592
                                                                                                                              • Instruction ID: d3450b84a68f20df6837e20b70452335b33749c243a385fd48b45426a0ff81fe
                                                                                                                              • Opcode Fuzzy Hash: 81d70c20703e66394a8e6e24da3589bfc2c015b76e7b2aedf7d205086cdaf592
                                                                                                                              • Instruction Fuzzy Hash: 89511572610246AFFB258F65DC81EBB77A9EB44754F15462EFC04E6240EF38EC40E668
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                                                                              • __freea.LIBCMT ref: 10008A08
                                                                                                                                • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                              • __freea.LIBCMT ref: 10008A11
                                                                                                                              • __freea.LIBCMT ref: 10008A36
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1414292761-0
                                                                                                                              • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                              • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                                                                              • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                                                                              • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: __cftoe
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4189289331-0
                                                                                                                              • Opcode ID: 07fcb3c060a749777e725642930ed18157a1f5019e1f3146b4d3bc33616e3b2a
                                                                                                                              • Instruction ID: 646e0444ce84107b4b6d0ff1d92098e8eb0dfa86acef9ec08128487301265115
                                                                                                                              • Opcode Fuzzy Hash: 07fcb3c060a749777e725642930ed18157a1f5019e1f3146b4d3bc33616e3b2a
                                                                                                                              • Instruction Fuzzy Hash: A851FC72900105ABFB249F598C81F6F77A9EFC9324F15421FF815A6281DB3DDD01866D
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 00406C38
                                                                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,000186A0), ref: 00406C80
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00406CC0
                                                                                                                              • MoveFileW.KERNEL32(00000000,00000000), ref: 00406CDD
                                                                                                                              • CloseHandle.KERNEL32(00000000,00000057,?,00000008), ref: 00406D08
                                                                                                                              • DeleteFileW.KERNEL32(00000000), ref: 00406D18
                                                                                                                                • Part of subcall function 0040455B: WaitForSingleObject.KERNEL32(?,000000FF,?,?,0040460E,00000000,?), ref: 0040456A
                                                                                                                                • Part of subcall function 0040455B: SetEvent.KERNEL32(?,?,0040460E,00000000,?), ref: 00404588
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1303771098-0
                                                                                                                              • Opcode ID: 201923e42a5d407643d227d33cba3476f9d3e1c196e47d384138e67efb20e303
                                                                                                                              • Instruction ID: a9f2b94bfe891e644ef5b97f564769cd4b441703f4f7d546a0b6aea2ef9939f1
                                                                                                                              • Opcode Fuzzy Hash: 201923e42a5d407643d227d33cba3476f9d3e1c196e47d384138e67efb20e303
                                                                                                                              • Instruction Fuzzy Hash: 1C31C2715083019FD210EF21DD459AFB7A8FB85715F40093FF9C6A21A1DB38AA48CB9A
                                                                                                                              APIs
                                                                                                                              • _strlen.LIBCMT ref: 10001607
                                                                                                                              • _strcat.LIBCMT ref: 1000161D
                                                                                                                              • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                                                                              • lstrcatW.KERNEL32(?,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 1000165A
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                                                                              • lstrcatW.KERNEL32(00001008,?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104), ref: 10001686
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrcatlstrlen$_strcat_strlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1922816806-0
                                                                                                                              • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                              • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                                                                              • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                                                                              • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                                                                              APIs
                                                                                                                              • lstrcatW.KERNEL32(?,?,?,?,?,00000000), ref: 10001038
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                                                                              • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$AttributesFilelstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3594823470-0
                                                                                                                              • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                              • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                                                                              • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                                                                              • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011), ref: 00419C94
                                                                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,000F003F), ref: 00419CAB
                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00419CB8
                                                                                                                              • ControlService.ADVAPI32(00000000,00000001,?), ref: 00419CC7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Service$Open$CloseControlHandleManager
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1243734080-0
                                                                                                                              • Opcode ID: 3abd86868e1217ea2d45c9c88d919e3d4f56aa0647f23c1260161372d98c8da3
                                                                                                                              • Instruction ID: aaf019a9b49167a30595a2ca3c371567d0eeee9026f0995440eeab6e66ec65be
                                                                                                                              • Opcode Fuzzy Hash: 3abd86868e1217ea2d45c9c88d919e3d4f56aa0647f23c1260161372d98c8da3
                                                                                                                              • Instruction Fuzzy Hash: 00118632901218AFD7116B64EC85DFF3FACDB45BA5B000036F502921D1DB64DD46AAF5
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32(?,?,00437DFD,004377B1), ref: 00437E14
                                                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00437E22
                                                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00437E3B
                                                                                                                              • SetLastError.KERNEL32(00000000,?,00437DFD,004377B1), ref: 00437E8D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3852720340-0
                                                                                                                              • Opcode ID: 91ac95939cd3c96bc489c52a0530c238d3093d1082c7131376b84a6130b97103
                                                                                                                              • Instruction ID: be779a20f6972cc68ff7cd304671387be2c97454b743a33de387a584dbd8fa65
                                                                                                                              • Opcode Fuzzy Hash: 91ac95939cd3c96bc489c52a0530c238d3093d1082c7131376b84a6130b97103
                                                                                                                              • Instruction Fuzzy Hash: 2A01D8B222D315ADEB3427757C87A172699EB09779F2013BFF228851E1EF294C41914C
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                                                                              • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3852720340-0
                                                                                                                              • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                              • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                                                                              • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                                                                              • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32(?,?,0043931C,?,?,?,0043E4CD,?,?), ref: 00446EC3
                                                                                                                              • _free.LIBCMT ref: 00446EF6
                                                                                                                              • _free.LIBCMT ref: 00446F1E
                                                                                                                              • SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F2B
                                                                                                                              • SetLastError.KERNEL32(00000000,0043E4CD,?,?), ref: 00446F37
                                                                                                                              • _abort.LIBCMT ref: 00446F3D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3160817290-0
                                                                                                                              • Opcode ID: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                                                              • Instruction ID: 3d2b287d931d31d162837175e2379b90ae0e47a7897f975c134f35b9cb22fcab
                                                                                                                              • Opcode Fuzzy Hash: c8da7f0c6bc53abe63124bd11b18efa7ba6299d8fddab580282761fd2749e6ad
                                                                                                                              • Instruction Fuzzy Hash: 2AF0F93560870177F6226339BD45A6F16559BC37A6F36003FF414A2293EE2D8C46451F
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                                                                              • _free.LIBCMT ref: 10005B2D
                                                                                                                              • _free.LIBCMT ref: 10005B55
                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                                                                              • _abort.LIBCMT ref: 10005B74
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3160817290-0
                                                                                                                              • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                              • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                                                                              • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                                                                              • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExA.ADVAPI32(80000002,0046BD30,00000000,00020019,?), ref: 0041B846
                                                                                                                              • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041B88A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EnumOpen
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 3231578192-423011080
                                                                                                                              • Opcode ID: f46f1a9284f9aadb95e313cfc30b4f0416f7e9dd0f09b0a54e2c892f2b19f8df
                                                                                                                              • Instruction ID: 4ca6cd9db44c7b11bab16217f2b7ba144dfc64e74838f3250c32f9e768a6938f
                                                                                                                              • Opcode Fuzzy Hash: f46f1a9284f9aadb95e313cfc30b4f0416f7e9dd0f09b0a54e2c892f2b19f8df
                                                                                                                              • Instruction Fuzzy Hash: 8C812E311082449BD324EB11DC51AEFB7E9FFD4314F10493FB58A921E1EF74AA49CA9A
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00411699: TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                                • Part of subcall function 00411699: WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                                • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                                • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                                • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040C6C7
                                                                                                                              • ShellExecuteW.SHELL32(00000000,0046559C,00000000,00465900,00465900,00000000), ref: 0040C826
                                                                                                                              • ExitProcess.KERNEL32 ref: 0040C832
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                                              • String ID: @CG$exepath
                                                                                                                              • API String ID: 1913171305-1253070338
                                                                                                                              • Opcode ID: 94629b5a76b024ac5dfd140f416171875c911cd2bae1f5b7283192f046441c83
                                                                                                                              • Instruction ID: a795a6540db69397e2c5d2b70f340dd787df27bacd58b350937fb1c0aad7b7c4
                                                                                                                              • Opcode Fuzzy Hash: 94629b5a76b024ac5dfd140f416171875c911cd2bae1f5b7283192f046441c83
                                                                                                                              • Instruction Fuzzy Hash: A2416D329001185ACB14F762DC56DFE7779AF50718F50417FF906B30E2EE386A8ACA99
                                                                                                                              APIs
                                                                                                                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00413E86
                                                                                                                              • LoadLibraryA.KERNEL32(?), ref: 00413EC8
                                                                                                                              • LoadLibraryA.KERNEL32(?), ref: 00413F27
                                                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00413F4F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad$AddressDirectoryProcSystem
                                                                                                                              • String ID: Wu
                                                                                                                              • API String ID: 4217395396-4083010176
                                                                                                                              • Opcode ID: eb34a3b39f8cebbf818652b9c61e1d8af9f13deba3c3e1946aabc5676101914a
                                                                                                                              • Instruction ID: a4547f3d416e9253f7b1cbdd0907a67efdadb69b2b53743d1710677937ed8fa2
                                                                                                                              • Opcode Fuzzy Hash: eb34a3b39f8cebbf818652b9c61e1d8af9f13deba3c3e1946aabc5676101914a
                                                                                                                              • Instruction Fuzzy Hash: 6D31C4B1906315A7D320AF25DC44ACBB7ECEF44745F400A2AF844D3201D778DA858AEE
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                                • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                                                • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                                • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                                • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                                              • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                                                                                • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                                                                                • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                                                                              • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                                                                              • API String ID: 4036392271-1520055953
                                                                                                                              • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                              • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                                                                              • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                                                                              • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00401BE8: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401C54
                                                                                                                              • waveInUnprepareHeader.WINMM(00471AC0,00000020,00000000,?), ref: 00401B85
                                                                                                                              • waveInPrepareHeader.WINMM(00471AC0,00000020), ref: 00401BC3
                                                                                                                              • waveInAddBuffer.WINMM(00471AC0,00000020), ref: 00401BD2
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wave$Header$BufferCreateFilePrepareUnprepare
                                                                                                                              • String ID: `=G$x=G
                                                                                                                              • API String ID: 3979376653-3004145341
                                                                                                                              • Opcode ID: df59c76beb88092c917db78b9694a60fa3e069ca8193b9d1563ba84385e804c6
                                                                                                                              • Instruction ID: ec6e8c75c27496dd15f6dcc160753dc5291fcfbcfc36b55cd818fae73feeac55
                                                                                                                              • Opcode Fuzzy Hash: df59c76beb88092c917db78b9694a60fa3e069ca8193b9d1563ba84385e804c6
                                                                                                                              • Instruction Fuzzy Hash: 6C317E315053009BC314EF25DC56A9E77E8BB94314F00883EF559A21F1EF78AA49CB9A
                                                                                                                              APIs
                                                                                                                              • RegisterClassExA.USER32(00000030), ref: 0041CA6C
                                                                                                                              • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041CA87
                                                                                                                              • GetLastError.KERNEL32 ref: 0041CA91
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                                              • String ID: 0$MsgWindowClass
                                                                                                                              • API String ID: 2877667751-2410386613
                                                                                                                              • Opcode ID: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                                                              • Instruction ID: bff961279ea7560c1ff94ea7b7e8445e3758215821d07408c43b005d8adda241
                                                                                                                              • Opcode Fuzzy Hash: 8e3fabf9294f4d788ff0190a2140b1e52dfb9086da58b750c2f99102573e0e65
                                                                                                                              • Instruction Fuzzy Hash: 2D01E9B1D1431EAB8B01DFE9DCC4AEFBBBDBE49255B50452AE410B2200E7704A448BA5
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044258A,00000000,?,0044252A,00000000,0046DAE0,0000000C,00442681,00000000,00000002), ref: 004425F9
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044260C
                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,0044258A,00000000,?,0044252A,00000000,0046DAE0,0000000C,00442681,00000000,00000002), ref: 0044262F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                                                              • API String ID: 4061214504-1276376045
                                                                                                                              • Opcode ID: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                                              • Instruction ID: 32bca75c9846dbfd0145c2b425e1dcbc158e0b1ec8d75d3d798e8c7ef3c4518a
                                                                                                                              • Opcode Fuzzy Hash: 84f8467b83475f4999ab7b265d6d7c22c059d91a263d45f4d19e228ed4a2ac86
                                                                                                                              • Instruction Fuzzy Hash: 14F04430904209FBDB169FA5ED09B9EBFB5EB08756F4140B9F805A2251DF749D40CA9C
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 10004B6C
                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                                                              • API String ID: 4061214504-1276376045
                                                                                                                              • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                              • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                                                                              • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                                                                              • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 0b7932fa83e9ba5eb9d653f19e166e85ee98fc69a8573f7c14dc7a35e70d7f03
                                                                                                                              • Instruction ID: 5f24fa964153eb206603784754227e3bedeb81a57cd12874f4c303f17d5dd595
                                                                                                                              • Opcode Fuzzy Hash: 0b7932fa83e9ba5eb9d653f19e166e85ee98fc69a8573f7c14dc7a35e70d7f03
                                                                                                                              • Instruction Fuzzy Hash: FD71C231900216DBEB218F55C884ABFBB75FF55360F14026BEE10A7281D7B89D61CBA9
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Sleep
                                                                                                                              • String ID: P>G$dSF$pSF$|SF
                                                                                                                              • API String ID: 3472027048-1292307377
                                                                                                                              • Opcode ID: 9c497c8453a119d37b2abf1c7b6b4ac671815afcf6a15aef963c8e980491f105
                                                                                                                              • Instruction ID: 0dce3c58988623f436d5c5d916b021fc345e3c2d86dff9f08dc17926b78fee06
                                                                                                                              • Opcode Fuzzy Hash: 9c497c8453a119d37b2abf1c7b6b4ac671815afcf6a15aef963c8e980491f105
                                                                                                                              • Instruction Fuzzy Hash: A441A330A0420197CA14FB79C816AAD3A655B45704F00453FF809A73E2EF7C9A45C7CF
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 269201875-0
                                                                                                                              • Opcode ID: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                                              • Instruction ID: 1dbcf13812f0ad7c91f1b1cf961d24232ef3b5dad0ac29e3e9285c08b65e5f3f
                                                                                                                              • Opcode Fuzzy Hash: f0a2e76299140c1b889b6a2776586b742041be663085ede9ef76686f57abf0cb
                                                                                                                              • Instruction Fuzzy Hash: 4A41D532E002049FEB24DF79C881A5EB3A5EF89718F15856EE915EB341DB35EE01CB84
                                                                                                                              APIs
                                                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 0044E144
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044E167
                                                                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00446B31
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044E18D
                                                                                                                              • _free.LIBCMT ref: 0044E1A0
                                                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044E1AF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 336800556-0
                                                                                                                              • Opcode ID: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                                                                                                                              • Instruction ID: 38685928f53d0fdec7f9771a1fbcf5508afe04d06d5fe5a1692e2fd93afee85f
                                                                                                                              • Opcode Fuzzy Hash: 4bdc18aade4f5afa9f676aa8b8aa9a2318643a84ce2148a0478020116eae0cde
                                                                                                                              • Instruction Fuzzy Hash: 8201B1726417117F73215ABB6C8CC7B6A6DEEC2BA2315013ABD04D6201DA788C0291B9
                                                                                                                              APIs
                                                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                                                                                • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                                                                              • _free.LIBCMT ref: 100071B8
                                                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 336800556-0
                                                                                                                              • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                              • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                                                                              • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                                                                              • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32(?,?,?,00445359,0044B9F1,?,?,0042E9D8,?,00000008,0042EAD7,00000001,?,?,?), ref: 00446F48
                                                                                                                              • _free.LIBCMT ref: 00446F7D
                                                                                                                              • _free.LIBCMT ref: 00446FA4
                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,?), ref: 00446FB1
                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,?), ref: 00446FBA
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3170660625-0
                                                                                                                              • Opcode ID: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                                                              • Instruction ID: 6bd692df8320938abc1815071491dbd9703328d73d2f54107518a18b095bb187
                                                                                                                              • Opcode Fuzzy Hash: d9a11e8b10a3382acc57acd06360e0df9f500200efacd02ff515e0ca4c66fe47
                                                                                                                              • Instruction Fuzzy Hash: 7401D13620C70067F61266757C85D2F266DDBC3B66727013FF958A2292EE2CCC0A452F
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                                                                              • _free.LIBCMT ref: 10005BB4
                                                                                                                              • _free.LIBCMT ref: 10005BDB
                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$_free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3170660625-0
                                                                                                                              • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                              • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                                                                              • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                                                                              • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                                                                              APIs
                                                                                                                              • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                                              • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                                              • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041B3C8
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3D3
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041B3DB
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CloseHandleOpen$FileImageName
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2951400881-0
                                                                                                                              • Opcode ID: 5115dc8d21cc8ae304c84a9c6d3d66be3b1fde84125eb931853a25931357237b
                                                                                                                              • Instruction ID: bb9aee54fd4b55ef2446b45ef4d52834339351c189d8e7c886657dc3bd6b5f1d
                                                                                                                              • Opcode Fuzzy Hash: 5115dc8d21cc8ae304c84a9c6d3d66be3b1fde84125eb931853a25931357237b
                                                                                                                              • Instruction Fuzzy Hash: 2FF04971204209ABD3106754AC4AFA7B27CDB40B96F000037FA61D22A1FFB4CCC146AE
                                                                                                                              APIs
                                                                                                                              • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                                                                              • lstrcatW.KERNEL32(?,?,?,100010DF,?,?,?,00000000), ref: 10001EAC
                                                                                                                              • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                                                                              • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                                                                              • lstrcatW.KERNEL32(?,100010DF,?,100010DF,?,?,?,00000000), ref: 10001ED3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: lstrlen$lstrcat
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 493641738-0
                                                                                                                              • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                              • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                                                                              • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                                                                              • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 0044F7B5
                                                                                                                                • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                                              • _free.LIBCMT ref: 0044F7C7
                                                                                                                              • _free.LIBCMT ref: 0044F7D9
                                                                                                                              • _free.LIBCMT ref: 0044F7EB
                                                                                                                              • _free.LIBCMT ref: 0044F7FD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                                              • Instruction ID: 78b16e2cd2bc6e4547488c8f4e3d182d22cf8911186b8f77a4a783cd10448158
                                                                                                                              • Opcode Fuzzy Hash: 24d082c4c32556380d94a426a0797d769337f58152c77e2724906da83e703e03
                                                                                                                              • Instruction Fuzzy Hash: 9AF01232505600BBE620EB59E8C5C1773E9EB827147A9482BF408F7641CB3DFCC48A6C
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 100091D0
                                                                                                                                • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                              • _free.LIBCMT ref: 100091E2
                                                                                                                              • _free.LIBCMT ref: 100091F4
                                                                                                                              • _free.LIBCMT ref: 10009206
                                                                                                                              • _free.LIBCMT ref: 10009218
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                              • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                                                                              • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                                                                              • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 00443305
                                                                                                                                • Part of subcall function 00446AC5: RtlFreeHeap.NTDLL(00000000,00000000,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?), ref: 00446ADB
                                                                                                                                • Part of subcall function 00446AC5: GetLastError.KERNEL32(?,?,0044FA50,?,00000000,?,00000000,?,0044FCF4,?,00000007,?,?,00450205,?,?), ref: 00446AED
                                                                                                                              • _free.LIBCMT ref: 00443317
                                                                                                                              • _free.LIBCMT ref: 0044332A
                                                                                                                              • _free.LIBCMT ref: 0044333B
                                                                                                                              • _free.LIBCMT ref: 0044334C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                                              • Instruction ID: 76e6a482bc9a1727a28655d1f271e5fc3ecde01143ea680422932a64b095765e
                                                                                                                              • Opcode Fuzzy Hash: ab870860b33c9a3cd44b9e2e3565930e421ff68453c6808a8f097650461ead98
                                                                                                                              • Instruction Fuzzy Hash: B9F05EF08075209FAB12AF2DBD014893BA0B786755306413BF41EB2772EB380D95DB8E
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 1000536F
                                                                                                                                • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?), ref: 10005734
                                                                                                                                • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                                                                              • _free.LIBCMT ref: 10005381
                                                                                                                              • _free.LIBCMT ref: 10005394
                                                                                                                              • _free.LIBCMT ref: 100053A5
                                                                                                                              • _free.LIBCMT ref: 100053B6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 776569668-0
                                                                                                                              • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                              • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                                                                              • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                                                                              • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: __freea
                                                                                                                              • String ID: a/p$am/pm
                                                                                                                              • API String ID: 240046367-3206640213
                                                                                                                              • Opcode ID: 6841855824e3571749ce12cefb3b7c7162a35dcfd3a75c445570e2c90ce7a48e
                                                                                                                              • Instruction ID: cf09b504ad0dd49156c227457699755419044adef71e8be36bbdd309731302d4
                                                                                                                              • Opcode Fuzzy Hash: 6841855824e3571749ce12cefb3b7c7162a35dcfd3a75c445570e2c90ce7a48e
                                                                                                                              • Instruction Fuzzy Hash: 5FD1F271A00206EAFB249F68D945ABBB7B0FF06300F26415BE905AB749D37D8D41CB5B
                                                                                                                              APIs
                                                                                                                              • GetWindowThreadProcessId.USER32(?,?), ref: 00416768
                                                                                                                              • GetWindowTextW.USER32(?,?,0000012C), ref: 0041679A
                                                                                                                              • IsWindowVisible.USER32(?), ref: 004167A1
                                                                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041B395
                                                                                                                                • Part of subcall function 0041B37D: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041B3A8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProcessWindow$Open$TextThreadVisible
                                                                                                                              • String ID: (FG
                                                                                                                              • API String ID: 3142014140-2273637114
                                                                                                                              • Opcode ID: e2d1511c28add454b0ada0f3d3c19ffaec0e9cd4d3a45452fa2e7b74fbd0573e
                                                                                                                              • Instruction ID: 6337817d5adb2ff800b6fe7f9081d1b6a06097940366009b721c4d78a1625a25
                                                                                                                              • Opcode Fuzzy Hash: e2d1511c28add454b0ada0f3d3c19ffaec0e9cd4d3a45452fa2e7b74fbd0573e
                                                                                                                              • Instruction Fuzzy Hash: FD71E6321082414AC325FB61D8A5ADFB3E4AFE4319F50453EF58A530E1EF746A49C79A
                                                                                                                              APIs
                                                                                                                              • RegQueryInfoKeyW.ADVAPI32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00412A1D
                                                                                                                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?,?,00000000,?,?,?,?), ref: 00412A4C
                                                                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,?,?,00002710,?,?,?,00000000,?,?,?,?), ref: 00412AED
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Enum$InfoQueryValue
                                                                                                                              • String ID: DG
                                                                                                                              • API String ID: 3554306468-2560412334
                                                                                                                              • Opcode ID: deb3a18c0cb28d4fea9447ce49743d788fd5ecfec18bdebf5e299926c05ccf77
                                                                                                                              • Instruction ID: 09469598a034e88a10af8fecb22bb8a395a4bc85e225d04bcc93034602455e52
                                                                                                                              • Opcode Fuzzy Hash: deb3a18c0cb28d4fea9447ce49743d788fd5ecfec18bdebf5e299926c05ccf77
                                                                                                                              • Instruction Fuzzy Hash: D8512E72108345AFD310EB61D995DEFB7ECEF84744F00493EB585D2191EB74EA088B6A
                                                                                                                              APIs
                                                                                                                              • _strpbrk.LIBCMT ref: 0044D4A8
                                                                                                                              • _free.LIBCMT ref: 0044D5C5
                                                                                                                                • Part of subcall function 0043A854: IsProcessorFeaturePresent.KERNEL32(00000017,0043A826,0046DDE8,0044EBF5,00000000,00000000,00000000,00000016,?,?,0043A833,00000000,00000000,00000000,00000000,00000000), ref: 0043A856
                                                                                                                                • Part of subcall function 0043A854: GetCurrentProcess.KERNEL32(C0000417,0044EBF5,0046DDE8,0000002C,004453C6,00000016,00446F42), ref: 0043A878
                                                                                                                                • Part of subcall function 0043A854: TerminateProcess.KERNEL32(00000000), ref: 0043A87F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                                              • String ID: *?$.
                                                                                                                              • API String ID: 2812119850-3972193922
                                                                                                                              • Opcode ID: 095989de2014c8a081487188acaa88e65a6dc2a622bb6a7fdea028db515cfa1e
                                                                                                                              • Instruction ID: 2d4433a3afc190a5690657b280c6536bac4d5ba0d1806d6c31be7b1549e3be36
                                                                                                                              • Opcode Fuzzy Hash: 095989de2014c8a081487188acaa88e65a6dc2a622bb6a7fdea028db515cfa1e
                                                                                                                              • Instruction Fuzzy Hash: 7251B371E00109AFEF14DFA9C881AAEB7F5EF58318F24416FE854E7301DA799E018B54
                                                                                                                              APIs
                                                                                                                              • GetKeyboardLayoutNameA.USER32(?), ref: 00409601
                                                                                                                                • Part of subcall function 004041F1: socket.WS2_32(00000000,00000001,00000006), ref: 00404212
                                                                                                                                • Part of subcall function 0040428C: connect.WS2_32(?,00000000,00000000), ref: 004042A5
                                                                                                                                • Part of subcall function 0041B6AA: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409689,00473EE8,?,00473EE8,00000000,00473EE8,00000000), ref: 0041B6BF
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateFileKeyboardLayoutNameconnectsendsocket
                                                                                                                              • String ID: XCG$`AG$>G
                                                                                                                              • API String ID: 2334542088-2372832151
                                                                                                                              • Opcode ID: 7f404ea29c747a4aa48a1934a8d350a310482b3ad7008011e084f08ab5ca2fa7
                                                                                                                              • Instruction ID: 7adbea44916697806613a62f0197ef330eb15d5bc584e2d7fa9685cab7613629
                                                                                                                              • Opcode Fuzzy Hash: 7f404ea29c747a4aa48a1934a8d350a310482b3ad7008011e084f08ab5ca2fa7
                                                                                                                              • Instruction Fuzzy Hash: 865143321042405BC325F775D8A2AEF73D5AFE4308F50483FF84A671E2EE785949C69A
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe,00000104), ref: 00442714
                                                                                                                              • _free.LIBCMT ref: 004427DF
                                                                                                                              • _free.LIBCMT ref: 004427E9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$FileModuleName
                                                                                                                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                              • API String ID: 2506810119-1837893624
                                                                                                                              • Opcode ID: b75dab3948bdc1979b3e0d7ca0cde66feab97c2c4a325a3b0c659ceb83c609df
                                                                                                                              • Instruction ID: 3cff5717343a4e3a710d875500e96c622d597d45f5ef159119de948e6b6562f0
                                                                                                                              • Opcode Fuzzy Hash: b75dab3948bdc1979b3e0d7ca0cde66feab97c2c4a325a3b0c659ceb83c609df
                                                                                                                              • Instruction Fuzzy Hash: 3E31B371A00218AFEB21DF9ADD81D9EBBFCEB85314F54406BF804A7311D6B88E41DB59
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe,00000104), ref: 10004C1D
                                                                                                                              • _free.LIBCMT ref: 10004CE8
                                                                                                                              • _free.LIBCMT ref: 10004CF2
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _free$FileModuleName
                                                                                                                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                              • API String ID: 2506810119-1837893624
                                                                                                                              • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                              • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                                                                              • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                                                                              • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                                                                              APIs
                                                                                                                              • ShellExecuteW.SHELL32(00000000,0046559C,0046BA00,00000000,00000000,00000000), ref: 0041665C
                                                                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                              • Sleep.KERNEL32(00000064), ref: 00416688
                                                                                                                              • DeleteFileW.KERNEL32(00000000), ref: 004166BC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                                              • String ID: /t
                                                                                                                              • API String ID: 1462127192-3161277685
                                                                                                                              • Opcode ID: 669ed64058b930da4fb5de9ea67f3b866301e1755641a7ca28a9c279cceb2098
                                                                                                                              • Instruction ID: 72b86f905f1643b809cd09d25b02ba286255726e8958c1b91c3bd62dba73c542
                                                                                                                              • Opcode Fuzzy Hash: 669ed64058b930da4fb5de9ea67f3b866301e1755641a7ca28a9c279cceb2098
                                                                                                                              • Instruction Fuzzy Hash: FD313E719001085ADB14FBA1DC96EEE7764AF50708F00013FF906731E2EF786A8ACA9D
                                                                                                                              APIs
                                                                                                                              • CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Object
                                                                                                                              • String ID: XF$$$<XF
                                                                                                                              • API String ID: 2936123098-2187388861
                                                                                                                              • Opcode ID: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                                                              • Instruction ID: dba8c49f7cecafb8ed31af17d29d910bb03d3c12ecd117c8e18c4d6c9c114880
                                                                                                                              • Opcode Fuzzy Hash: f680b05b7da9254b8b2e62aef58334289a0f3b659c75efd963e3361adaa2c028
                                                                                                                              • Instruction Fuzzy Hash: 811170B2901118AEDB10FAA5884AA9EB7BCDB48714F55007FE905F3281E7789A148A7D
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,004661D4), ref: 004125A6
                                                                                                                              • RegQueryValueExW.ADVAPI32(004661D4,0040E0BA,00000000,00000000,?,00000400), ref: 004125C5
                                                                                                                              • RegCloseKey.ADVAPI32(004661D4), ref: 004125CE
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQueryValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 3677997916-423011080
                                                                                                                              • Opcode ID: a12076d47e23322b86ca246b396ed93735c2d8433d77adabce2b9b39a1936f1d
                                                                                                                              • Instruction ID: cde85351104a4392efd73b5d04a17f850d867e5981e04ac52ac3be3a1664c4fb
                                                                                                                              • Opcode Fuzzy Hash: a12076d47e23322b86ca246b396ed93735c2d8433d77adabce2b9b39a1936f1d
                                                                                                                              • Instruction Fuzzy Hash: 1FF0627560021CFBDF109B50EC45FDEBBBCFB04B05F204075B641E5191DA74AB849B98
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyW.ADVAPI32(?,?,?), ref: 00412869
                                                                                                                              • RegSetValueExW.ADVAPI32(?,?,00000000,0000000B,?,00000008,?,?,?,?), ref: 00412884
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 0041288F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 1818849710-423011080
                                                                                                                              • Opcode ID: 843d519987fd96e6137f1f6736ec903d025c3d7d34fc4ed08a94dd1d21a2ef7d
                                                                                                                              • Instruction ID: 3de0d32d1cf4be24be5a0203b04c19953d57f5c69e9cf495eb2356317dc42cf8
                                                                                                                              • Opcode Fuzzy Hash: 843d519987fd96e6137f1f6736ec903d025c3d7d34fc4ed08a94dd1d21a2ef7d
                                                                                                                              • Instruction Fuzzy Hash: CFE06D31600318BBDF219FA0AD05FDB3BACEB41B95F0045B1FA05E6190D371CE10AB94
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyW.ADVAPI32(?,?,?), ref: 00412826
                                                                                                                              • RegSetValueExW.ADVAPI32(?,?,00000000,00000004,?,00000004,?,?,?,?), ref: 00412841
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 0041284C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 1818849710-423011080
                                                                                                                              • Opcode ID: 53e4e48d4ccf212b63414c4b54768c1dde169658025b48142db7a671214f27b9
                                                                                                                              • Instruction ID: 752a59d8b90d750f2c7b96f790e18b6ff4f4e31e16de4d82110a7ac647001de3
                                                                                                                              • Opcode Fuzzy Hash: 53e4e48d4ccf212b63414c4b54768c1dde169658025b48142db7a671214f27b9
                                                                                                                              • Instruction Fuzzy Hash: F9E06D71600308BBDF219FA0AD05FDB3BACEB00B95F0001B5FB05E61A0D271CE10AB98
                                                                                                                              APIs
                                                                                                                              • RegCreateKeyW.ADVAPI32(?,?,?), ref: 0041273B
                                                                                                                              • RegSetValueExW.ADVAPI32(?,?,00000000,?,?,?,?,?,?,?), ref: 00412756
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 00412761
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseCreateValue
                                                                                                                              • String ID: hu
                                                                                                                              • API String ID: 1818849710-423011080
                                                                                                                              • Opcode ID: a3fa0759944c19700267d510058d9cf819aea07b2d50c84ba8b352350032ca1c
                                                                                                                              • Instruction ID: 98790f05a5f03cf9eeb790226768e3afa9aaa6b59c5d151fd9816ce0810e1cfd
                                                                                                                              • Opcode Fuzzy Hash: a3fa0759944c19700267d510058d9cf819aea07b2d50c84ba8b352350032ca1c
                                                                                                                              • Instruction Fuzzy Hash: 3BE0ED76500218BFCF125FA0ED08DEF7BBDEB05B95B0041A5FA15E6161D276CE20EBA4
                                                                                                                              APIs
                                                                                                                              • TerminateThread.KERNEL32(004099A9,00000000,004742F8,pth_unenc,0040BF26,004742E0,004742F8,?,pth_unenc), ref: 0040AFC9
                                                                                                                              • UnhookWindowsHookEx.USER32(004740F8), ref: 0040AFD5
                                                                                                                              • TerminateThread.KERNEL32(00409993,00000000,?,pth_unenc), ref: 0040AFE3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: TerminateThread$HookUnhookWindows
                                                                                                                              • String ID: pth_unenc
                                                                                                                              • API String ID: 3123878439-4028850238
                                                                                                                              • Opcode ID: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                                              • Instruction ID: c35477c7b81069fed5c639b3d306817a7c517f63bcb5e1090982200d4e51bed9
                                                                                                                              • Opcode Fuzzy Hash: 46dff24612c1799e978f47a7720dcdfa0824c6f48cf00f8dbc5bb460590095c7
                                                                                                                              • Instruction Fuzzy Hash: 32E01DB1209317DFD3101F546C84825B799EB44356324047FF6C155252C5798C54C759
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: __alldvrm$_strrchr
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1036877536-0
                                                                                                                              • Opcode ID: e9ddfd591fde217df266798dfb54151bebf12cee69e5f24c35a905db6cd6d6f7
                                                                                                                              • Instruction ID: 63a095292c52d92af2bf19a392fdfa9b0d117a80b68c781492b1ecdde0b53e6f
                                                                                                                              • Opcode Fuzzy Hash: e9ddfd591fde217df266798dfb54151bebf12cee69e5f24c35a905db6cd6d6f7
                                                                                                                              • Instruction Fuzzy Hash: 60A168729042469FFB21CF58C8817AEBBE2EF55314F24416FE5849B382DA3C8D45C759
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: ad0ffcebbd7e30faace55aec6b2c0d2f8d27b80f7879fc3eee3a0d10a54d69a7
                                                                                                                              • Instruction ID: 90b3d0a8f148eb65ba096d855dd205fb67a40d318d5acb0a54968c3478788488
                                                                                                                              • Opcode Fuzzy Hash: ad0ffcebbd7e30faace55aec6b2c0d2f8d27b80f7879fc3eee3a0d10a54d69a7
                                                                                                                              • Instruction Fuzzy Hash: 10412B71A00744AFF724AF78CC41B6ABBE8EF88714F10452FF511DB291E679A9458788
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,?,00000001,?,?,00000001,?,?), ref: 0044FF20
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,00000001,?,?,00000001,?,?,?), ref: 0044FFA9
                                                                                                                              • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,?,?,00000001,?,?,?,00000002,?), ref: 0044FFBB
                                                                                                                              • __freea.LIBCMT ref: 0044FFC4
                                                                                                                                • Part of subcall function 00446AFF: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00446B31
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2652629310-0
                                                                                                                              • Opcode ID: ad6417158e1c78f6f463d4a6d524ead8b3a476fcc30d311aeb4854f60d20ed6d
                                                                                                                              • Instruction ID: fd0d2a6e26420063bd1679c32ed8e9021f1b2be81e6a043fb7466d0fa567ef17
                                                                                                                              • Opcode Fuzzy Hash: ad6417158e1c78f6f463d4a6d524ead8b3a476fcc30d311aeb4854f60d20ed6d
                                                                                                                              • Instruction Fuzzy Hash: 9831FE32A0021AABEF248F65DC41EAF7BA5EB05314F05017BFC04D6290EB39DD58CBA4
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                                                                              • __freea.LIBCMT ref: 100087D5
                                                                                                                                • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2652629310-0
                                                                                                                              • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                              • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                                                                              • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                                                                              • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041265D: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,004742F8), ref: 00412679
                                                                                                                                • Part of subcall function 0041265D: RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 00412692
                                                                                                                                • Part of subcall function 0041265D: RegCloseKey.KERNEL32(00000000), ref: 0041269D
                                                                                                                              • Sleep.KERNEL32(00000BB8), ref: 004115C3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseOpenQuerySleepValue
                                                                                                                              • String ID: @CG$exepath$BG
                                                                                                                              • API String ID: 4119054056-3221201242
                                                                                                                              • Opcode ID: d2372903b6a5c566b5ef7dab359a7a76f7083d39763b5bf14b4beffcf5975f58
                                                                                                                              • Instruction ID: 48aadeccb903c06d46a934e3c92f1fe58b0119fffb77d403c20537554d94cb98
                                                                                                                              • Opcode Fuzzy Hash: d2372903b6a5c566b5ef7dab359a7a76f7083d39763b5bf14b4beffcf5975f58
                                                                                                                              • Instruction Fuzzy Hash: C721F4A0B002042BD614B77A6C06ABF724E8BD1308F00457FBD4AA72D3DE7D9D4581AD
                                                                                                                              APIs
                                                                                                                              • EnumDisplayMonitors.USER32(00000000,00000000,004186FC,00000000), ref: 00418622
                                                                                                                              • EnumDisplayDevicesW.USER32(?), ref: 00418652
                                                                                                                              • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004186C7
                                                                                                                              • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004186E4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DisplayEnum$Devices$Monitors
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1432082543-0
                                                                                                                              • Opcode ID: 566b1ffbc59c15345c10d2f0b09a2561ed6cab49562c48eef29e794647955bfe
                                                                                                                              • Instruction ID: c4057a13d51126afc728f52e86ef46095e095b9ab785e002ac05b4ca5e4d76c5
                                                                                                                              • Opcode Fuzzy Hash: 566b1ffbc59c15345c10d2f0b09a2561ed6cab49562c48eef29e794647955bfe
                                                                                                                              • Instruction Fuzzy Hash: 9221B1722043046BD220EF16DC44EABFBECEFD1754F00052FB949D3191EE74AA45C6AA
                                                                                                                              APIs
                                                                                                                              • SetEvent.KERNEL32(?,?), ref: 00404E71
                                                                                                                              • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00404F21
                                                                                                                              • TranslateMessage.USER32(?), ref: 00404F30
                                                                                                                              • DispatchMessageA.USER32(?), ref: 00404F3B
                                                                                                                              • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00473F80), ref: 00404FF3
                                                                                                                              • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 0040502B
                                                                                                                                • Part of subcall function 00404468: send.WS2_32(00000278,00000000,00000000,00000000), ref: 004044FD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2956720200-0
                                                                                                                              • Opcode ID: e886006c22fddb1b2834fd06cc537decbcb8fc684e88dfaad720019e110ccbed
                                                                                                                              • Instruction ID: defcedab57186357115b98b4a4cc344408793f3c2f2574c74d634edf258c7d09
                                                                                                                              • Opcode Fuzzy Hash: e886006c22fddb1b2834fd06cc537decbcb8fc684e88dfaad720019e110ccbed
                                                                                                                              • Instruction Fuzzy Hash: 862153715043016BC600FB75CD4ACAF77A8ABC5715F400A3EF911931E6DB38D604C756
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002), ref: 00419DFC
                                                                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000002), ref: 00419E10
                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00419E1D
                                                                                                                              • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00419E52
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Service$Open$ChangeCloseConfigHandleManager
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 110783151-0
                                                                                                                              • Opcode ID: b1a54bb8a8b8a5801daee02f654969ed363d70646ac738354a8241f6c324f73f
                                                                                                                              • Instruction ID: c28812c6d5a3476d8c1fe7dae916194da5da8b168be8dbaba893861dad7fc5da
                                                                                                                              • Opcode Fuzzy Hash: b1a54bb8a8b8a5801daee02f654969ed363d70646ac738354a8241f6c324f73f
                                                                                                                              • Instruction Fuzzy Hash: 3301F5311483147AD7119B39EC5EEBF3AACDB42B71F10022BF526D62D1DA68DE8181A9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                                                              • Instruction ID: c84c011be516b9a55b4d27d1f6be1bd7d35570b7e88518a67a440710abbdd315
                                                                                                                              • Opcode Fuzzy Hash: 18f7b12d8fbd203e6fe2bd4c4423912ade4cd6e2ab417617722edd39325a2eb9
                                                                                                                              • Instruction Fuzzy Hash: 780126F26097153EF62016796CC1F6B230CDF823B8B34073BF421652E1EAA8CC01506C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                                                              • Instruction ID: e6f180ecc181abb5a77ec057abe27f8575e00a75e8bcf6cd4df5c03139e47140
                                                                                                                              • Opcode Fuzzy Hash: 8aedf970bdaeb9d9c72bc659829c2e19759f544123fe9e87a80c2ba2346fca48
                                                                                                                              • Instruction Fuzzy Hash: E10121F2A092163EB62016797DD0DA7260DDF823B8374033BF421722D2EAA88C004068
                                                                                                                              APIs
                                                                                                                              • ___BuildCatchObject.LIBVCRUNTIME ref: 0043810F
                                                                                                                                • Part of subcall function 0043805C: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 0043808B
                                                                                                                                • Part of subcall function 0043805C: ___AdjustPointer.LIBCMT ref: 004380A6
                                                                                                                              • _UnwindNestedFrames.LIBCMT ref: 00438124
                                                                                                                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00438135
                                                                                                                              • CallCatchBlock.LIBVCRUNTIME ref: 0043815D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 737400349-0
                                                                                                                              • Opcode ID: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                                              • Instruction ID: 9a8277e88b86f5caaa8344fd0510e130f37262ecddc885b6c63592dc4fca678f
                                                                                                                              • Opcode Fuzzy Hash: c8370f5f766c88f9b882548d03e746073a9763e8d7037f7b78bb80a5d64990c6
                                                                                                                              • Instruction Fuzzy Hash: 09014032100208BBDF126E96CC45DEB7B69EF4C758F04500DFE4866121C739E861DBA8
                                                                                                                              APIs
                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0042EAD7,00000000,00000000,?,004471B7,0042EAD7,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue), ref: 00447242
                                                                                                                              • GetLastError.KERNEL32(?,004471B7,0042EAD7,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000,00000364,?,00446F91), ref: 0044724E
                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004471B7,0042EAD7,00000000,00000000,00000000,?,004474E3,00000006,FlsSetValue,0045D328,FlsSetValue,00000000), ref: 0044725C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3177248105-0
                                                                                                                              • Opcode ID: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                                              • Instruction ID: 998cab178f840ac2caaf283a3a5c141d85ba25b8fcaedc139a46ff50caeaa73b
                                                                                                                              • Opcode Fuzzy Hash: ae052748fea16bfd64aed14cfe47709c8c773e0353203442da9e9610ebb1fa47
                                                                                                                              • Instruction Fuzzy Hash: FC01D83261D7236BD7214B79AC44A577798BB05BA1B1106B2F906E3241D768D802C6D8
                                                                                                                              APIs
                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                                                                              • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3177248105-0
                                                                                                                              • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                              • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                                                                              • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                                                                              • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                                                                              APIs
                                                                                                                              • AllocConsole.KERNEL32(00474358), ref: 0041BEB9
                                                                                                                              • GetConsoleWindow.KERNEL32 ref: 0041BEBF
                                                                                                                              • ShowWindow.USER32(00000000,00000000), ref: 0041BED2
                                                                                                                              • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041BEF7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Console$Window$AllocOutputShow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4067487056-0
                                                                                                                              • Opcode ID: 7e766a7ea71f6337ac7c99c6c4a9d326f92e5ce4ebb09789323ae5cba05f4821
                                                                                                                              • Instruction ID: 482f1cdaf256b8236abc94a0b12de3dc55517b66349f776fa4240982defd8f75
                                                                                                                              • Opcode Fuzzy Hash: 7e766a7ea71f6337ac7c99c6c4a9d326f92e5ce4ebb09789323ae5cba05f4821
                                                                                                                              • Instruction Fuzzy Hash: 180171B19803047BD600FBF29D4BFDD37AC9B14705F5004277644E7093EABCA554866D
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020), ref: 00419C2F
                                                                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000020), ref: 00419C43
                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00419C50
                                                                                                                              • ControlService.ADVAPI32(00000000,00000001,?), ref: 00419C5F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Service$Open$CloseControlHandleManager
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1243734080-0
                                                                                                                              • Opcode ID: 7cfb46db0bd01be278475ff74c7fe9cf9f01c1ce40244ff157d84eb2ddeeab7a
                                                                                                                              • Instruction ID: e05d85410d15b39c35b215a1997cf582e970b4d0c8f2e3caff6268b58306b2a8
                                                                                                                              • Opcode Fuzzy Hash: 7cfb46db0bd01be278475ff74c7fe9cf9f01c1ce40244ff157d84eb2ddeeab7a
                                                                                                                              • Instruction Fuzzy Hash: F2F0F6325003147BD3116B25EC89EFF3BACDB45BA1F000036F902921D2DB68CD4685F5
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 00419D31
                                                                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 00419D45
                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00419D52
                                                                                                                              • ControlService.ADVAPI32(00000000,00000002,?), ref: 00419D61
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Service$Open$CloseControlHandleManager
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1243734080-0
                                                                                                                              • Opcode ID: bfc840ceb24970ac6f0157abf75dddf4ec976f1f73edc1b4d2479d4f1225fd6b
                                                                                                                              • Instruction ID: 9e91e616c68215657d038be5823d6e3897a30bcf6e0764f9fcdf2292ad9a2404
                                                                                                                              • Opcode Fuzzy Hash: bfc840ceb24970ac6f0157abf75dddf4ec976f1f73edc1b4d2479d4f1225fd6b
                                                                                                                              • Instruction Fuzzy Hash: C5F062725003146BD2116B65EC89EBF3BACDB45BA5B00003AFA06A21D2DB68DD4696F9
                                                                                                                              APIs
                                                                                                                              • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 00419D96
                                                                                                                              • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 00419DAA
                                                                                                                              • CloseServiceHandle.ADVAPI32(00000000), ref: 00419DB7
                                                                                                                              • ControlService.ADVAPI32(00000000,00000003,?), ref: 00419DC6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Service$Open$CloseControlHandleManager
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1243734080-0
                                                                                                                              • Opcode ID: b33f3c56d08176086889cf85995723947178cb2cbd7dc05acdbbeb3f21c9258b
                                                                                                                              • Instruction ID: abda6543b9bae7672c93be1b0f3a8a56711a85df89096aceaf06b6c73a90a6e4
                                                                                                                              • Opcode Fuzzy Hash: b33f3c56d08176086889cf85995723947178cb2cbd7dc05acdbbeb3f21c9258b
                                                                                                                              • Instruction Fuzzy Hash: C2F0C2325002146BD2116B24FC49EBF3AACDB45BA1B04003AFA06A21D2DB28CE4685F8
                                                                                                                              APIs
                                                                                                                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404AED
                                                                                                                              • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404AF9
                                                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B04
                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0040483F,00000001), ref: 00404B0D
                                                                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2993684571-0
                                                                                                                              • Opcode ID: 79c240d209ddd6b54a1f85454eea833ca67eebd38f471bffdde8de0f12332279
                                                                                                                              • Instruction ID: d6da77504ed7f85403cc54e6f32b3900d2337039667ff8d97479a9328fe4a552
                                                                                                                              • Opcode Fuzzy Hash: 79c240d209ddd6b54a1f85454eea833ca67eebd38f471bffdde8de0f12332279
                                                                                                                              • Instruction Fuzzy Hash: F8F0BBB19043007FDB1137759D0E66B7F58AB46325F00457FF892926F1DA38D890875B
                                                                                                                              APIs
                                                                                                                              • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041BF02), ref: 0041BE79
                                                                                                                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BE86
                                                                                                                              • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041BF02), ref: 0041BE93
                                                                                                                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041BF02), ref: 0041BEA6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3024135584-0
                                                                                                                              • Opcode ID: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                                                              • Instruction ID: 2ebb83c1e7e70c4501562f07591cf8b091918c9767bda4cb27a2f29097fd03e7
                                                                                                                              • Opcode Fuzzy Hash: ebe4511383e55350cb7437214035f9f9245c880b4d311b5a557d4aca1c5ac6fb
                                                                                                                              • Instruction Fuzzy Hash: C7E04F62104348ABD31437F5BC8ECAB3B7CE784613B100536F612903D3EA7484448A79
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: __aulldvrm
                                                                                                                              • String ID: +$-
                                                                                                                              • API String ID: 1302938615-2137968064
                                                                                                                              • Opcode ID: 2c2640ea7776289ad09f9ee335402da569c2e83f5e7decb4b46113a2b62917c4
                                                                                                                              • Instruction ID: 71202e7ba6f1ee6fb9a6349d29e5f15154cd5861fb596e3339df48b3b334a313
                                                                                                                              • Opcode Fuzzy Hash: 2c2640ea7776289ad09f9ee335402da569c2e83f5e7decb4b46113a2b62917c4
                                                                                                                              • Instruction Fuzzy Hash: F29119308841489BCF10CF69C4406EE7BB1AF59324F14A25BECE1A7381D27C99228B5B
                                                                                                                              APIs
                                                                                                                              • _free.LIBCMT ref: 1000655C
                                                                                                                                • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017,100062AB,00000000,?,?,?,?,00000016,?,?,100062B8,00000000,00000000,00000000,00000000,00000000), ref: 100062BE
                                                                                                                                • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                                                                                • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                                                              • String ID: *?$.
                                                                                                                              • API String ID: 2667617558-3972193922
                                                                                                                              • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                              • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                                                                              • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                                                                              • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                                                                              APIs
                                                                                                                              • GetCPInfo.KERNEL32(?,?,00000005,?,00000000), ref: 0044DB59
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Info
                                                                                                                              • String ID: $fD
                                                                                                                              • API String ID: 1807457897-3092946448
                                                                                                                              • Opcode ID: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                                                              • Instruction ID: 070357306f4c5095a08430c9ceac02bf5c2973ae7142a422f036c1757655e3b4
                                                                                                                              • Opcode Fuzzy Hash: 5a1be195421d57dadb90a7404d285975d7b8ac1b4122976fa75ce4288470c48d
                                                                                                                              • Instruction Fuzzy Hash: C241FA7090439C9AEB218F24CCC4BF6BBB9DF45308F1404EEE59A87242D279AE45DF65
                                                                                                                              APIs
                                                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00437AB3
                                                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00437B6C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CurrentImageNonwritable___except_validate_context_record
                                                                                                                              • String ID: csm
                                                                                                                              • API String ID: 3480331319-1018135373
                                                                                                                              • Opcode ID: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                                                                                                              • Instruction ID: 9404c61c081bc4e6da2099be8a52027e1297fde76841380def533d3eaa533744
                                                                                                                              • Opcode Fuzzy Hash: 47e26074ed3df67517ea761fc7c27dd00097028ab85dfbf9f1f14e41715e449f
                                                                                                                              • Instruction Fuzzy Hash: CD410970A04209DBCF20EF19C844A9FBBB5AF0932CF14915BE8556B392D739EE05CB95
                                                                                                                              APIs
                                                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00403A2A
                                                                                                                                • Part of subcall function 0041AB38: GetCurrentProcessId.KERNEL32(00000000,00457288,00000000,?,?,?,?,00465900,0040C07B,004661E4), ref: 0041AB5F
                                                                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32(00403AB9,?,?,00403AB9,00465324), ref: 004176CC
                                                                                                                                • Part of subcall function 004176B6: CloseHandle.KERNEL32($SF,?,?,00403AB9,00465324), ref: 004176D5
                                                                                                                                • Part of subcall function 0041B61A: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,00409F65), ref: 0041B633
                                                                                                                              • Sleep.KERNEL32(000000FA,00465324), ref: 00403AFC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                                              • String ID: 8>G
                                                                                                                              • API String ID: 368326130-2084872820
                                                                                                                              • Opcode ID: 98bb010f6fc0701c23f22af805dff0ff69e8ab048de325fed4ba88c0b986132d
                                                                                                                              • Instruction ID: 7eda923cdb9144c2d3fbd791e6ccfb72172be11f11f2a08a3aebfaec1b2861d2
                                                                                                                              • Opcode Fuzzy Hash: 98bb010f6fc0701c23f22af805dff0ff69e8ab048de325fed4ba88c0b986132d
                                                                                                                              • Instruction Fuzzy Hash: E5317331A0021456CB14FBB6DC969EE7775AF90318F40017FF906B71D2EF385A8ACA99
                                                                                                                              APIs
                                                                                                                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417C08
                                                                                                                              • SHCreateMemStream.SHLWAPI(00000000), ref: 00417C55
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateStream
                                                                                                                              • String ID: image/jpeg
                                                                                                                              • API String ID: 1369699375-3785015651
                                                                                                                              • Opcode ID: f68304ef7b417aefd933b86cb656289661524de42ad516d4c4f2b0040af23821
                                                                                                                              • Instruction ID: 3dbe320e324aa312c145f712c1d391ec03548c85c69305bb74e69b0931de3aa8
                                                                                                                              • Opcode Fuzzy Hash: f68304ef7b417aefd933b86cb656289661524de42ad516d4c4f2b0040af23821
                                                                                                                              • Instruction Fuzzy Hash: 13315C75508300AFC301AF65C884DAFBBF9FF8A704F000A2EF94597251DB79A905CBA6
                                                                                                                              APIs
                                                                                                                              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00450B39,?,00000050,?,?,?,?,?), ref: 004509B9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: ACP$OCP
                                                                                                                              • API String ID: 0-711371036
                                                                                                                              • Opcode ID: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                                              • Instruction ID: 7e3e8aaac6bfe0b7539266298c93f9b0706a3ab6a9e9f394231f134d2b8bf5b7
                                                                                                                              • Opcode Fuzzy Hash: c357b999de04d1742fe2857fcf8a245ff63c46433d95171d83c673f3fe2cd13c
                                                                                                                              • Instruction Fuzzy Hash: 072138EAA04201A6F7348B558801B9B7396AF54B23F164826EC49D730BF739DD49C358
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00412513: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00412537
                                                                                                                                • Part of subcall function 00412513: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 00412554
                                                                                                                                • Part of subcall function 00412513: RegCloseKey.KERNEL32(?), ref: 0041255F
                                                                                                                              • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040B76C
                                                                                                                              • PathFileExistsA.SHLWAPI(?), ref: 0040B779
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                                              • String ID: TUF
                                                                                                                              • API String ID: 1133728706-3431404234
                                                                                                                              • Opcode ID: 7b9ba4579e0b27edfd588b04f0c29b8f505ea6870776ed6eac1da1d548b9503e
                                                                                                                              • Instruction ID: d844a8c095f6bc09782a4352348c5dfd082864f820bca84d12e352ec49be167e
                                                                                                                              • Opcode Fuzzy Hash: 7b9ba4579e0b27edfd588b04f0c29b8f505ea6870776ed6eac1da1d548b9503e
                                                                                                                              • Instruction Fuzzy Hash: 5F216D71A00109A6CB04F7B2DCA69EE7764AE95318F40013FE902771D2EB7C9A49C6DE
                                                                                                                              APIs
                                                                                                                              • SHCreateMemStream.SHLWAPI(00000000,00000000,?,?,?,00000000), ref: 00417CF4
                                                                                                                              • SHCreateMemStream.SHLWAPI(00000000,00000000,00000000,?,?,?,?,00000000), ref: 00417D19
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateStream
                                                                                                                              • String ID: image/png
                                                                                                                              • API String ID: 1369699375-2966254431
                                                                                                                              • Opcode ID: b54d5b6c28edd578483b9d1d1dbdb371e6d235ce46d1bab246ae02b01ce92daa
                                                                                                                              • Instruction ID: e3b7944e5392015f30009faa46d0af48502643625c308f0969f1fef2cb3c76d4
                                                                                                                              • Opcode Fuzzy Hash: b54d5b6c28edd578483b9d1d1dbdb371e6d235ce46d1bab246ae02b01ce92daa
                                                                                                                              • Instruction Fuzzy Hash: AA21A135204211AFC300AF61CC88CAFBBBDEFCA714F10052EF90693151DB399945CBA6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: LG$XG
                                                                                                                              • API String ID: 0-1482930923
                                                                                                                              • Opcode ID: c15126115d7b74b818ce8cc4bfc83f894c4a74ec01747284a75d25f55942686d
                                                                                                                              • Instruction ID: b803d8f2fb0d60b71c32d24796bf113498d2ea24005d64aa96dbf80bf0db992b
                                                                                                                              • Opcode Fuzzy Hash: c15126115d7b74b818ce8cc4bfc83f894c4a74ec01747284a75d25f55942686d
                                                                                                                              • Instruction Fuzzy Hash: CE11A3B1D01654AACB20EFA998017CFB7A55F09725F14D06BED18EF281D3B9DB408B98
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _strlen
                                                                                                                              • String ID: : $Se.
                                                                                                                              • API String ID: 4218353326-4089948878
                                                                                                                              • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                              • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                                                                              • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                                                                              • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                                                                              APIs
                                                                                                                              • CoInitializeEx.COMBASE(00000000,00000002), ref: 00406835
                                                                                                                                • Part of subcall function 00406764: CoGetObject.OLE32(?,00000024,004659B0,00000000), ref: 004067E9
                                                                                                                              • CoUninitialize.COMBASE ref: 0040688E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InitializeObjectUninitialize
                                                                                                                              • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\.exe
                                                                                                                              • API String ID: 887581436-1837893624
                                                                                                                              • Opcode ID: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                                                              • Instruction ID: 622c6236034ee416db36617ed9a374104512909f75adacabffe0517dc70a223e
                                                                                                                              • Opcode Fuzzy Hash: cc256bbe825efe690782e207798e63cf697be23d062579cdcaa40baaa38e88a5
                                                                                                                              • Instruction Fuzzy Hash: A501C0722013106FE2287B11DC0EF3B2658DB4176AF22413FF946A71C1EAA9AC104669
                                                                                                                              APIs
                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412612
                                                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00412648
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: QueryValue
                                                                                                                              • String ID: TUF
                                                                                                                              • API String ID: 3660427363-3431404234
                                                                                                                              • Opcode ID: 60d0c4f8d553e275295d1cfac59131d463cdc6a2a25a37665b4b581d2f0ae0ad
                                                                                                                              • Instruction ID: 62a4949b47554db758ef5e9b715c6ec4cc130d120bf99ac1ec1555789b8052d8
                                                                                                                              • Opcode Fuzzy Hash: 60d0c4f8d553e275295d1cfac59131d463cdc6a2a25a37665b4b581d2f0ae0ad
                                                                                                                              • Instruction Fuzzy Hash: BC01A7B6A00108BFDB049B95DD46EFF7ABDDF44240F10007AF901E2251E6749F009664
                                                                                                                              APIs
                                                                                                                              • PathFileExistsW.SHLWAPI(00000000), ref: 00419EAE
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ExistsFilePath
                                                                                                                              • String ID: TUF$xIG
                                                                                                                              • API String ID: 1174141254-2109147017
                                                                                                                              • Opcode ID: 9e7609ae65e6c1456ba02c71c6b86090f2d3b6e0331a5844aa5217f4c56e482f
                                                                                                                              • Instruction ID: 7a4fe07350b1461b8d7cab7706a536354aa1130be6e3c83a2e6414618e768e61
                                                                                                                              • Opcode Fuzzy Hash: 9e7609ae65e6c1456ba02c71c6b86090f2d3b6e0331a5844aa5217f4c56e482f
                                                                                                                              • Instruction Fuzzy Hash: 8B01802060420166C604B676D866AEE77458BC1719F40413FF89A966E2EF6CAEC6C2DF
                                                                                                                              APIs
                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                                                                                • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3879657123.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                                                                              • Associated: 0000000D.00000002.3879624050.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              • Associated: 0000000D.00000002.3879657123.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_10000000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                              • String ID: Unknown exception
                                                                                                                              • API String ID: 3476068407-410509341
                                                                                                                              • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                              • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                                                                              • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                                                                              • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                                                                              APIs
                                                                                                                              • waveInPrepareHeader.WINMM(00473D90,00000020,00475BF4,00475BF4,00000000,00475B70,00473EE8,?,00000000,00401913), ref: 00401747
                                                                                                                              • waveInAddBuffer.WINMM(00473D90,00000020,?,00000000,00401913), ref: 0040175D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wave$BufferHeaderPrepare
                                                                                                                              • String ID: T=G
                                                                                                                              • API String ID: 2315374483-379896819
                                                                                                                              • Opcode ID: 29148f4e25072278b4f9e726bc36f05a03c5d88a9e91b676a195ae82600807ed
                                                                                                                              • Instruction ID: f8644d152c35c587af506687758c025c54344a6e575747702fe1289d7b8da532
                                                                                                                              • Opcode Fuzzy Hash: 29148f4e25072278b4f9e726bc36f05a03c5d88a9e91b676a195ae82600807ed
                                                                                                                              • Instruction Fuzzy Hash: 65018B71301300AFD7209F39EC45A69BBA9EB4931AF01413EB808D32B1EB34A8509B98
                                                                                                                              APIs
                                                                                                                              • IsValidLocale.KERNEL32(00000000,j=D,00000000,00000001,?,?,00443D6A,?,?,?,?,00000004), ref: 004477DC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LocaleValid
                                                                                                                              • String ID: IsValidLocaleName$j=D
                                                                                                                              • API String ID: 1901932003-3128777819
                                                                                                                              • Opcode ID: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                                              • Instruction ID: d075984350fdfa8650c9f53b231b8a0b142c4dacf6ed37e79753978632a381d4
                                                                                                                              • Opcode Fuzzy Hash: 34048a5779238571e042b1bd9c847fb843bb8be3ea41a6d98ed8d0d1ded4c140
                                                                                                                              • Instruction Fuzzy Hash: B7F0E930A45218F7EA116B61DC06F5EBB54CF49B11F50407AFD056A293CB796D0195DC
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041A686: GetLocalTime.KERNEL32(00000000), ref: 0041A6A0
                                                                                                                              • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 00419F64
                                                                                                                              • Sleep.KERNEL32(00002710), ref: 00419F79
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleLocalModuleSleepTime
                                                                                                                              • String ID: `Wu
                                                                                                                              • API String ID: 1683243174-3261129705
                                                                                                                              • Opcode ID: a394f45d9f4fff9fd487af052b8f73ab8b1aa201109aaddff49c85c37682d41d
                                                                                                                              • Instruction ID: 0fe531f7edf44dbbc4d7c544cb5d4c76277d8d7fe89cd9bd4aa838a143c441bc
                                                                                                                              • Opcode Fuzzy Hash: a394f45d9f4fff9fd487af052b8f73ab8b1aa201109aaddff49c85c37682d41d
                                                                                                                              • Instruction Fuzzy Hash: 50E09A22A0422033862033BA7C0FC6F3E28DAC6B75B4100BFF905A21A2AE54081086FB
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040BFB2,00000000,004742E0,004742F8,?,pth_unenc), ref: 00412988
                                                                                                                              • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00412998
                                                                                                                              Strings
                                                                                                                              • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00412986
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DeleteOpenValue
                                                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                                              • API String ID: 2654517830-1051519024
                                                                                                                              • Opcode ID: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                                              • Instruction ID: 4813e9247c8a4fa7715124fbb4df20ddc3d96ddce1d5e270e7c0f337b45b5704
                                                                                                                              • Opcode Fuzzy Hash: 37dabd9028f0cede140cc98497e4e15f557d68d096268be44a89a64eb946223e
                                                                                                                              • Instruction Fuzzy Hash: 0AE01270310304BFEF104F61ED06FDB37ACBB80B89F004165F505E5191E2B5DD54A658
                                                                                                                              APIs
                                                                                                                              • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040AF84
                                                                                                                              • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040AFAF
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DeleteDirectoryFileRemove
                                                                                                                              • String ID: pth_unenc
                                                                                                                              • API String ID: 3325800564-4028850238
                                                                                                                              • Opcode ID: b9b9920c625181ca6de104178518fd5ce2cfe10458045dbf61cc06549d32ecb0
                                                                                                                              • Instruction ID: b68931c7331ddc333ece9e06749e281aefc344294653c9eba2f2de372e339d66
                                                                                                                              • Opcode Fuzzy Hash: b9b9920c625181ca6de104178518fd5ce2cfe10458045dbf61cc06549d32ecb0
                                                                                                                              • Instruction Fuzzy Hash: FEE046715112108BC610AB31EC44AEBB398AB05316F00487FF8D3A36A1DE38A988CA98
                                                                                                                              APIs
                                                                                                                              • TerminateProcess.KERNEL32(00000000,pth_unenc,0040E670), ref: 004116A9
                                                                                                                              • WaitForSingleObject.KERNEL32(000000FF), ref: 004116BC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ObjectProcessSingleTerminateWait
                                                                                                                              • String ID: pth_unenc
                                                                                                                              • API String ID: 1872346434-4028850238
                                                                                                                              • Opcode ID: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                                              • Instruction ID: 4302d9c34f7b4dbdac7fc8682473a51625df35810590c52ad239c14707b44b4b
                                                                                                                              • Opcode Fuzzy Hash: 0bcc8583bbfeaf574487765c88b71504591df5916e82e2463f0204abfb9b1fb3
                                                                                                                              • Instruction Fuzzy Hash: C1D0C938559211AFD7614B68BC08B453B6AA745222F108277F828413F1C72598A4AE1C
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CountInfoInputLastTick
                                                                                                                              • String ID: >G
                                                                                                                              • API String ID: 3478931382-1296849874
                                                                                                                              • Opcode ID: 1111c95a6731b81c7f960cf0461dbe35cffbdc62c157a0c369b4dce9d438a623
                                                                                                                              • Instruction ID: 0f25e8e52f9a29d92835049ed671f456ff59a02a7b46a548dc943f175ac88346
                                                                                                                              • Opcode Fuzzy Hash: 1111c95a6731b81c7f960cf0461dbe35cffbdc62c157a0c369b4dce9d438a623
                                                                                                                              • Instruction Fuzzy Hash: FCD0127040020DBFCB00DFE4EC4D98DBFFCEB00349F104168A005A2111DB70E6448B24
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleA.KERNEL32(0046BA90,0046BA80), ref: 0040143A
                                                                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00401441
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Offset: 00401000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_401000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProc
                                                                                                                              • String ID: `Wu
                                                                                                                              • API String ID: 1646373207-3261129705
                                                                                                                              • Opcode ID: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                                                              • Instruction ID: fea3bfcfa5ad703f85b7dd8d5f3eac54d033561bc9bd2fc33d3800e380b32b62
                                                                                                                              • Opcode Fuzzy Hash: f39e1638c21b7beb4c7105e5daed03b820dcbd0345c10e5d325762a4e30a7452
                                                                                                                              • Instruction Fuzzy Hash: 51B092B868A3059BC7306BE0BD0EA093B24EA44703B1000B2F087C12A1EB7880809A6E
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?), ref: 0043FAF4
                                                                                                                              • GetLastError.KERNEL32 ref: 0043FB02
                                                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0043FB5D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 0000000D.00000002.3872038045.000000000042E000.00000040.00000400.00020000.00000000.sdmp, Offset: 0042E000, based on PE: false
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_13_2_42e000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1717984340-0
                                                                                                                              • Opcode ID: c6b7380bf39078e25bfb7328fff920eab3d83a155a66d29f6de05a2d99af9cce
                                                                                                                              • Instruction ID: ecac45699e256c48587d6f27f66036641a8fb520bb473c9b2adecd150689d728
                                                                                                                              • Opcode Fuzzy Hash: c6b7380bf39078e25bfb7328fff920eab3d83a155a66d29f6de05a2d99af9cce
                                                                                                                              • Instruction Fuzzy Hash: 65414871E00206AFCF258F65C854ABBFBA4EF09310F1451BAF858973A1DB38AD09C759

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:6.4%
                                                                                                                              Dynamic/Decrypted Code Coverage:9.2%
                                                                                                                              Signature Coverage:0%
                                                                                                                              Total number of Nodes:2000
                                                                                                                              Total number of Limit Nodes:80
                                                                                                                              execution_graph 40420 441819 40423 430737 40420->40423 40422 441825 40424 430756 40423->40424 40436 43076d 40423->40436 40425 430774 40424->40425 40426 43075f 40424->40426 40438 43034a memcpy 40425->40438 40437 4169a7 11 API calls 40426->40437 40429 4307ce 40430 430819 memset 40429->40430 40439 415b2c 11 API calls 40429->40439 40430->40436 40431 43077e 40431->40429 40434 4307fa 40431->40434 40431->40436 40433 4307e9 40433->40430 40433->40436 40440 4169a7 11 API calls 40434->40440 40436->40422 40437->40436 40438->40431 40439->40433 40440->40436 37670 442ec6 19 API calls 37844 4152c6 malloc 37845 4152e2 37844->37845 37846 4152ef 37844->37846 37848 416760 11 API calls 37846->37848 37848->37845 37849 4466f4 37868 446904 37849->37868 37851 446700 GetModuleHandleA 37854 446710 __set_app_type __p__fmode __p__commode 37851->37854 37853 4467a4 37855 4467ac __setusermatherr 37853->37855 37856 4467b8 37853->37856 37854->37853 37855->37856 37869 4468f0 _controlfp 37856->37869 37858 4467bd _initterm __wgetmainargs _initterm 37860 44681e GetStartupInfoW 37858->37860 37861 446810 37858->37861 37862 446866 GetModuleHandleA 37860->37862 37870 41276d 37862->37870 37866 446896 exit 37867 44689d _cexit 37866->37867 37867->37861 37868->37851 37869->37858 37871 41277d 37870->37871 37913 4044a4 LoadLibraryW 37871->37913 37873 412785 37904 412789 37873->37904 37921 414b81 37873->37921 37876 4127c8 37927 412465 memset ??2@YAPAXI 37876->37927 37878 4127ea 37939 40ac21 37878->37939 37883 412813 37957 40dd07 memset 37883->37957 37884 412827 37962 40db69 memset 37884->37962 37888 412822 37983 4125b6 ??3@YAXPAX 37888->37983 37889 40ada2 _wcsicmp 37890 41283d 37889->37890 37890->37888 37893 412863 CoInitialize 37890->37893 37967 41268e 37890->37967 37987 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37893->37987 37897 41296f 37989 40b633 37897->37989 37899 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37905 412957 CoUninitialize 37899->37905 37910 4128ca 37899->37910 37904->37866 37904->37867 37905->37888 37906 4128d0 TranslateAcceleratorW 37907 412941 GetMessageW 37906->37907 37906->37910 37907->37905 37907->37906 37908 412909 IsDialogMessageW 37908->37907 37908->37910 37909 4128fd IsDialogMessageW 37909->37907 37909->37908 37910->37906 37910->37908 37910->37909 37911 41292b TranslateMessage DispatchMessageW 37910->37911 37912 41291f IsDialogMessageW 37910->37912 37911->37907 37912->37907 37912->37911 37914 4044cf GetProcAddress 37913->37914 37917 4044f7 37913->37917 37915 4044e8 FreeLibrary 37914->37915 37918 4044df 37914->37918 37916 4044f3 37915->37916 37915->37917 37916->37917 37919 404507 MessageBoxW 37917->37919 37920 40451e 37917->37920 37918->37915 37919->37873 37920->37873 37922 414b8a 37921->37922 37923 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37921->37923 37993 40a804 memset 37922->37993 37923->37876 37926 414b9e GetProcAddress 37926->37923 37928 4124e0 37927->37928 37929 412505 ??2@YAPAXI 37928->37929 37930 41251c 37929->37930 37932 412521 37929->37932 38015 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37930->38015 38004 444722 37932->38004 37938 41259b wcscpy 37938->37878 38020 40b1ab free free 37939->38020 37943 40a9ce malloc memcpy free free 37950 40ac5c 37943->37950 37944 40ad4b 37952 40ad76 37944->37952 38044 40a9ce 37944->38044 37946 40ace7 free 37946->37950 37950->37943 37950->37944 37950->37946 37950->37952 38024 40a8d0 37950->38024 38036 4099f4 37950->38036 37951 40a8d0 7 API calls 37951->37952 38021 40aa04 37952->38021 37953 40ada2 37954 40adc9 37953->37954 37955 40adaa 37953->37955 37954->37883 37954->37884 37955->37954 37956 40adb3 _wcsicmp 37955->37956 37956->37954 37956->37955 38049 40dce0 37957->38049 37959 40dd3a GetModuleHandleW 38054 40dba7 37959->38054 37963 40dce0 3 API calls 37962->37963 37964 40db99 37963->37964 38126 40dae1 37964->38126 38140 402f3a 37967->38140 37969 412766 37969->37888 37969->37893 37970 4126d3 _wcsicmp 37971 4126a8 37970->37971 37971->37969 37971->37970 37973 41270a 37971->37973 38174 4125f8 7 API calls 37971->38174 37973->37969 38143 411ac5 37973->38143 37984 4125da 37983->37984 37985 4125f0 37984->37985 37986 4125e6 DeleteObject 37984->37986 37988 40b1ab free free 37985->37988 37986->37985 37987->37899 37988->37897 37990 40b640 37989->37990 37991 40b639 free 37989->37991 37992 40b1ab free free 37990->37992 37991->37990 37992->37904 37994 40a83b GetSystemDirectoryW 37993->37994 37995 40a84c wcscpy 37993->37995 37994->37995 38000 409719 wcslen 37995->38000 37998 40a881 LoadLibraryW 37999 40a886 37998->37999 37999->37923 37999->37926 38001 409724 38000->38001 38002 409739 wcscat LoadLibraryW 38000->38002 38001->38002 38003 40972c wcscat 38001->38003 38002->37998 38002->37999 38003->38002 38005 444732 38004->38005 38006 444728 DeleteObject 38004->38006 38016 409cc3 38005->38016 38006->38005 38008 412551 38009 4010f9 38008->38009 38010 401130 38009->38010 38011 401134 GetModuleHandleW LoadIconW 38010->38011 38012 401107 wcsncat 38010->38012 38013 40a7be 38011->38013 38012->38010 38014 40a7d2 38013->38014 38014->37938 38014->38014 38015->37932 38019 409bfd memset wcscpy 38016->38019 38018 409cdb CreateFontIndirectW 38018->38008 38019->38018 38020->37950 38022 40aa14 38021->38022 38023 40aa0a free 38021->38023 38022->37953 38023->38022 38025 40a8eb 38024->38025 38026 40a8df wcslen 38024->38026 38027 40a906 free 38025->38027 38028 40a90f 38025->38028 38026->38025 38029 40a919 38027->38029 38030 4099f4 3 API calls 38028->38030 38031 40a932 38029->38031 38032 40a929 free 38029->38032 38030->38029 38034 4099f4 3 API calls 38031->38034 38033 40a93e memcpy 38032->38033 38033->37950 38035 40a93d 38034->38035 38035->38033 38037 409a41 38036->38037 38038 4099fb malloc 38036->38038 38037->37950 38040 409a37 38038->38040 38041 409a1c 38038->38041 38040->37950 38042 409a30 free 38041->38042 38043 409a20 memcpy 38041->38043 38042->38040 38043->38042 38045 40a9e7 38044->38045 38046 40a9dc free 38044->38046 38048 4099f4 3 API calls 38045->38048 38047 40a9f2 38046->38047 38047->37951 38048->38047 38073 409bca GetModuleFileNameW 38049->38073 38051 40dce6 wcsrchr 38052 40dcf5 38051->38052 38053 40dcf9 wcscat 38051->38053 38052->38053 38053->37959 38074 44db70 38054->38074 38058 40dbfd 38077 4447d9 38058->38077 38061 40dc34 wcscpy wcscpy 38103 40d6f5 38061->38103 38062 40dc1f wcscpy 38062->38061 38065 40d6f5 3 API calls 38066 40dc73 38065->38066 38067 40d6f5 3 API calls 38066->38067 38068 40dc89 38067->38068 38069 40d6f5 3 API calls 38068->38069 38070 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38069->38070 38109 40da80 38070->38109 38073->38051 38075 40dbb4 memset memset 38074->38075 38076 409bca GetModuleFileNameW 38075->38076 38076->38058 38079 4447f4 38077->38079 38078 40dc1b 38078->38061 38078->38062 38079->38078 38080 444807 ??2@YAPAXI 38079->38080 38081 44481f 38080->38081 38082 444873 _snwprintf 38081->38082 38083 4448ab wcscpy 38081->38083 38116 44474a 8 API calls 38082->38116 38085 4448bb 38083->38085 38117 44474a 8 API calls 38085->38117 38086 4448a7 38086->38083 38086->38085 38088 4448cd 38118 44474a 8 API calls 38088->38118 38090 4448e2 38119 44474a 8 API calls 38090->38119 38092 4448f7 38120 44474a 8 API calls 38092->38120 38094 44490c 38121 44474a 8 API calls 38094->38121 38096 444921 38122 44474a 8 API calls 38096->38122 38098 444936 38123 44474a 8 API calls 38098->38123 38100 44494b 38124 44474a 8 API calls 38100->38124 38102 444960 ??3@YAXPAX 38102->38078 38104 44db70 38103->38104 38105 40d702 memset GetPrivateProfileStringW 38104->38105 38106 40d752 38105->38106 38107 40d75c WritePrivateProfileStringW 38105->38107 38106->38107 38108 40d758 38106->38108 38107->38108 38108->38065 38110 44db70 38109->38110 38111 40da8d memset 38110->38111 38112 40daac LoadStringW 38111->38112 38113 40dac6 38112->38113 38113->38112 38115 40dade 38113->38115 38125 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38113->38125 38115->37888 38116->38086 38117->38088 38118->38090 38119->38092 38120->38094 38121->38096 38122->38098 38123->38100 38124->38102 38125->38113 38136 409b98 GetFileAttributesW 38126->38136 38128 40daea 38129 40db63 38128->38129 38130 40daef wcscpy wcscpy GetPrivateProfileIntW 38128->38130 38129->37889 38137 40d65d GetPrivateProfileStringW 38130->38137 38132 40db3e 38138 40d65d GetPrivateProfileStringW 38132->38138 38134 40db4f 38139 40d65d GetPrivateProfileStringW 38134->38139 38136->38128 38137->38132 38138->38134 38139->38129 38175 40eaff 38140->38175 38144 411ae2 memset 38143->38144 38145 411b8f 38143->38145 38215 409bca GetModuleFileNameW 38144->38215 38157 411a8b 38145->38157 38147 411b0a wcsrchr 38148 411b22 wcscat 38147->38148 38149 411b1f 38147->38149 38216 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38148->38216 38149->38148 38151 411b67 38217 402afb 38151->38217 38155 411b7f 38273 40ea13 SendMessageW memset SendMessageW 38155->38273 38158 402afb 27 API calls 38157->38158 38159 411ac0 38158->38159 38160 4110dc 38159->38160 38161 41113e 38160->38161 38166 4110f0 38160->38166 38298 40969c LoadCursorW SetCursor 38161->38298 38163 411143 38299 4032b4 38163->38299 38317 444a54 38163->38317 38164 4110f7 _wcsicmp 38164->38166 38165 411157 38167 40ada2 _wcsicmp 38165->38167 38166->38161 38166->38164 38320 410c46 10 API calls 38166->38320 38170 411167 38167->38170 38168 4111af 38170->38168 38171 4111a6 qsort 38170->38171 38171->38168 38174->37971 38176 40eb10 38175->38176 38188 40e8e0 38176->38188 38179 40eb6c memcpy memcpy 38180 40ebb7 38179->38180 38180->38179 38181 40ebf2 ??2@YAPAXI ??2@YAPAXI 38180->38181 38184 40d134 16 API calls 38180->38184 38182 40ec2e ??2@YAPAXI 38181->38182 38185 40ec65 38181->38185 38182->38185 38184->38180 38185->38185 38198 40ea7f 38185->38198 38187 402f49 38187->37971 38189 40e8f2 38188->38189 38190 40e8eb ??3@YAXPAX 38188->38190 38191 40e900 38189->38191 38192 40e8f9 ??3@YAXPAX 38189->38192 38190->38189 38193 40e911 38191->38193 38194 40e90a ??3@YAXPAX 38191->38194 38192->38191 38195 40e931 ??2@YAPAXI ??2@YAPAXI 38193->38195 38196 40e921 ??3@YAXPAX 38193->38196 38197 40e92a ??3@YAXPAX 38193->38197 38194->38193 38195->38179 38196->38197 38197->38195 38199 40aa04 free 38198->38199 38200 40ea88 38199->38200 38201 40aa04 free 38200->38201 38202 40ea90 38201->38202 38203 40aa04 free 38202->38203 38204 40ea98 38203->38204 38205 40aa04 free 38204->38205 38206 40eaa0 38205->38206 38207 40a9ce 4 API calls 38206->38207 38208 40eab3 38207->38208 38209 40a9ce 4 API calls 38208->38209 38210 40eabd 38209->38210 38211 40a9ce 4 API calls 38210->38211 38212 40eac7 38211->38212 38213 40a9ce 4 API calls 38212->38213 38214 40ead1 38213->38214 38214->38187 38215->38147 38216->38151 38274 40b2cc 38217->38274 38219 402b0a 38220 40b2cc 27 API calls 38219->38220 38221 402b23 38220->38221 38222 40b2cc 27 API calls 38221->38222 38223 402b3a 38222->38223 38224 40b2cc 27 API calls 38223->38224 38225 402b54 38224->38225 38226 40b2cc 27 API calls 38225->38226 38227 402b6b 38226->38227 38228 40b2cc 27 API calls 38227->38228 38229 402b82 38228->38229 38230 40b2cc 27 API calls 38229->38230 38231 402b99 38230->38231 38232 40b2cc 27 API calls 38231->38232 38233 402bb0 38232->38233 38234 40b2cc 27 API calls 38233->38234 38235 402bc7 38234->38235 38236 40b2cc 27 API calls 38235->38236 38237 402bde 38236->38237 38238 40b2cc 27 API calls 38237->38238 38239 402bf5 38238->38239 38240 40b2cc 27 API calls 38239->38240 38241 402c0c 38240->38241 38242 40b2cc 27 API calls 38241->38242 38243 402c23 38242->38243 38244 40b2cc 27 API calls 38243->38244 38245 402c3a 38244->38245 38246 40b2cc 27 API calls 38245->38246 38247 402c51 38246->38247 38248 40b2cc 27 API calls 38247->38248 38249 402c68 38248->38249 38250 40b2cc 27 API calls 38249->38250 38251 402c7f 38250->38251 38252 40b2cc 27 API calls 38251->38252 38253 402c99 38252->38253 38254 40b2cc 27 API calls 38253->38254 38255 402cb3 38254->38255 38256 40b2cc 27 API calls 38255->38256 38257 402cd5 38256->38257 38258 40b2cc 27 API calls 38257->38258 38259 402cf0 38258->38259 38260 40b2cc 27 API calls 38259->38260 38261 402d0b 38260->38261 38262 40b2cc 27 API calls 38261->38262 38263 402d26 38262->38263 38264 40b2cc 27 API calls 38263->38264 38265 402d3e 38264->38265 38266 40b2cc 27 API calls 38265->38266 38267 402d59 38266->38267 38268 40b2cc 27 API calls 38267->38268 38269 402d78 38268->38269 38270 40b2cc 27 API calls 38269->38270 38271 402d93 38270->38271 38272 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38271->38272 38272->38155 38273->38145 38277 40b58d 38274->38277 38276 40b2d1 38276->38219 38278 40b5a4 GetModuleHandleW FindResourceW 38277->38278 38279 40b62e 38277->38279 38280 40b5c2 LoadResource 38278->38280 38282 40b5e7 38278->38282 38279->38276 38281 40b5d0 SizeofResource LockResource 38280->38281 38280->38282 38281->38282 38282->38279 38290 40afcf 38282->38290 38284 40b608 memcpy 38293 40b4d3 memcpy 38284->38293 38286 40b61e 38294 40b3c1 18 API calls 38286->38294 38288 40b626 38295 40b04b 38288->38295 38291 40b04b ??3@YAXPAX 38290->38291 38292 40afd7 ??2@YAPAXI 38291->38292 38292->38284 38293->38286 38294->38288 38296 40b051 ??3@YAXPAX 38295->38296 38297 40b05f 38295->38297 38296->38297 38297->38279 38298->38163 38300 4032c4 38299->38300 38301 40b633 free 38300->38301 38302 403316 38301->38302 38321 44553b 38302->38321 38306 403480 38519 40368c 15 API calls 38306->38519 38308 403489 38309 40b633 free 38308->38309 38310 403495 38309->38310 38310->38165 38311 4033a9 memset memcpy 38312 4033ec wcscmp 38311->38312 38313 40333c 38311->38313 38312->38313 38313->38306 38313->38311 38313->38312 38517 4028e7 11 API calls 38313->38517 38518 40f508 6 API calls 38313->38518 38315 403421 _wcsicmp 38315->38313 38318 444a64 FreeLibrary 38317->38318 38319 444a83 38317->38319 38318->38319 38319->38165 38320->38166 38322 445548 38321->38322 38323 445599 38322->38323 38520 40c768 38322->38520 38324 4455a8 memset 38323->38324 38331 4457f2 38323->38331 38603 403988 38324->38603 38335 445854 38331->38335 38705 403e2d memset memset memset memset memset 38331->38705 38332 445672 38614 403fbe memset memset memset memset memset 38332->38614 38333 4458bb memset memset 38340 414c2e 16 API calls 38333->38340 38386 4458aa 38335->38386 38728 403c9c memset memset memset memset memset 38335->38728 38336 44557a 38383 44558c 38336->38383 38800 4136c0 CoTaskMemFree 38336->38800 38338 44595e memset memset 38345 414c2e 16 API calls 38338->38345 38339 4455e5 38339->38332 38348 44560f 38339->38348 38341 4458f9 38340->38341 38346 40b2cc 27 API calls 38341->38346 38343 445a00 memset memset 38751 414c2e 38343->38751 38344 445b22 38350 445bca 38344->38350 38351 445b38 memset memset memset 38344->38351 38355 44599c 38345->38355 38356 445909 38346->38356 38360 4087b3 338 API calls 38348->38360 38349 445849 38816 40b1ab free free 38349->38816 38357 445c8b memset memset 38350->38357 38425 445cf0 38350->38425 38361 445bd4 38351->38361 38362 445b98 38351->38362 38365 40b2cc 27 API calls 38355->38365 38366 409d1f 6 API calls 38356->38366 38369 414c2e 16 API calls 38357->38369 38358 445585 38801 41366b FreeLibrary 38358->38801 38359 44589f 38817 40b1ab free free 38359->38817 38367 445621 38360->38367 38375 414c2e 16 API calls 38361->38375 38362->38361 38371 445ba2 38362->38371 38368 4459ac 38365->38368 38379 445919 38366->38379 38802 4454bf 20 API calls 38367->38802 38381 409d1f 6 API calls 38368->38381 38382 445cc9 38369->38382 38889 4099c6 wcslen 38371->38889 38372 4456b2 38804 40b1ab free free 38372->38804 38374 40b2cc 27 API calls 38387 445a4f 38374->38387 38389 445be2 38375->38389 38376 403335 38516 4452e5 45 API calls 38376->38516 38377 445d3d 38409 40b2cc 27 API calls 38377->38409 38378 445d88 memset memset memset 38392 414c2e 16 API calls 38378->38392 38818 409b98 GetFileAttributesW 38379->38818 38380 445823 38380->38349 38391 4087b3 338 API calls 38380->38391 38393 4459bc 38381->38393 38394 409d1f 6 API calls 38382->38394 38587 444b06 38383->38587 38384 445879 38384->38359 38405 4087b3 338 API calls 38384->38405 38386->38333 38410 44594a 38386->38410 38766 409d1f wcslen wcslen 38387->38766 38398 40b2cc 27 API calls 38389->38398 38391->38380 38402 445dde 38392->38402 38885 409b98 GetFileAttributesW 38393->38885 38404 445ce1 38394->38404 38395 445bb3 38892 445403 memset 38395->38892 38396 445680 38396->38372 38637 4087b3 memset 38396->38637 38399 445bf3 38398->38399 38408 409d1f 6 API calls 38399->38408 38400 445928 38400->38410 38819 40b6ef 38400->38819 38411 40b2cc 27 API calls 38402->38411 38909 409b98 GetFileAttributesW 38404->38909 38405->38384 38419 445c07 38408->38419 38420 445d54 _wcsicmp 38409->38420 38410->38338 38424 4459ed 38410->38424 38423 445def 38411->38423 38412 4459cb 38412->38424 38433 40b6ef 252 API calls 38412->38433 38416 40b2cc 27 API calls 38417 445a94 38416->38417 38771 40ae18 38417->38771 38418 44566d 38418->38331 38688 413d4c 38418->38688 38429 445389 258 API calls 38419->38429 38430 445d71 38420->38430 38495 445d67 38420->38495 38422 445665 38803 40b1ab free free 38422->38803 38431 409d1f 6 API calls 38423->38431 38424->38343 38424->38344 38425->38376 38425->38377 38425->38378 38426 445389 258 API calls 38426->38350 38435 445c17 38429->38435 38910 445093 23 API calls 38430->38910 38438 445e03 38431->38438 38433->38424 38434 4456d8 38440 40b2cc 27 API calls 38434->38440 38441 40b2cc 27 API calls 38435->38441 38437 44563c 38437->38422 38443 4087b3 338 API calls 38437->38443 38911 409b98 GetFileAttributesW 38438->38911 38439 40b6ef 252 API calls 38439->38376 38445 4456e2 38440->38445 38446 445c23 38441->38446 38442 445d83 38442->38376 38443->38437 38805 413fa6 _wcsicmp _wcsicmp 38445->38805 38450 409d1f 6 API calls 38446->38450 38448 445e12 38455 445e6b 38448->38455 38461 40b2cc 27 API calls 38448->38461 38453 445c37 38450->38453 38451 445aa1 38454 445b17 38451->38454 38469 445ab2 memset 38451->38469 38482 409d1f 6 API calls 38451->38482 38778 40add4 38451->38778 38783 445389 38451->38783 38792 40ae51 38451->38792 38452 4456eb 38457 4456fd memset memset memset memset 38452->38457 38458 4457ea 38452->38458 38459 445389 258 API calls 38453->38459 38886 40aebe 38454->38886 38913 445093 23 API calls 38455->38913 38806 409c70 wcscpy wcsrchr 38457->38806 38809 413d29 38458->38809 38464 445c47 38459->38464 38465 445e33 38461->38465 38471 40b2cc 27 API calls 38464->38471 38472 409d1f 6 API calls 38465->38472 38467 445e7e 38468 445f67 38467->38468 38477 40b2cc 27 API calls 38468->38477 38473 40b2cc 27 API calls 38469->38473 38475 445c53 38471->38475 38476 445e47 38472->38476 38473->38451 38474 409c70 2 API calls 38478 44577e 38474->38478 38479 409d1f 6 API calls 38475->38479 38912 409b98 GetFileAttributesW 38476->38912 38481 445f73 38477->38481 38483 409c70 2 API calls 38478->38483 38484 445c67 38479->38484 38486 409d1f 6 API calls 38481->38486 38482->38451 38487 44578d 38483->38487 38488 445389 258 API calls 38484->38488 38485 445e56 38485->38455 38491 445e83 memset 38485->38491 38489 445f87 38486->38489 38487->38458 38494 40b2cc 27 API calls 38487->38494 38488->38350 38916 409b98 GetFileAttributesW 38489->38916 38493 40b2cc 27 API calls 38491->38493 38496 445eab 38493->38496 38497 4457a8 38494->38497 38495->38376 38495->38439 38498 409d1f 6 API calls 38496->38498 38499 409d1f 6 API calls 38497->38499 38500 445ebf 38498->38500 38501 4457b8 38499->38501 38502 40ae18 9 API calls 38500->38502 38808 409b98 GetFileAttributesW 38501->38808 38512 445ef5 38502->38512 38504 4457c7 38504->38458 38506 4087b3 338 API calls 38504->38506 38505 40ae51 9 API calls 38505->38512 38506->38458 38507 445f5c 38509 40aebe FindClose 38507->38509 38508 40add4 2 API calls 38508->38512 38509->38468 38510 40b2cc 27 API calls 38510->38512 38511 409d1f 6 API calls 38511->38512 38512->38505 38512->38507 38512->38508 38512->38510 38512->38511 38514 445f3a 38512->38514 38914 409b98 GetFileAttributesW 38512->38914 38915 445093 23 API calls 38514->38915 38516->38313 38517->38315 38518->38313 38519->38308 38521 40c775 38520->38521 38917 40b1ab free free 38521->38917 38523 40c788 38918 40b1ab free free 38523->38918 38525 40c790 38919 40b1ab free free 38525->38919 38527 40c798 38528 40aa04 free 38527->38528 38529 40c7a0 38528->38529 38920 40c274 memset 38529->38920 38534 40a8ab 9 API calls 38535 40c7c3 38534->38535 38536 40a8ab 9 API calls 38535->38536 38537 40c7d0 38536->38537 38949 40c3c3 38537->38949 38541 40c877 38550 40bdb0 38541->38550 38542 40c86c 38991 4053fe 39 API calls 38542->38991 38544 40c7e5 38544->38541 38544->38542 38549 40c634 49 API calls 38544->38549 38974 40a706 38544->38974 38549->38544 39181 404363 38550->39181 38553 40bf5d 39201 40440c 38553->39201 38555 40bdee 38555->38553 38558 40b2cc 27 API calls 38555->38558 38556 40bddf CredEnumerateW 38556->38555 38559 40be02 wcslen 38558->38559 38559->38553 38562 40be1e 38559->38562 38560 40be26 wcsncmp 38560->38562 38562->38553 38562->38560 38564 40be7d memset 38562->38564 38565 40bea7 memcpy 38562->38565 38566 40bf11 wcschr 38562->38566 38567 40b2cc 27 API calls 38562->38567 38569 40bf43 LocalFree 38562->38569 39204 40bd5d 28 API calls 38562->39204 39205 404423 38562->39205 38564->38562 38564->38565 38565->38562 38565->38566 38566->38562 38568 40bef6 _wcsnicmp 38567->38568 38568->38562 38568->38566 38569->38562 38570 4135f7 39218 4135e0 38570->39218 38573 40b2cc 27 API calls 38574 41360d 38573->38574 38575 40a804 8 API calls 38574->38575 38576 413613 38575->38576 38577 41361b 38576->38577 38578 41363e 38576->38578 38579 40b273 27 API calls 38577->38579 38580 4135e0 FreeLibrary 38578->38580 38581 413625 GetProcAddress 38579->38581 38582 413643 38580->38582 38581->38578 38583 413648 38581->38583 38582->38336 38584 413658 38583->38584 38585 4135e0 FreeLibrary 38583->38585 38584->38336 38586 413666 38585->38586 38586->38336 39221 4449b9 38587->39221 38590 444c1f 38590->38323 38591 4449b9 42 API calls 38593 444b4b 38591->38593 38592 444c15 38594 4449b9 42 API calls 38592->38594 38593->38592 39242 444972 GetVersionExW 38593->39242 38594->38590 38596 444b99 memcmp 38601 444b8c 38596->38601 38597 444c0b 39246 444a85 42 API calls 38597->39246 38601->38596 38601->38597 39243 444aa5 42 API calls 38601->39243 39244 40a7a0 GetVersionExW 38601->39244 39245 444a85 42 API calls 38601->39245 38604 40399d 38603->38604 39247 403a16 38604->39247 38606 403a09 39261 40b1ab free free 38606->39261 38608 4039a3 38608->38606 38612 4039f4 38608->38612 39258 40a02c CreateFileW 38608->39258 38609 403a12 wcsrchr 38609->38339 38612->38606 38613 4099c6 2 API calls 38612->38613 38613->38606 38615 414c2e 16 API calls 38614->38615 38616 404048 38615->38616 38617 414c2e 16 API calls 38616->38617 38618 404056 38617->38618 38619 409d1f 6 API calls 38618->38619 38620 404073 38619->38620 38621 409d1f 6 API calls 38620->38621 38622 40408e 38621->38622 38623 409d1f 6 API calls 38622->38623 38624 4040a6 38623->38624 38625 403af5 20 API calls 38624->38625 38626 4040ba 38625->38626 38627 403af5 20 API calls 38626->38627 38628 4040cb 38627->38628 39288 40414f memset 38628->39288 38630 404140 39302 40b1ab free free 38630->39302 38632 4040ec memset 38635 4040e0 38632->38635 38633 404148 38633->38396 38634 4099c6 2 API calls 38634->38635 38635->38630 38635->38632 38635->38634 38636 40a8ab 9 API calls 38635->38636 38636->38635 39315 40a6e6 WideCharToMultiByte 38637->39315 38639 4087ed 39316 4095d9 memset 38639->39316 38642 408953 38642->38396 38643 408809 memset memset memset memset memset 38644 40b2cc 27 API calls 38643->38644 38645 4088a1 38644->38645 38646 409d1f 6 API calls 38645->38646 38647 4088b1 38646->38647 38648 40b2cc 27 API calls 38647->38648 38649 4088c0 38648->38649 38650 409d1f 6 API calls 38649->38650 38651 4088d0 38650->38651 38652 40b2cc 27 API calls 38651->38652 38653 4088df 38652->38653 38654 409d1f 6 API calls 38653->38654 38655 4088ef 38654->38655 38656 40b2cc 27 API calls 38655->38656 38657 4088fe 38656->38657 38658 409d1f 6 API calls 38657->38658 38659 40890e 38658->38659 38660 40b2cc 27 API calls 38659->38660 38661 40891d 38660->38661 38662 409d1f 6 API calls 38661->38662 38663 40892d 38662->38663 39335 409b98 GetFileAttributesW 38663->39335 38689 40b633 free 38688->38689 38690 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38689->38690 38691 413f00 Process32NextW 38690->38691 38692 413da5 OpenProcess 38691->38692 38693 413f17 CloseHandle 38691->38693 38694 413df3 memset 38692->38694 38697 413eb0 38692->38697 38693->38434 39637 413f27 38694->39637 38696 413ebf free 38696->38697 38697->38691 38697->38696 38698 4099f4 3 API calls 38697->38698 38698->38697 38700 413e37 GetModuleHandleW 38701 413e1f 38700->38701 38702 413e46 GetProcAddress 38700->38702 38701->38700 39642 413959 38701->39642 39658 413ca4 38701->39658 38702->38701 38704 413ea2 CloseHandle 38704->38697 38706 414c2e 16 API calls 38705->38706 38707 403eb7 38706->38707 38708 414c2e 16 API calls 38707->38708 38709 403ec5 38708->38709 38710 409d1f 6 API calls 38709->38710 38711 403ee2 38710->38711 38712 409d1f 6 API calls 38711->38712 38713 403efd 38712->38713 38714 409d1f 6 API calls 38713->38714 38715 403f15 38714->38715 38716 403af5 20 API calls 38715->38716 38717 403f29 38716->38717 38718 403af5 20 API calls 38717->38718 38719 403f3a 38718->38719 38720 40414f 33 API calls 38719->38720 38721 403f4f 38720->38721 38722 403faf 38721->38722 38724 403f5b memset 38721->38724 38726 4099c6 2 API calls 38721->38726 38727 40a8ab 9 API calls 38721->38727 39672 40b1ab free free 38722->39672 38724->38721 38725 403fb7 38725->38380 38726->38721 38727->38721 38729 414c2e 16 API calls 38728->38729 38730 403d26 38729->38730 38731 414c2e 16 API calls 38730->38731 38732 403d34 38731->38732 38733 409d1f 6 API calls 38732->38733 38734 403d51 38733->38734 38735 409d1f 6 API calls 38734->38735 38736 403d6c 38735->38736 38737 409d1f 6 API calls 38736->38737 38738 403d84 38737->38738 38739 403af5 20 API calls 38738->38739 38740 403d98 38739->38740 38741 403af5 20 API calls 38740->38741 38742 403da9 38741->38742 38743 40414f 33 API calls 38742->38743 38744 403dbe 38743->38744 38745 403e1e 38744->38745 38746 403dca memset 38744->38746 38749 4099c6 2 API calls 38744->38749 38750 40a8ab 9 API calls 38744->38750 39673 40b1ab free free 38745->39673 38746->38744 38748 403e26 38748->38384 38749->38744 38750->38744 38752 414b81 9 API calls 38751->38752 38753 414c40 38752->38753 38754 414c73 memset 38753->38754 39674 409cea 38753->39674 38755 414c94 38754->38755 39677 414592 RegOpenKeyExW 38755->39677 38759 414c64 38759->38374 38760 414cc1 38761 414cf4 wcscpy 38760->38761 39678 414bb0 wcscpy 38760->39678 38761->38759 38763 414cd2 39679 4145ac RegQueryValueExW 38763->39679 38765 414ce9 RegCloseKey 38765->38761 38767 409d62 38766->38767 38768 409d43 wcscpy 38766->38768 38767->38416 38769 409719 2 API calls 38768->38769 38770 409d51 wcscat 38769->38770 38770->38767 38772 40aebe FindClose 38771->38772 38773 40ae21 38772->38773 38774 4099c6 2 API calls 38773->38774 38775 40ae35 38774->38775 38776 409d1f 6 API calls 38775->38776 38777 40ae49 38776->38777 38777->38451 38779 40ade0 38778->38779 38780 40ae0f 38778->38780 38779->38780 38781 40ade7 wcscmp 38779->38781 38780->38451 38781->38780 38782 40adfe wcscmp 38781->38782 38782->38780 38784 40ae18 9 API calls 38783->38784 38790 4453c4 38784->38790 38785 40ae51 9 API calls 38785->38790 38786 4453f3 38788 40aebe FindClose 38786->38788 38787 40add4 2 API calls 38787->38790 38789 4453fe 38788->38789 38789->38451 38790->38785 38790->38786 38790->38787 38791 445403 253 API calls 38790->38791 38791->38790 38793 40ae7b FindNextFileW 38792->38793 38794 40ae5c FindFirstFileW 38792->38794 38795 40ae94 38793->38795 38796 40ae8f 38793->38796 38794->38795 38798 40aeb6 38795->38798 38799 409d1f 6 API calls 38795->38799 38797 40aebe FindClose 38796->38797 38797->38795 38798->38451 38799->38798 38800->38358 38801->38383 38802->38437 38803->38418 38804->38418 38805->38452 38807 409c89 38806->38807 38807->38474 38808->38504 38810 413d39 38809->38810 38811 413d2f FreeLibrary 38809->38811 38812 40b633 free 38810->38812 38811->38810 38813 413d42 38812->38813 38814 40b633 free 38813->38814 38815 413d4a 38814->38815 38815->38331 38816->38335 38817->38386 38818->38400 38820 44db70 38819->38820 38821 40b6fc memset 38820->38821 38822 409c70 2 API calls 38821->38822 38823 40b732 wcsrchr 38822->38823 38824 40b743 38823->38824 38825 40b746 memset 38823->38825 38824->38825 38826 40b2cc 27 API calls 38825->38826 38827 40b76f 38826->38827 38828 409d1f 6 API calls 38827->38828 38829 40b783 38828->38829 39680 409b98 GetFileAttributesW 38829->39680 38831 40b792 38832 40b7c2 38831->38832 38833 409c70 2 API calls 38831->38833 39681 40bb98 38832->39681 38835 40b7a5 38833->38835 38837 40b2cc 27 API calls 38835->38837 38840 40b7b2 38837->38840 38838 40b837 CloseHandle 38842 40b83e memset 38838->38842 38839 40b817 39715 409a45 GetTempPathW 38839->39715 38844 409d1f 6 API calls 38840->38844 39714 40a6e6 WideCharToMultiByte 38842->39714 38844->38832 38845 40b827 CopyFileW 38845->38842 38846 40b866 38847 444432 121 API calls 38846->38847 38848 40b879 38847->38848 38849 40bad5 38848->38849 38850 40b273 27 API calls 38848->38850 38851 40baeb 38849->38851 38852 40bade DeleteFileW 38849->38852 38853 40b89a 38850->38853 38854 40b04b ??3@YAXPAX 38851->38854 38852->38851 38855 438552 134 API calls 38853->38855 38856 40baf3 38854->38856 38857 40b8a4 38855->38857 38856->38410 38858 40bacd 38857->38858 38860 4251c4 137 API calls 38857->38860 38859 443d90 111 API calls 38858->38859 38859->38849 38883 40b8b8 38860->38883 38861 40bac6 39727 424f26 123 API calls 38861->39727 38862 40b8bd memset 39718 425413 17 API calls 38862->39718 38865 425413 17 API calls 38865->38883 38868 40a71b MultiByteToWideChar 38868->38883 38869 40a734 MultiByteToWideChar 38869->38883 38872 40b9b5 memcmp 38872->38883 38873 4099c6 2 API calls 38873->38883 38874 404423 37 API calls 38874->38883 38876 40bb3e memset memcpy 39728 40a734 MultiByteToWideChar 38876->39728 38877 4251c4 137 API calls 38877->38883 38880 40bb88 LocalFree 38880->38883 38883->38861 38883->38862 38883->38865 38883->38868 38883->38869 38883->38872 38883->38873 38883->38874 38883->38876 38883->38877 38884 40ba5f memcmp 38883->38884 39719 4253ef 16 API calls 38883->39719 39720 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38883->39720 39721 4253af 17 API calls 38883->39721 39722 4253cf 17 API calls 38883->39722 39723 447280 memset 38883->39723 39724 447960 memset memcpy memcpy memcpy 38883->39724 39725 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38883->39725 39726 447920 memcpy memcpy memcpy 38883->39726 38884->38883 38885->38412 38887 40aed1 38886->38887 38888 40aec7 FindClose 38886->38888 38887->38344 38888->38887 38890 4099d7 38889->38890 38891 4099da memcpy 38889->38891 38890->38891 38891->38395 38893 40b2cc 27 API calls 38892->38893 38894 44543f 38893->38894 38895 409d1f 6 API calls 38894->38895 38896 44544f 38895->38896 39824 409b98 GetFileAttributesW 38896->39824 38898 44545e 38899 445476 38898->38899 38900 40b6ef 252 API calls 38898->38900 38901 40b2cc 27 API calls 38899->38901 38900->38899 38902 445482 38901->38902 38903 409d1f 6 API calls 38902->38903 38904 445492 38903->38904 39825 409b98 GetFileAttributesW 38904->39825 38906 4454a1 38907 4454b9 38906->38907 38908 40b6ef 252 API calls 38906->38908 38907->38426 38908->38907 38909->38425 38910->38442 38911->38448 38912->38485 38913->38467 38914->38512 38915->38512 38916->38495 38917->38523 38918->38525 38919->38527 38921 414c2e 16 API calls 38920->38921 38922 40c2ae 38921->38922 38992 40c1d3 38922->38992 38927 40c3be 38944 40a8ab 38927->38944 38928 40afcf 2 API calls 38929 40c2fd FindFirstUrlCacheEntryW 38928->38929 38930 40c3b6 38929->38930 38931 40c31e wcschr 38929->38931 38932 40b04b ??3@YAXPAX 38930->38932 38933 40c331 38931->38933 38934 40c35e FindNextUrlCacheEntryW 38931->38934 38932->38927 38935 40a8ab 9 API calls 38933->38935 38934->38931 38936 40c373 GetLastError 38934->38936 38939 40c33e wcschr 38935->38939 38937 40c3ad FindCloseUrlCache 38936->38937 38938 40c37e 38936->38938 38937->38930 38940 40afcf 2 API calls 38938->38940 38939->38934 38941 40c34f 38939->38941 38942 40c391 FindNextUrlCacheEntryW 38940->38942 38943 40a8ab 9 API calls 38941->38943 38942->38931 38942->38937 38943->38934 39108 40a97a 38944->39108 38947 40a8cc 38947->38534 38948 40a8d0 7 API calls 38948->38947 39113 40b1ab free free 38949->39113 38951 40c3dd 38952 40b2cc 27 API calls 38951->38952 38953 40c3e7 38952->38953 39114 414592 RegOpenKeyExW 38953->39114 38955 40c3f4 38956 40c50e 38955->38956 38957 40c3ff 38955->38957 38971 405337 38956->38971 38958 40a9ce 4 API calls 38957->38958 38959 40c418 memset 38958->38959 39115 40aa1d 38959->39115 38962 40c471 38964 40c47a _wcsupr 38962->38964 38963 40c505 RegCloseKey 38963->38956 38965 40a8d0 7 API calls 38964->38965 38966 40c498 38965->38966 38967 40a8d0 7 API calls 38966->38967 38968 40c4ac memset 38967->38968 38969 40aa1d 38968->38969 38970 40c4e4 RegEnumValueW 38969->38970 38970->38963 38970->38964 39117 405220 38971->39117 38975 4099c6 2 API calls 38974->38975 38976 40a714 _wcslwr 38975->38976 38977 40c634 38976->38977 39174 405361 38977->39174 38980 40c65c wcslen 39177 4053b6 39 API calls 38980->39177 38981 40c71d wcslen 38981->38544 38983 40c713 39180 4053df 39 API calls 38983->39180 38984 40c677 38984->38983 39178 40538b 39 API calls 38984->39178 38987 40c6a5 38987->38983 38988 40c6a9 memset 38987->38988 38989 40c6d3 38988->38989 39179 40c589 43 API calls 38989->39179 38991->38541 38993 40ae18 9 API calls 38992->38993 38999 40c210 38993->38999 38994 40ae51 9 API calls 38994->38999 38995 40c264 38996 40aebe FindClose 38995->38996 38998 40c26f 38996->38998 38997 40add4 2 API calls 38997->38999 39004 40e5ed memset memset 38998->39004 38999->38994 38999->38995 38999->38997 39000 40c231 _wcsicmp 38999->39000 39001 40c1d3 35 API calls 38999->39001 39000->38999 39002 40c248 39000->39002 39001->38999 39017 40c084 22 API calls 39002->39017 39005 414c2e 16 API calls 39004->39005 39006 40e63f 39005->39006 39007 409d1f 6 API calls 39006->39007 39008 40e658 39007->39008 39018 409b98 GetFileAttributesW 39008->39018 39010 40e667 39011 40e680 39010->39011 39013 409d1f 6 API calls 39010->39013 39019 409b98 GetFileAttributesW 39011->39019 39013->39011 39014 40e68f 39015 40c2d8 39014->39015 39020 40e4b2 39014->39020 39015->38927 39015->38928 39017->38999 39018->39010 39019->39014 39041 40e01e 39020->39041 39022 40e593 39024 40e5b0 39022->39024 39025 40e59c DeleteFileW 39022->39025 39023 40e521 39023->39022 39064 40e175 39023->39064 39026 40b04b ??3@YAXPAX 39024->39026 39025->39024 39027 40e5bb 39026->39027 39029 40e5c4 CloseHandle 39027->39029 39030 40e5cc 39027->39030 39029->39030 39032 40b633 free 39030->39032 39031 40e573 39033 40e584 39031->39033 39034 40e57c CloseHandle 39031->39034 39035 40e5db 39032->39035 39107 40b1ab free free 39033->39107 39034->39033 39038 40b633 free 39035->39038 39037 40e540 39037->39031 39084 40e2ab 39037->39084 39039 40e5e3 39038->39039 39039->39015 39042 406214 22 API calls 39041->39042 39043 40e03c 39042->39043 39044 40e16b 39043->39044 39045 40dd85 74 API calls 39043->39045 39044->39023 39046 40e06b 39045->39046 39046->39044 39047 40afcf ??2@YAPAXI ??3@YAXPAX 39046->39047 39048 40e08d OpenProcess 39047->39048 39049 40e0a4 GetCurrentProcess DuplicateHandle 39048->39049 39053 40e152 39048->39053 39050 40e0d0 GetFileSize 39049->39050 39051 40e14a CloseHandle 39049->39051 39054 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39050->39054 39051->39053 39052 40e160 39056 40b04b ??3@YAXPAX 39052->39056 39053->39052 39055 406214 22 API calls 39053->39055 39057 40e0ea 39054->39057 39055->39052 39056->39044 39058 4096dc CreateFileW 39057->39058 39059 40e0f1 CreateFileMappingW 39058->39059 39060 40e140 CloseHandle CloseHandle 39059->39060 39061 40e10b MapViewOfFile 39059->39061 39060->39051 39062 40e13b CloseHandle 39061->39062 39063 40e11f WriteFile UnmapViewOfFile 39061->39063 39062->39060 39063->39062 39065 40e18c 39064->39065 39066 406b90 11 API calls 39065->39066 39067 40e19f 39066->39067 39068 40e1a7 memset 39067->39068 39069 40e299 39067->39069 39074 40e1e8 39068->39074 39070 4069a3 ??3@YAXPAX free 39069->39070 39071 40e2a4 39070->39071 39071->39037 39072 406e8f 13 API calls 39072->39074 39073 406b53 SetFilePointerEx ReadFile 39073->39074 39074->39072 39074->39073 39075 40e283 39074->39075 39076 40dd50 _wcsicmp 39074->39076 39080 40742e 8 API calls 39074->39080 39081 40aae3 wcslen wcslen _memicmp 39074->39081 39082 40e244 _snwprintf 39074->39082 39077 40e291 39075->39077 39078 40e288 free 39075->39078 39076->39074 39079 40aa04 free 39077->39079 39078->39077 39079->39069 39080->39074 39081->39074 39083 40a8d0 7 API calls 39082->39083 39083->39074 39085 40e2c2 39084->39085 39086 406b90 11 API calls 39085->39086 39097 40e2d3 39086->39097 39087 40e4a0 39088 4069a3 ??3@YAXPAX free 39087->39088 39090 40e4ab 39088->39090 39089 406e8f 13 API calls 39089->39097 39090->39037 39091 406b53 SetFilePointerEx ReadFile 39091->39097 39092 40e489 39093 40aa04 free 39092->39093 39094 40e491 39093->39094 39094->39087 39095 40e497 free 39094->39095 39095->39087 39096 40dd50 _wcsicmp 39096->39097 39097->39087 39097->39089 39097->39091 39097->39092 39097->39096 39098 40dd50 _wcsicmp 39097->39098 39101 40742e 8 API calls 39097->39101 39102 40e3e0 memcpy 39097->39102 39103 40e3b3 wcschr 39097->39103 39104 40e3fb memcpy 39097->39104 39105 40e416 memcpy 39097->39105 39106 40e431 memcpy 39097->39106 39099 40e376 memset 39098->39099 39100 40aa29 6 API calls 39099->39100 39100->39097 39101->39097 39102->39097 39103->39097 39104->39097 39105->39097 39106->39097 39107->39022 39110 40a980 39108->39110 39109 40a8bb 39109->38947 39109->38948 39110->39109 39111 40a995 _wcsicmp 39110->39111 39112 40a99c wcscmp 39110->39112 39111->39110 39112->39110 39113->38951 39114->38955 39116 40aa23 RegEnumValueW 39115->39116 39116->38962 39116->38963 39118 405335 39117->39118 39119 40522a 39117->39119 39118->38544 39120 40b2cc 27 API calls 39119->39120 39121 405234 39120->39121 39122 40a804 8 API calls 39121->39122 39123 40523a 39122->39123 39162 40b273 39123->39162 39125 405248 _mbscpy _mbscat GetProcAddress 39126 40b273 27 API calls 39125->39126 39127 405279 39126->39127 39165 405211 GetProcAddress 39127->39165 39129 405282 39130 40b273 27 API calls 39129->39130 39131 40528f 39130->39131 39166 405211 GetProcAddress 39131->39166 39133 405298 39134 40b273 27 API calls 39133->39134 39135 4052a5 39134->39135 39167 405211 GetProcAddress 39135->39167 39137 4052ae 39138 40b273 27 API calls 39137->39138 39139 4052bb 39138->39139 39168 405211 GetProcAddress 39139->39168 39141 4052c4 39142 40b273 27 API calls 39141->39142 39143 4052d1 39142->39143 39169 405211 GetProcAddress 39143->39169 39145 4052da 39146 40b273 27 API calls 39145->39146 39147 4052e7 39146->39147 39170 405211 GetProcAddress 39147->39170 39149 4052f0 39150 40b273 27 API calls 39149->39150 39151 4052fd 39150->39151 39171 405211 GetProcAddress 39151->39171 39153 405306 39154 40b273 27 API calls 39153->39154 39155 405313 39154->39155 39172 405211 GetProcAddress 39155->39172 39157 40531c 39158 40b273 27 API calls 39157->39158 39159 405329 39158->39159 39163 40b58d 27 API calls 39162->39163 39164 40b18c 39163->39164 39164->39125 39165->39129 39166->39133 39167->39137 39168->39141 39169->39145 39170->39149 39171->39153 39172->39157 39175 405220 39 API calls 39174->39175 39176 405369 39175->39176 39176->38980 39176->38981 39177->38984 39178->38987 39179->38983 39180->38981 39182 40440c FreeLibrary 39181->39182 39183 40436d 39182->39183 39184 40a804 8 API calls 39183->39184 39185 404377 39184->39185 39186 404383 39185->39186 39187 404405 39185->39187 39188 40b273 27 API calls 39186->39188 39187->38553 39187->38555 39187->38556 39189 40438d GetProcAddress 39188->39189 39190 40b273 27 API calls 39189->39190 39191 4043a7 GetProcAddress 39190->39191 39192 40b273 27 API calls 39191->39192 39193 4043ba GetProcAddress 39192->39193 39194 40b273 27 API calls 39193->39194 39195 4043ce GetProcAddress 39194->39195 39196 40b273 27 API calls 39195->39196 39197 4043e2 GetProcAddress 39196->39197 39198 4043f1 39197->39198 39199 4043f7 39198->39199 39200 40440c FreeLibrary 39198->39200 39199->39187 39200->39187 39202 404413 FreeLibrary 39201->39202 39203 40441e 39201->39203 39202->39203 39203->38570 39204->38562 39206 40442e 39205->39206 39207 40447e 39205->39207 39208 40b2cc 27 API calls 39206->39208 39207->38562 39209 404438 39208->39209 39210 40a804 8 API calls 39209->39210 39211 40443e 39210->39211 39212 404445 39211->39212 39213 404467 39211->39213 39214 40b273 27 API calls 39212->39214 39213->39207 39215 404475 FreeLibrary 39213->39215 39216 40444f GetProcAddress 39214->39216 39215->39207 39216->39213 39217 404460 39216->39217 39217->39213 39219 4135f6 39218->39219 39220 4135eb FreeLibrary 39218->39220 39219->38573 39220->39219 39222 4449c4 39221->39222 39223 444a52 39221->39223 39224 40b2cc 27 API calls 39222->39224 39223->38590 39223->38591 39225 4449cb 39224->39225 39226 40a804 8 API calls 39225->39226 39227 4449d1 39226->39227 39228 40b273 27 API calls 39227->39228 39229 4449dc GetProcAddress 39228->39229 39230 40b273 27 API calls 39229->39230 39231 4449f3 GetProcAddress 39230->39231 39232 40b273 27 API calls 39231->39232 39233 444a04 GetProcAddress 39232->39233 39234 40b273 27 API calls 39233->39234 39235 444a15 GetProcAddress 39234->39235 39236 40b273 27 API calls 39235->39236 39237 444a26 GetProcAddress 39236->39237 39238 40b273 27 API calls 39237->39238 39239 444a37 GetProcAddress 39238->39239 39242->38601 39243->38601 39244->38601 39245->38601 39246->38592 39248 403a29 39247->39248 39262 403bed memset memset 39248->39262 39250 403ae7 39275 40b1ab free free 39250->39275 39251 403a3f memset 39257 403a2f 39251->39257 39253 403aef 39253->38608 39254 409b98 GetFileAttributesW 39254->39257 39255 40a8d0 7 API calls 39255->39257 39256 409d1f 6 API calls 39256->39257 39257->39250 39257->39251 39257->39254 39257->39255 39257->39256 39259 40a051 GetFileTime CloseHandle 39258->39259 39260 4039ca CompareFileTime 39258->39260 39259->39260 39260->38608 39261->38609 39263 414c2e 16 API calls 39262->39263 39264 403c38 39263->39264 39265 409719 2 API calls 39264->39265 39266 403c3f wcscat 39265->39266 39267 414c2e 16 API calls 39266->39267 39268 403c61 39267->39268 39269 409719 2 API calls 39268->39269 39270 403c68 wcscat 39269->39270 39276 403af5 39270->39276 39273 403af5 20 API calls 39274 403c95 39273->39274 39274->39257 39275->39253 39277 403b02 39276->39277 39278 40ae18 9 API calls 39277->39278 39286 403b37 39278->39286 39279 403bdb 39281 40aebe FindClose 39279->39281 39280 40add4 wcscmp wcscmp 39280->39286 39282 403be6 39281->39282 39282->39273 39283 40ae18 9 API calls 39283->39286 39284 40ae51 9 API calls 39284->39286 39285 40aebe FindClose 39285->39286 39286->39279 39286->39280 39286->39283 39286->39284 39286->39285 39287 40a8d0 7 API calls 39286->39287 39287->39286 39289 409d1f 6 API calls 39288->39289 39290 404190 39289->39290 39303 409b98 GetFileAttributesW 39290->39303 39292 40419c 39293 4041a7 6 API calls 39292->39293 39294 40435c 39292->39294 39296 40424f 39293->39296 39294->38635 39296->39294 39297 40425e memset 39296->39297 39299 409d1f 6 API calls 39296->39299 39300 40a8ab 9 API calls 39296->39300 39304 414842 39296->39304 39297->39296 39298 404296 wcscpy 39297->39298 39298->39296 39299->39296 39301 4042b6 memset memset _snwprintf wcscpy 39300->39301 39301->39296 39302->38633 39303->39292 39307 41443e 39304->39307 39306 414866 39306->39296 39308 41444b 39307->39308 39309 414451 39308->39309 39310 4144a3 GetPrivateProfileStringW 39308->39310 39311 414491 39309->39311 39312 414455 wcschr 39309->39312 39310->39306 39313 414495 WritePrivateProfileStringW 39311->39313 39312->39311 39314 414463 _snwprintf 39312->39314 39313->39306 39314->39313 39315->38639 39317 40b2cc 27 API calls 39316->39317 39318 409615 39317->39318 39319 409d1f 6 API calls 39318->39319 39320 409625 39319->39320 39345 409b98 GetFileAttributesW 39320->39345 39322 409634 39323 409648 39322->39323 39346 4091b8 memset 39322->39346 39325 40b2cc 27 API calls 39323->39325 39327 408801 39323->39327 39326 40965d 39325->39326 39328 409d1f 6 API calls 39326->39328 39327->38642 39327->38643 39329 40966d 39328->39329 39398 409b98 GetFileAttributesW 39329->39398 39331 40967c 39331->39327 39332 409681 39331->39332 39399 409529 72 API calls 39332->39399 39334 409690 39334->39327 39345->39322 39400 40a6e6 WideCharToMultiByte 39346->39400 39348 409202 39401 444432 39348->39401 39351 40b273 27 API calls 39352 409236 39351->39352 39447 438552 39352->39447 39355 409383 39357 40b273 27 API calls 39355->39357 39359 409399 39357->39359 39361 438552 134 API calls 39359->39361 39379 4093a3 39361->39379 39365 4094ff 39368 4251c4 137 API calls 39368->39379 39372 4093df 39376 4253cf 17 API calls 39376->39379 39378 40951d 39378->39323 39379->39365 39379->39368 39379->39372 39379->39376 39381 4093e4 39379->39381 39398->39331 39399->39334 39400->39348 39497 4438b5 39401->39497 39403 44444c 39409 409215 39403->39409 39511 415a6d 39403->39511 39405 4442e6 11 API calls 39407 44469e 39405->39407 39406 444486 39408 4444b9 memcpy 39406->39408 39446 4444a4 39406->39446 39407->39409 39411 443d90 111 API calls 39407->39411 39515 415258 39408->39515 39409->39351 39409->39378 39411->39409 39412 444524 39413 444541 39412->39413 39414 44452a 39412->39414 39518 444316 39413->39518 39415 416935 16 API calls 39414->39415 39415->39446 39418 444316 18 API calls 39446->39405 39585 438460 39447->39585 39449 409240 39449->39355 39450 4251c4 39449->39450 39597 424f07 39450->39597 39452 4251e4 39498 4438d0 39497->39498 39509 4438c9 39497->39509 39499 415378 memcpy memcpy 39498->39499 39500 4438d5 39499->39500 39501 4154e2 10 API calls 39500->39501 39502 443906 39500->39502 39500->39509 39501->39502 39503 443970 memset 39502->39503 39502->39509 39505 44398b 39503->39505 39504 4439a0 39506 415700 10 API calls 39504->39506 39504->39509 39505->39504 39508 41975c 10 API calls 39505->39508 39507 4439c0 39506->39507 39507->39509 39510 418981 10 API calls 39507->39510 39508->39504 39509->39403 39510->39509 39512 415a77 39511->39512 39513 415a8d 39512->39513 39514 415a7e memset 39512->39514 39513->39406 39514->39513 39516 4438b5 11 API calls 39515->39516 39517 41525d 39516->39517 39517->39412 39519 444328 39518->39519 39520 444423 39519->39520 39521 44434e 39519->39521 39522 4446ea 11 API calls 39520->39522 39523 432d4e memset memset memcpy 39521->39523 39529 444381 39522->39529 39524 44435a 39523->39524 39526 444375 39524->39526 39531 44438b 39524->39531 39528 416935 16 API calls 39526->39528 39528->39529 39529->39418 39586 41703f 11 API calls 39585->39586 39587 43847a 39586->39587 39588 43848a 39587->39588 39589 43847e 39587->39589 39591 438270 134 API calls 39588->39591 39590 4446ea 11 API calls 39589->39590 39593 438488 39590->39593 39592 4384aa 39591->39592 39592->39593 39594 424f26 123 API calls 39592->39594 39593->39449 39595 4384bb 39594->39595 39596 438270 134 API calls 39595->39596 39596->39593 39598 424f1f 39597->39598 39599 424f0c 39597->39599 39601 424eea 11 API calls 39598->39601 39600 416760 11 API calls 39599->39600 39602 424f18 39600->39602 39603 424f24 39601->39603 39602->39452 39603->39452 39664 413f4f 39637->39664 39640 413f37 K32GetModuleFileNameExW 39641 413f4a 39640->39641 39641->38701 39643 413969 wcscpy 39642->39643 39644 41396c wcschr 39642->39644 39656 413a3a 39643->39656 39644->39643 39646 41398e 39644->39646 39669 4097f7 wcslen wcslen _memicmp 39646->39669 39648 41399a 39649 4139a4 memset 39648->39649 39650 4139e6 39648->39650 39670 409dd5 GetWindowsDirectoryW wcscpy 39649->39670 39652 413a31 wcscpy 39650->39652 39653 4139ec memset 39650->39653 39652->39656 39671 409dd5 GetWindowsDirectoryW wcscpy 39653->39671 39654 4139c9 wcscpy wcscat 39654->39656 39656->38701 39657 413a11 memcpy wcscat 39657->39656 39659 413cb0 GetModuleHandleW 39658->39659 39660 413cda 39658->39660 39659->39660 39661 413cbf GetProcAddress 39659->39661 39662 413ce3 GetProcessTimes 39660->39662 39663 413cf6 39660->39663 39661->39660 39662->38704 39663->38704 39665 413f2f 39664->39665 39666 413f54 39664->39666 39665->39640 39665->39641 39667 40a804 8 API calls 39666->39667 39668 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39667->39668 39668->39665 39669->39648 39670->39654 39671->39657 39672->38725 39673->38748 39675 409cf9 GetVersionExW 39674->39675 39676 409d0a 39674->39676 39675->39676 39676->38754 39676->38759 39677->38760 39678->38763 39679->38765 39680->38831 39682 40bba5 39681->39682 39729 40cc26 39682->39729 39685 40bd4b 39757 40cc0c 39685->39757 39690 40b2cc 27 API calls 39691 40bbef 39690->39691 39750 40ccf0 39691->39750 39693 40bbf5 39693->39685 39754 40ccb4 39693->39754 39696 40cf04 17 API calls 39697 40bc2e 39696->39697 39698 40bd43 39697->39698 39699 40b2cc 27 API calls 39697->39699 39700 40cc0c 4 API calls 39698->39700 39701 40bc40 39699->39701 39700->39685 39702 40ccf0 _wcsicmp 39701->39702 39703 40bc46 39702->39703 39703->39698 39704 40bc61 memset memset WideCharToMultiByte 39703->39704 39764 40103c strlen 39704->39764 39706 40bcc0 39707 40b273 27 API calls 39706->39707 39708 40bcd0 memcmp 39707->39708 39708->39698 39709 40bce2 39708->39709 39710 404423 37 API calls 39709->39710 39711 40bd10 39710->39711 39711->39698 39712 40bd3a LocalFree 39711->39712 39713 40bd1f memcpy 39711->39713 39712->39698 39713->39712 39714->38846 39716 409a74 GetTempFileNameW 39715->39716 39717 409a66 GetWindowsDirectoryW 39715->39717 39716->38845 39717->39716 39718->38883 39719->38883 39720->38883 39721->38883 39722->38883 39723->38883 39724->38883 39725->38883 39726->38883 39727->38858 39728->38880 39765 4096c3 CreateFileW 39729->39765 39731 40cc34 39732 40cc3d GetFileSize 39731->39732 39740 40bbca 39731->39740 39733 40afcf 2 API calls 39732->39733 39734 40cc64 39733->39734 39766 40a2ef ReadFile 39734->39766 39736 40cc71 39767 40ab4a MultiByteToWideChar 39736->39767 39738 40cc95 CloseHandle 39739 40b04b ??3@YAXPAX 39738->39739 39739->39740 39740->39685 39741 40cf04 39740->39741 39742 40b633 free 39741->39742 39743 40cf14 39742->39743 39773 40b1ab free free 39743->39773 39745 40bbdd 39745->39685 39745->39690 39746 40cf1b 39746->39745 39748 40cfef 39746->39748 39774 40cd4b 39746->39774 39749 40cd4b 14 API calls 39748->39749 39749->39745 39751 40ccfd 39750->39751 39753 40cd3f 39750->39753 39752 40cd26 _wcsicmp 39751->39752 39751->39753 39752->39751 39752->39753 39753->39693 39755 40aa29 6 API calls 39754->39755 39756 40bc26 39755->39756 39756->39696 39758 40b633 free 39757->39758 39759 40cc15 39758->39759 39760 40aa04 free 39759->39760 39761 40cc1d 39760->39761 39823 40b1ab free free 39761->39823 39763 40b7d4 memset CreateFileW 39763->38838 39763->38839 39764->39706 39765->39731 39766->39736 39768 40ab93 39767->39768 39769 40ab6b 39767->39769 39768->39738 39770 40a9ce 4 API calls 39769->39770 39771 40ab74 39770->39771 39772 40ab7c MultiByteToWideChar 39771->39772 39772->39768 39773->39746 39775 40cd7b 39774->39775 39808 40aa29 39775->39808 39777 40cef5 39778 40aa04 free 39777->39778 39779 40cefd 39778->39779 39779->39746 39781 40aa29 6 API calls 39782 40ce1d 39781->39782 39783 40aa29 6 API calls 39782->39783 39784 40ce3e 39783->39784 39785 40ce6a 39784->39785 39816 40abb7 wcslen memmove 39784->39816 39786 40ce9f 39785->39786 39819 40abb7 wcslen memmove 39785->39819 39788 40a8d0 7 API calls 39786->39788 39791 40ceb5 39788->39791 39789 40ce56 39817 40aa71 wcslen 39789->39817 39797 40a8d0 7 API calls 39791->39797 39793 40ce8b 39820 40aa71 wcslen 39793->39820 39794 40ce5e 39818 40abb7 wcslen memmove 39794->39818 39800 40cecb 39797->39800 39798 40ce93 39821 40abb7 wcslen memmove 39798->39821 39822 40d00b malloc memcpy free free 39800->39822 39802 40cedd 39803 40aa04 free 39802->39803 39804 40cee5 39803->39804 39805 40aa04 free 39804->39805 39806 40ceed 39805->39806 39807 40aa04 free 39806->39807 39807->39777 39809 40aa33 39808->39809 39810 40aa63 39808->39810 39811 40aa44 39809->39811 39812 40aa38 wcslen 39809->39812 39810->39777 39810->39781 39813 40a9ce malloc memcpy free free 39811->39813 39812->39811 39814 40aa4d 39813->39814 39814->39810 39815 40aa51 memcpy 39814->39815 39815->39810 39816->39789 39817->39794 39818->39785 39819->39793 39820->39798 39821->39786 39822->39802 39823->39763 39824->38898 39825->38906 39902 44def7 39903 44df07 39902->39903 39904 44df00 ??3@YAXPAX 39902->39904 39905 44df17 39903->39905 39906 44df10 ??3@YAXPAX 39903->39906 39904->39903 39907 44df27 39905->39907 39908 44df20 ??3@YAXPAX 39905->39908 39906->39905 39909 44df37 39907->39909 39910 44df30 ??3@YAXPAX 39907->39910 39908->39907 39910->39909 37667 44dea5 37668 44deb5 FreeLibrary 37667->37668 37669 44dec3 37667->37669 37668->37669 39911 4148b6 FindResourceW 39912 4148cf SizeofResource 39911->39912 39915 4148f9 39911->39915 39913 4148e0 LoadResource 39912->39913 39912->39915 39914 4148ee LockResource 39913->39914 39913->39915 39914->39915 37843 415304 free 39826 427533 39830 427548 39826->39830 39839 425711 39826->39839 39827 4259da 39883 416760 11 API calls 39827->39883 39829 4275cb 39863 425506 39829->39863 39830->39829 39837 429b7a 39830->39837 39831 4260dd 39884 424251 120 API calls 39831->39884 39832 4259c2 39859 425ad6 39832->39859 39877 415c56 11 API calls 39832->39877 39889 4446ce 11 API calls 39837->39889 39839->39827 39839->39832 39842 429a4d 39839->39842 39845 422aeb memset memcpy memcpy 39839->39845 39847 4260a1 39839->39847 39853 429ac1 39839->39853 39862 425a38 39839->39862 39873 4227f0 memset memcpy 39839->39873 39874 422b84 15 API calls 39839->39874 39875 422b5d memset memcpy memcpy 39839->39875 39876 422640 13 API calls 39839->39876 39878 4241fc 11 API calls 39839->39878 39879 42413a 90 API calls 39839->39879 39843 429a66 39842->39843 39844 429a9b 39842->39844 39885 415c56 11 API calls 39843->39885 39849 429a96 39844->39849 39887 416760 11 API calls 39844->39887 39845->39839 39882 415c56 11 API calls 39847->39882 39888 424251 120 API calls 39849->39888 39851 429a7a 39886 416760 11 API calls 39851->39886 39853->39827 39853->39859 39890 415c56 11 API calls 39853->39890 39862->39832 39880 422640 13 API calls 39862->39880 39881 4226e0 12 API calls 39862->39881 39864 425554 39863->39864 39865 42554d 39863->39865 39892 422586 12 API calls 39864->39892 39891 423b34 103 API calls 39865->39891 39868 425567 39869 4255ba 39868->39869 39870 42556c memset 39868->39870 39869->39839 39871 425596 39870->39871 39871->39869 39872 4255a4 memset 39871->39872 39872->39869 39873->39839 39874->39839 39875->39839 39876->39839 39877->39827 39878->39839 39879->39839 39880->39862 39881->39862 39882->39827 39883->39831 39884->39859 39885->39851 39886->39849 39887->39849 39888->39853 39889->39853 39890->39827 39891->39864 39892->39868 39916 441b3f 39926 43a9f6 39916->39926 39918 441b61 40099 4386af memset 39918->40099 39920 44189a 39921 4418e2 39920->39921 39925 442bd4 39920->39925 39922 4418ea 39921->39922 40100 4414a9 12 API calls 39921->40100 39925->39922 40101 441409 memset 39925->40101 39927 43aa20 39926->39927 39928 43aadf 39926->39928 39927->39928 39929 43aa34 memset 39927->39929 39928->39918 39930 43aa56 39929->39930 39931 43aa4d 39929->39931 40102 43a6e7 39930->40102 40110 42c02e memset 39931->40110 39936 43aad3 40112 4169a7 11 API calls 39936->40112 39937 43aaae 39937->39928 39937->39936 39952 43aae5 39937->39952 39938 43ac18 39941 43ac47 39938->39941 40114 42bbd5 memcpy memcpy memcpy memset memcpy 39938->40114 39942 43aca8 39941->39942 40115 438eed 16 API calls 39941->40115 39945 43acd5 39942->39945 40117 4233ae 11 API calls 39942->40117 40118 423426 11 API calls 39945->40118 39946 43ac87 40116 4233c5 16 API calls 39946->40116 39950 43ace1 40119 439811 163 API calls 39950->40119 39951 43a9f6 161 API calls 39951->39952 39952->39928 39952->39938 39952->39951 40113 439bbb 22 API calls 39952->40113 39954 43acfd 39960 43ad2c 39954->39960 40120 438eed 16 API calls 39954->40120 39956 43ad19 40121 4233c5 16 API calls 39956->40121 39957 43ad58 40122 44081d 163 API calls 39957->40122 39960->39957 39963 43add9 39960->39963 39962 43ae3a memset 39964 43ae73 39962->39964 39963->39963 40126 423426 11 API calls 39963->40126 40127 42e1c0 147 API calls 39964->40127 39965 43adab 40124 438c4e 163 API calls 39965->40124 39968 43ad6c 39968->39928 39968->39965 40123 42370b memset memcpy memset 39968->40123 39969 43adcc 40125 440f84 12 API calls 39969->40125 39970 43ae96 40128 42e1c0 147 API calls 39970->40128 39974 43aea8 39975 43aec1 39974->39975 40129 42e199 147 API calls 39974->40129 39976 43af00 39975->39976 40130 42e1c0 147 API calls 39975->40130 39976->39928 39980 43af1a 39976->39980 39981 43b3d9 39976->39981 40131 438eed 16 API calls 39980->40131 39986 43b3f6 39981->39986 39990 43b4c8 39981->39990 39983 43b60f 39983->39928 40190 4393a5 17 API calls 39983->40190 39984 43af2f 40132 4233c5 16 API calls 39984->40132 40172 432878 12 API calls 39986->40172 39988 43af51 40133 423426 11 API calls 39988->40133 39996 43b4f2 39990->39996 40178 42bbd5 memcpy memcpy memcpy memset memcpy 39990->40178 39992 43af7d 40134 423426 11 API calls 39992->40134 40179 43a76c 21 API calls 39996->40179 39997 43b529 40180 44081d 163 API calls 39997->40180 39998 43b462 40174 423330 11 API calls 39998->40174 39999 43af94 40135 423330 11 API calls 39999->40135 40003 43b47e 40008 43b497 40003->40008 40175 42374a memcpy memset memcpy memcpy memcpy 40003->40175 40004 43b544 40009 43b55c 40004->40009 40181 42c02e memset 40004->40181 40005 43b428 40005->39998 40173 432b60 16 API calls 40005->40173 40006 43afca 40136 423330 11 API calls 40006->40136 40176 4233ae 11 API calls 40008->40176 40182 43a87a 163 API calls 40009->40182 40010 43afdb 40137 4233ae 11 API calls 40010->40137 40016 43b56c 40019 43b58a 40016->40019 40183 423330 11 API calls 40016->40183 40017 43b4b1 40177 423399 11 API calls 40017->40177 40018 43afee 40138 44081d 163 API calls 40018->40138 40184 440f84 12 API calls 40019->40184 40024 43b4c1 40186 42db80 163 API calls 40024->40186 40026 43b592 40185 43a82f 16 API calls 40026->40185 40029 43b5b4 40187 438c4e 163 API calls 40029->40187 40031 43b5cf 40188 42c02e memset 40031->40188 40033 43b005 40033->39928 40037 43b01f 40033->40037 40139 42d836 163 API calls 40033->40139 40034 43b1ef 40149 4233c5 16 API calls 40034->40149 40037->40034 40147 423330 11 API calls 40037->40147 40148 42d71d 163 API calls 40037->40148 40038 43b212 40150 423330 11 API calls 40038->40150 40039 43b087 40140 4233ae 11 API calls 40039->40140 40040 43add4 40040->39983 40189 438f86 16 API calls 40040->40189 40045 43b22a 40151 42ccb5 11 API calls 40045->40151 40047 43b23f 40152 4233ae 11 API calls 40047->40152 40048 43b10f 40143 423330 11 API calls 40048->40143 40050 43b257 40153 4233ae 11 API calls 40050->40153 40054 43b129 40144 4233ae 11 API calls 40054->40144 40055 43b26e 40154 4233ae 11 API calls 40055->40154 40058 43b09a 40058->40048 40141 42cc15 19 API calls 40058->40141 40142 4233ae 11 API calls 40058->40142 40059 43b282 40155 43a87a 163 API calls 40059->40155 40061 43b13c 40145 440f84 12 API calls 40061->40145 40063 43b29d 40156 423330 11 API calls 40063->40156 40066 43b15f 40146 4233ae 11 API calls 40066->40146 40067 43b2af 40069 43b2b8 40067->40069 40070 43b2ce 40067->40070 40157 4233ae 11 API calls 40069->40157 40158 440f84 12 API calls 40070->40158 40073 43b2c9 40160 4233ae 11 API calls 40073->40160 40074 43b2da 40159 42370b memset memcpy memset 40074->40159 40077 43b2f9 40161 423330 11 API calls 40077->40161 40079 43b30b 40162 423330 11 API calls 40079->40162 40081 43b325 40163 423399 11 API calls 40081->40163 40083 43b332 40164 4233ae 11 API calls 40083->40164 40085 43b354 40165 423399 11 API calls 40085->40165 40087 43b364 40166 43a82f 16 API calls 40087->40166 40089 43b370 40167 42db80 163 API calls 40089->40167 40091 43b380 40168 438c4e 163 API calls 40091->40168 40093 43b39e 40169 423399 11 API calls 40093->40169 40095 43b3ae 40170 43a76c 21 API calls 40095->40170 40097 43b3c3 40171 423399 11 API calls 40097->40171 40099->39920 40100->39922 40101->39925 40103 43a6f5 40102->40103 40104 43a765 40102->40104 40103->40104 40191 42a115 40103->40191 40104->39928 40111 4397fd memset 40104->40111 40108 43a73d 40108->40104 40109 42a115 147 API calls 40108->40109 40109->40104 40110->39930 40111->39937 40112->39928 40113->39952 40114->39941 40115->39946 40116->39942 40117->39945 40118->39950 40119->39954 40120->39956 40121->39960 40122->39968 40123->39965 40124->39969 40125->40040 40126->39962 40127->39970 40128->39974 40129->39975 40130->39975 40131->39984 40132->39988 40133->39992 40134->39999 40135->40006 40136->40010 40137->40018 40138->40033 40139->40039 40140->40058 40141->40058 40142->40058 40143->40054 40144->40061 40145->40066 40146->40037 40147->40037 40148->40037 40149->40038 40150->40045 40151->40047 40152->40050 40153->40055 40154->40059 40155->40063 40156->40067 40157->40073 40158->40074 40159->40073 40160->40077 40161->40079 40162->40081 40163->40083 40164->40085 40165->40087 40166->40089 40167->40091 40168->40093 40169->40095 40170->40097 40171->40040 40172->40005 40173->39998 40174->40003 40175->40008 40176->40017 40177->40024 40178->39996 40179->39997 40180->40004 40181->40009 40182->40016 40183->40019 40184->40026 40185->40024 40186->40029 40187->40031 40188->40040 40189->39983 40190->39928 40192 42a175 40191->40192 40194 42a122 40191->40194 40192->40104 40197 42b13b 147 API calls 40192->40197 40194->40192 40195 42a115 147 API calls 40194->40195 40198 43a174 40194->40198 40222 42a0a8 147 API calls 40194->40222 40195->40194 40197->40108 40212 43a196 40198->40212 40213 43a19e 40198->40213 40199 43a306 40199->40212 40242 4388c4 14 API calls 40199->40242 40202 42a115 147 API calls 40202->40213 40204 43a642 40204->40212 40246 4169a7 11 API calls 40204->40246 40208 43a635 40245 42c02e memset 40208->40245 40212->40194 40213->40199 40213->40202 40213->40212 40223 42ff8c 40213->40223 40231 415a91 40213->40231 40235 4165ff 40213->40235 40238 439504 13 API calls 40213->40238 40239 4312d0 147 API calls 40213->40239 40240 42be4c memcpy memcpy memcpy memset memcpy 40213->40240 40241 43a121 11 API calls 40213->40241 40215 4169a7 11 API calls 40216 43a325 40215->40216 40216->40204 40216->40208 40216->40212 40216->40215 40217 42b5b5 memset memcpy 40216->40217 40218 42bf4c 14 API calls 40216->40218 40221 4165ff 11 API calls 40216->40221 40243 42b63e 14 API calls 40216->40243 40244 42bfcf memcpy 40216->40244 40217->40216 40218->40216 40221->40216 40222->40194 40247 43817e 40223->40247 40225 42ff99 40226 42ffe3 40225->40226 40227 42ffd0 40225->40227 40230 42ff9d 40225->40230 40252 4169a7 11 API calls 40226->40252 40251 4169a7 11 API calls 40227->40251 40230->40213 40232 415a9d 40231->40232 40233 415ab3 40232->40233 40234 415aa4 memset 40232->40234 40233->40213 40234->40233 40399 4165a0 40235->40399 40238->40213 40239->40213 40240->40213 40241->40213 40242->40216 40243->40216 40244->40216 40245->40204 40246->40212 40248 438187 40247->40248 40250 438192 40247->40250 40253 4380f6 40248->40253 40250->40225 40251->40230 40252->40230 40255 43811f 40253->40255 40254 438164 40254->40250 40255->40254 40257 4300e8 3 API calls 40255->40257 40258 437e5e 40255->40258 40257->40255 40281 437d3c 40258->40281 40260 437eb3 40260->40255 40261 437ea9 40261->40260 40266 437f22 40261->40266 40296 41f432 40261->40296 40264 437f06 40343 415c56 11 API calls 40264->40343 40268 432d4e 3 API calls 40266->40268 40269 437f7f 40266->40269 40267 437f95 40344 415c56 11 API calls 40267->40344 40268->40269 40269->40267 40270 43802b 40269->40270 40272 4165ff 11 API calls 40270->40272 40273 438054 40272->40273 40307 437371 40273->40307 40276 43806b 40277 438094 40276->40277 40345 42f50e 138 API calls 40276->40345 40279 437fa3 40277->40279 40280 4300e8 3 API calls 40277->40280 40279->40260 40346 41f638 104 API calls 40279->40346 40280->40279 40282 437d69 40281->40282 40285 437d80 40281->40285 40347 437ccb 11 API calls 40282->40347 40284 437d76 40284->40261 40285->40284 40286 437da3 40285->40286 40288 437d90 40285->40288 40289 438460 134 API calls 40286->40289 40288->40284 40351 437ccb 11 API calls 40288->40351 40292 437dcb 40289->40292 40290 437de8 40350 424f26 123 API calls 40290->40350 40292->40290 40348 444283 13 API calls 40292->40348 40294 437dfc 40349 437ccb 11 API calls 40294->40349 40297 41f54d 40296->40297 40303 41f44f 40296->40303 40298 41f466 40297->40298 40381 41c635 memset memset 40297->40381 40298->40264 40298->40266 40303->40298 40305 41f50b 40303->40305 40352 41f1a5 40303->40352 40377 41c06f memcmp 40303->40377 40378 41f3b1 90 API calls 40303->40378 40379 41f398 86 API calls 40303->40379 40305->40297 40305->40298 40380 41c295 86 API calls 40305->40380 40382 41703f 40307->40382 40309 437399 40310 43739d 40309->40310 40312 4373ac 40309->40312 40389 4446ea 11 API calls 40310->40389 40313 416935 16 API calls 40312->40313 40314 4373ca 40313->40314 40315 438460 134 API calls 40314->40315 40320 4251c4 137 API calls 40314->40320 40324 415a91 memset 40314->40324 40327 43758f 40314->40327 40339 437584 40314->40339 40342 437d3c 135 API calls 40314->40342 40390 425433 13 API calls 40314->40390 40391 425413 17 API calls 40314->40391 40392 42533e 16 API calls 40314->40392 40393 42538f 16 API calls 40314->40393 40394 42453e 123 API calls 40314->40394 40315->40314 40316 4375bc 40318 415c7d 16 API calls 40316->40318 40319 4375d2 40318->40319 40321 4442e6 11 API calls 40319->40321 40341 4373a7 40319->40341 40320->40314 40322 4375e2 40321->40322 40322->40341 40397 444283 13 API calls 40322->40397 40324->40314 40395 42453e 123 API calls 40327->40395 40330 4375f4 40333 437620 40330->40333 40334 43760b 40330->40334 40332 43759f 40335 416935 16 API calls 40332->40335 40337 416935 16 API calls 40333->40337 40398 444283 13 API calls 40334->40398 40335->40339 40337->40341 40339->40316 40396 42453e 123 API calls 40339->40396 40340 437612 memcpy 40340->40341 40341->40276 40342->40314 40343->40260 40344->40279 40345->40277 40346->40260 40347->40284 40348->40294 40349->40290 40350->40284 40351->40284 40353 41bc3b 101 API calls 40352->40353 40354 41f1b4 40353->40354 40355 41edad 86 API calls 40354->40355 40362 41f282 40354->40362 40356 41f1cb 40355->40356 40357 41f1f5 memcmp 40356->40357 40358 41f20e 40356->40358 40356->40362 40357->40358 40359 41f21b memcmp 40358->40359 40358->40362 40360 41f326 40359->40360 40363 41f23d 40359->40363 40361 41ee6b 86 API calls 40360->40361 40360->40362 40361->40362 40362->40303 40363->40360 40364 41f28e memcmp 40363->40364 40366 41c8df 56 API calls 40363->40366 40364->40360 40365 41f2a9 40364->40365 40365->40360 40368 41f308 40365->40368 40369 41f2d8 40365->40369 40367 41f269 40366->40367 40367->40360 40370 41f287 40367->40370 40371 41f27a 40367->40371 40368->40360 40375 4446ce 11 API calls 40368->40375 40372 41ee6b 86 API calls 40369->40372 40370->40364 40373 41ee6b 86 API calls 40371->40373 40374 41f2e0 40372->40374 40373->40362 40376 41b1ca memset 40374->40376 40375->40360 40376->40362 40377->40303 40378->40303 40379->40303 40380->40297 40381->40298 40383 417044 40382->40383 40384 41705c 40382->40384 40386 416760 11 API calls 40383->40386 40388 417055 40383->40388 40385 417075 40384->40385 40387 41707a 11 API calls 40384->40387 40385->40309 40386->40388 40387->40383 40388->40309 40389->40341 40390->40314 40391->40314 40392->40314 40393->40314 40394->40314 40395->40332 40396->40316 40397->40330 40398->40340 40404 415cfe 40399->40404 40408 415d23 __aullrem __aulldvrm 40404->40408 40411 41628e 40404->40411 40405 4163ca 40418 416422 11 API calls 40405->40418 40407 416172 memset 40407->40408 40408->40405 40408->40407 40409 416422 10 API calls 40408->40409 40410 415cb9 10 API calls 40408->40410 40408->40411 40409->40408 40410->40408 40412 416520 40411->40412 40413 416527 40412->40413 40417 416574 40412->40417 40414 416544 40413->40414 40413->40417 40419 4156aa 11 API calls 40413->40419 40416 416561 memcpy 40414->40416 40414->40417 40416->40417 40417->40213 40418->40411 40419->40414 40441 41493c EnumResourceNamesW 37671 4287c1 37672 4287d2 37671->37672 37673 429ac1 37671->37673 37674 428818 37672->37674 37675 42881f 37672->37675 37690 425711 37672->37690 37685 425ad6 37673->37685 37741 415c56 11 API calls 37673->37741 37708 42013a 37674->37708 37736 420244 97 API calls 37675->37736 37680 4260dd 37735 424251 120 API calls 37680->37735 37682 4259da 37734 416760 11 API calls 37682->37734 37688 422aeb memset memcpy memcpy 37688->37690 37689 429a4d 37691 429a66 37689->37691 37695 429a9b 37689->37695 37690->37673 37690->37682 37690->37688 37690->37689 37693 4260a1 37690->37693 37704 4259c2 37690->37704 37707 425a38 37690->37707 37724 4227f0 memset memcpy 37690->37724 37725 422b84 15 API calls 37690->37725 37726 422b5d memset memcpy memcpy 37690->37726 37727 422640 13 API calls 37690->37727 37729 4241fc 11 API calls 37690->37729 37730 42413a 90 API calls 37690->37730 37737 415c56 11 API calls 37691->37737 37733 415c56 11 API calls 37693->37733 37696 429a96 37695->37696 37739 416760 11 API calls 37695->37739 37740 424251 120 API calls 37696->37740 37698 429a7a 37738 416760 11 API calls 37698->37738 37704->37685 37728 415c56 11 API calls 37704->37728 37707->37704 37731 422640 13 API calls 37707->37731 37732 4226e0 12 API calls 37707->37732 37709 42014c 37708->37709 37712 420151 37708->37712 37751 41e466 97 API calls 37709->37751 37711 420162 37711->37690 37712->37711 37713 4201b3 37712->37713 37714 420229 37712->37714 37715 4201b8 37713->37715 37716 4201dc 37713->37716 37714->37711 37717 41fd5e 86 API calls 37714->37717 37742 41fbdb 37715->37742 37716->37711 37720 4201ff 37716->37720 37748 41fc4c 37716->37748 37717->37711 37720->37711 37723 42013a 97 API calls 37720->37723 37723->37711 37724->37690 37725->37690 37726->37690 37727->37690 37728->37682 37729->37690 37730->37690 37731->37707 37732->37707 37733->37682 37734->37680 37735->37685 37736->37690 37737->37698 37738->37696 37739->37696 37740->37673 37741->37682 37743 41fbf1 37742->37743 37744 41fbf8 37742->37744 37747 41fc39 37743->37747 37766 4446ce 11 API calls 37743->37766 37756 41ee26 37744->37756 37747->37711 37752 41fd5e 37747->37752 37749 41ee6b 86 API calls 37748->37749 37750 41fc5d 37749->37750 37750->37716 37751->37712 37754 41fd65 37752->37754 37753 41fdab 37753->37711 37754->37753 37755 41fbdb 86 API calls 37754->37755 37755->37754 37757 41ee41 37756->37757 37758 41ee32 37756->37758 37767 41edad 37757->37767 37770 4446ce 11 API calls 37758->37770 37761 41ee3c 37761->37743 37764 41ee58 37764->37761 37772 41ee6b 37764->37772 37766->37747 37776 41be52 37767->37776 37770->37761 37771 41eb85 11 API calls 37771->37764 37773 41ee70 37772->37773 37774 41ee78 37772->37774 37829 41bf99 86 API calls 37773->37829 37774->37761 37777 41be6f 37776->37777 37778 41be5f 37776->37778 37784 41be8c 37777->37784 37808 418c63 memset memset 37777->37808 37807 4446ce 11 API calls 37778->37807 37780 41be69 37780->37761 37780->37771 37782 41bee7 37782->37780 37812 41a453 86 API calls 37782->37812 37784->37780 37784->37782 37785 41bf3a 37784->37785 37786 41bed1 37784->37786 37811 4446ce 11 API calls 37785->37811 37788 41bef0 37786->37788 37791 41bee2 37786->37791 37788->37782 37790 41bf01 37788->37790 37789 41bf24 memset 37789->37780 37790->37789 37792 41bf14 37790->37792 37809 418a6d memset memcpy memset 37790->37809 37797 41ac13 37791->37797 37810 41a223 memset memcpy memset 37792->37810 37796 41bf20 37796->37789 37798 41ac3f memset 37797->37798 37800 41ac52 37797->37800 37799 41acd9 37798->37799 37799->37782 37802 41ac6a 37800->37802 37813 41dc14 19 API calls 37800->37813 37803 41aca1 37802->37803 37814 41519d 37802->37814 37803->37799 37805 41acc0 memset 37803->37805 37806 41accd memcpy 37803->37806 37805->37799 37806->37799 37807->37780 37808->37784 37809->37792 37810->37796 37811->37782 37813->37802 37817 4175ed 37814->37817 37825 417570 SetFilePointer 37817->37825 37820 41760a ReadFile 37821 417637 37820->37821 37822 417627 GetLastError 37820->37822 37823 4151b3 37821->37823 37824 41763e memset 37821->37824 37822->37823 37823->37803 37824->37823 37826 4175b2 37825->37826 37827 41759c GetLastError 37825->37827 37826->37820 37826->37823 37827->37826 37828 4175a8 GetLastError 37827->37828 37828->37826 37829->37774 37830 417bc5 37831 417c61 37830->37831 37836 417bda 37830->37836 37832 417bf6 UnmapViewOfFile CloseHandle 37832->37832 37832->37836 37834 417c2c 37834->37836 37842 41851e 20 API calls 37834->37842 37836->37831 37836->37832 37836->37834 37837 4175b7 37836->37837 37838 4175d6 CloseHandle 37837->37838 37839 4175c8 37838->37839 37840 4175df 37838->37840 37839->37840 37841 4175ce Sleep 37839->37841 37840->37836 37841->37838 37842->37834 39893 4147f3 39896 414561 39893->39896 39895 414813 39897 41456d 39896->39897 39898 41457f GetPrivateProfileIntW 39896->39898 39901 4143f1 memset _itow WritePrivateProfileStringW 39897->39901 39898->39895 39900 41457a 39900->39895 39901->39900

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040DDAD
                                                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                              • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                                • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                                                • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                                              • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                              • CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                                              • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                              • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                              • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                                                                              • _wcsicmp.MSVCRT ref: 0040DED8
                                                                                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                                                                              • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                                                                              • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                                                                              • memset.MSVCRT ref: 0040DF5F
                                                                                                                              • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                                                                                              • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                                                                              • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                                                                              • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                                                                              • API String ID: 708747863-3398334509
                                                                                                                              • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                              • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                                                                              • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                                                                              • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                                • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                                                                                • Part of subcall function 00418680: free.MSVCRT ref: 004186C7
                                                                                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                              • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                                                                              • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                                                                              • free.MSVCRT ref: 00418803
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: DiskFreeSpacefree$FullNamePathVersionmalloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1355100292-0
                                                                                                                              • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                                              • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                                                                              • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                                                                                              • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                                                                              APIs
                                                                                                                              • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                                                                              • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFind$FirstNext
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1690352074-0
                                                                                                                              • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                              • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                                                                              • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                                                                              • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0041898C
                                                                                                                              • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InfoSystemmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3558857096-0
                                                                                                                              • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                              • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                                                                              • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                                                                              • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004455C2
                                                                                                                              • wcsrchr.MSVCRT ref: 004455DA
                                                                                                                              • memset.MSVCRT ref: 0044570D
                                                                                                                              • memset.MSVCRT ref: 00445725
                                                                                                                                • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                                                                                • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                                                                                • Part of subcall function 0040BDB0: CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                                                • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                                                                                • Part of subcall function 0040BDB0: wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                                • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                                                                                • Part of subcall function 0040BDB0: memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                                • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                                              • memset.MSVCRT ref: 0044573D
                                                                                                                              • memset.MSVCRT ref: 00445755
                                                                                                                              • memset.MSVCRT ref: 004458CB
                                                                                                                              • memset.MSVCRT ref: 004458E3
                                                                                                                              • memset.MSVCRT ref: 0044596E
                                                                                                                              • memset.MSVCRT ref: 00445A10
                                                                                                                              • memset.MSVCRT ref: 00445A28
                                                                                                                              • memset.MSVCRT ref: 00445AC6
                                                                                                                                • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                                • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                                                • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                                                                                • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                                • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                                              • memset.MSVCRT ref: 00445B52
                                                                                                                              • memset.MSVCRT ref: 00445B6A
                                                                                                                              • memset.MSVCRT ref: 00445C9B
                                                                                                                              • memset.MSVCRT ref: 00445CB3
                                                                                                                              • _wcsicmp.MSVCRT ref: 00445D56
                                                                                                                              • memset.MSVCRT ref: 00445B82
                                                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                                                                                • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                                                                              • memset.MSVCRT ref: 00445986
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwrmemcpywcscatwcscpywcsncmp
                                                                                                                              • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                                                                              • API String ID: 2263259095-3798722523
                                                                                                                              • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                                              • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                                                                              • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                                                                                              • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                                • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                                                • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                                • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                              • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                                                                              • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                                                                                              • String ID: $/deleteregkey$/savelangfile
                                                                                                                              • API String ID: 2744995895-28296030
                                                                                                                              • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                              • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                                                                              • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                                                                              • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040B71C
                                                                                                                                • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                                                                                • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                                                                              • wcsrchr.MSVCRT ref: 0040B738
                                                                                                                              • memset.MSVCRT ref: 0040B756
                                                                                                                              • memset.MSVCRT ref: 0040B7F5
                                                                                                                              • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                              • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                                                                                              • CloseHandle.KERNELBASE(00000000,?,?), ref: 0040B838
                                                                                                                              • memset.MSVCRT ref: 0040B851
                                                                                                                              • memset.MSVCRT ref: 0040B8CA
                                                                                                                              • memcmp.MSVCRT(?,v10,00000003), ref: 0040B9BF
                                                                                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                                                                                              • memset.MSVCRT ref: 0040BB53
                                                                                                                              • memcpy.MSVCRT(?,00000000,?,00000000,00000000,?), ref: 0040BB66
                                                                                                                              • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$File$Freewcsrchr$AddressCloseCopyCreateDeleteHandleLibraryLocalProcmemcmpmemcpywcscpy
                                                                                                                              • String ID: chp$v10
                                                                                                                              • API String ID: 4165125987-2783969131
                                                                                                                              • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                                              • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                                                                              • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                                                                                              • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 504 40e2ab-40e2ce call 40695d call 406b90 508 40e2d3-40e2d5 504->508 509 40e4a0-40e4af call 4069a3 508->509 510 40e2db-40e300 508->510 512 40e304-40e316 call 406e8f 510->512 516 40e476-40e483 call 406b53 512->516 517 40e31c-40e39b call 40dd50 * 7 memset call 40aa29 512->517 523 40e302 516->523 524 40e489-40e495 call 40aa04 516->524 541 40e3c9-40e3ce 517->541 542 40e39d-40e3ae call 40742e 517->542 523->512 524->509 530 40e497-40e49f free 524->530 530->509 544 40e3d0-40e3d6 541->544 545 40e3d9-40e3de 541->545 549 40e3b0 542->549 550 40e3b3-40e3c1 wcschr 542->550 544->545 547 40e3e0-40e3f1 memcpy 545->547 548 40e3f4-40e3f9 545->548 547->548 551 40e3fb-40e40c memcpy 548->551 552 40e40f-40e414 548->552 549->550 550->541 555 40e3c3-40e3c6 550->555 551->552 553 40e416-40e427 memcpy 552->553 554 40e42a-40e42f 552->554 553->554 556 40e431-40e442 memcpy 554->556 557 40e445-40e44a 554->557 555->541 556->557 558 40e44c-40e45b 557->558 559 40e45e-40e463 557->559 558->559 559->516 560 40e465-40e469 559->560 560->516 561 40e46b-40e473 560->561 561->516
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                              • free.MSVCRT ref: 0040E49A
                                                                                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                              • memset.MSVCRT ref: 0040E380
                                                                                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                              • wcschr.MSVCRT ref: 0040E3B8
                                                                                                                              • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                                                                                              • memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E407
                                                                                                                              • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E422
                                                                                                                              • memcpy.MSVCRT(?,-00000220,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E43D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$_wcsicmpmemset$freewcschrwcslen
                                                                                                                              • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                                                                              • API String ID: 3849927982-2252543386
                                                                                                                              • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                                              • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                                                                              • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                                                                                              • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 562 4091b8-40921b memset call 40a6e6 call 444432 567 409520-409526 562->567 568 409221-40923b call 40b273 call 438552 562->568 572 409240-409248 568->572 573 409383-4093ab call 40b273 call 438552 572->573 574 40924e-409258 call 4251c4 572->574 586 4093b1 573->586 587 4094ff-40950b call 443d90 573->587 579 40937b-40937e call 424f26 574->579 580 40925e-409291 call 4253cf * 2 call 4253af * 2 574->580 579->573 580->579 610 409297-409299 580->610 590 4093d3-4093dd call 4251c4 586->590 587->567 596 40950d-409511 587->596 597 4093b3-4093cc call 4253cf * 2 590->597 598 4093df 590->598 596->567 600 409513-40951d call 408f2f 596->600 597->590 613 4093ce-4093d1 597->613 601 4094f7-4094fa call 424f26 598->601 600->567 601->587 610->579 612 40929f-4092a3 610->612 612->579 614 4092a9-4092ba 612->614 613->590 615 4093e4-4093fb call 4253af * 2 613->615 616 4092bc 614->616 617 4092be-4092e3 memcpy memcmp 614->617 615->601 627 409401-409403 615->627 616->617 618 409333-409345 memcmp 617->618 619 4092e5-4092ec 617->619 618->579 622 409347-40935f memcpy 618->622 619->579 621 4092f2-409331 memcpy * 2 619->621 624 409363-409378 memcpy 621->624 622->624 624->579 627->601 628 409409-40941b memcmp 627->628 628->601 629 409421-409433 memcmp 628->629 630 4094a4-4094b6 memcmp 629->630 631 409435-40943c 629->631 630->601 633 4094b8-4094ed memcpy * 2 630->633 631->601 632 409442-4094a2 memcpy * 3 631->632 634 4094f4 632->634 633->634 634->601
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004091E2
                                                                                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                              • memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                                              • memcpy.MSVCRT(?,00000023,?), ref: 0040930C
                                                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409325
                                                                                                                              • memcmp.MSVCRT(00000000,0045A4E8,00000006), ref: 0040933B
                                                                                                                              • memcpy.MSVCRT(?,00000015,?), ref: 00409357
                                                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00409370
                                                                                                                              • memcmp.MSVCRT(00000000,004599B8,00000010), ref: 00409411
                                                                                                                              • memcmp.MSVCRT(00000000,0045A500,00000006), ref: 00409429
                                                                                                                              • memcpy.MSVCRT(?,00000023,?), ref: 00409462
                                                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 0040947E
                                                                                                                              • memcpy.MSVCRT(?,?,00000020), ref: 0040949A
                                                                                                                              • memcmp.MSVCRT(00000000,0045A4F8,00000006), ref: 004094AC
                                                                                                                              • memcpy.MSVCRT(?,00000015,?), ref: 004094D0
                                                                                                                              • memcpy.MSVCRT(?,?,00000020), ref: 004094E8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3715365532-3916222277
                                                                                                                              • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                                              • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                                                                              • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                                                                                              • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 635 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 638 413f00-413f11 Process32NextW 635->638 639 413da5-413ded OpenProcess 638->639 640 413f17-413f24 CloseHandle 638->640 641 413eb0-413eb5 639->641 642 413df3-413e26 memset call 413f27 639->642 641->638 643 413eb7-413ebd 641->643 650 413e79-413e9d call 413959 call 413ca4 642->650 651 413e28-413e35 642->651 645 413ec8-413eda call 4099f4 643->645 646 413ebf-413ec6 free 643->646 648 413edb-413ee2 645->648 646->648 656 413ee4 648->656 657 413ee7-413efe 648->657 662 413ea2-413eae CloseHandle 650->662 654 413e61-413e68 651->654 655 413e37-413e44 GetModuleHandleW 651->655 654->650 660 413e6a-413e76 654->660 655->654 659 413e46-413e5c GetProcAddress 655->659 656->657 657->638 659->654 660->650 662->641
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00413D6A
                                                                                                                              • memset.MSVCRT ref: 00413D7F
                                                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                                                                              • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                                                                              • memset.MSVCRT ref: 00413E07
                                                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                                                                              • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                                                                                              • free.MSVCRT ref: 00413EC1
                                                                                                                              • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                                                                              • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Handle$CloseProcess32freememset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                                                                                              • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                                                                              • API String ID: 1344430650-1740548384
                                                                                                                              • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                                              • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                                                                              • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                                                                                              • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                                                                                • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                                                                                • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                                                                                • Part of subcall function 0040DD85: CloseHandle.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                                                                                                • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                                                                                • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                              • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                              • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                              • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                                              • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                                • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                                                • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                                • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                              • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                              • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                              • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                              • CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                                                                              • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                                                                              • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                                                                              • String ID: bhv
                                                                                                                              • API String ID: 4234240956-2689659898
                                                                                                                              • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                              • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                                                                              • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                                                                              • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 691 413f4f-413f52 692 413fa5 691->692 693 413f54-413f5a call 40a804 691->693 695 413f5f-413fa4 GetProcAddress * 5 693->695 695->692
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                                              • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                                              • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                                              • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                                              • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                              • API String ID: 2941347001-70141382
                                                                                                                              • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                                              • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                                                                                              • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                                                                                              • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 696 4466f4-44670e call 446904 GetModuleHandleA 699 446710-44671b 696->699 700 44672f-446732 696->700 699->700 701 44671d-446726 699->701 702 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 700->702 704 446747-44674b 701->704 705 446728-44672d 701->705 710 4467ac-4467b7 __setusermatherr 702->710 711 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 702->711 704->700 706 44674d-44674f 704->706 705->700 708 446734-44673b 705->708 709 446755-446758 706->709 708->700 712 44673d-446745 708->712 709->702 710->711 715 446810-446819 711->715 716 44681e-446825 711->716 712->709 717 4468d8-4468dd call 44693d 715->717 718 446827-446832 716->718 719 44686c-446870 716->719 722 446834-446838 718->722 723 44683a-44683e 718->723 720 446845-44684b 719->720 721 446872-446877 719->721 725 446853-446864 GetStartupInfoW 720->725 726 44684d-446851 720->726 721->719 722->718 722->723 723->720 727 446840-446842 723->727 729 446866-44686a 725->729 730 446879-44687b 725->730 726->725 726->727 727->720 731 44687c-446894 GetModuleHandleA call 41276d 729->731 730->731 734 446896-446897 exit 731->734 735 44689d-4468d6 _cexit 731->735 734->735 735->717
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2827331108-0
                                                                                                                              • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                                              • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                                                                              • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                                                                                              • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040C298
                                                                                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                                                                                • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                              • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                              • wcschr.MSVCRT ref: 0040C324
                                                                                                                              • wcschr.MSVCRT ref: 0040C344
                                                                                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                              • GetLastError.KERNEL32 ref: 0040C373
                                                                                                                              • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                                                                              • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                                                                                              • String ID: visited:
                                                                                                                              • API String ID: 1157525455-1702587658
                                                                                                                              • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                              • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                                                                              • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                                                                              • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 762 40e175-40e1a1 call 40695d call 406b90 767 40e1a7-40e1e5 memset 762->767 768 40e299-40e2a8 call 4069a3 762->768 770 40e1e8-40e1fa call 406e8f 767->770 774 40e270-40e27d call 406b53 770->774 775 40e1fc-40e219 call 40dd50 * 2 770->775 774->770 780 40e283-40e286 774->780 775->774 786 40e21b-40e21d 775->786 783 40e291-40e294 call 40aa04 780->783 784 40e288-40e290 free 780->784 783->768 784->783 786->774 787 40e21f-40e235 call 40742e 786->787 787->774 790 40e237-40e242 call 40aae3 787->790 790->774 793 40e244-40e26b _snwprintf call 40a8d0 790->793 793->774
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                                                                              • memset.MSVCRT ref: 0040E1BD
                                                                                                                                • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                                                                              • free.MSVCRT ref: 0040E28B
                                                                                                                                • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                                                                                • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                                                                                • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                                                                              • _snwprintf.MSVCRT ref: 0040E257
                                                                                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                                                                              • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                                                                              • API String ID: 2804212203-2982631422
                                                                                                                              • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                                                              • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                                                                              • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                                                                                              • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                              • memset.MSVCRT ref: 0040BC75
                                                                                                                              • memset.MSVCRT ref: 0040BC8C
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                                                                              • memcmp.MSVCRT(?,00000000,00000005,?,?,?,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE), ref: 0040BCD6
                                                                                                                              • memcpy.MSVCRT(00000024,?,00000020,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD2B
                                                                                                                              • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 115830560-3916222277
                                                                                                                              • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                              • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                                                                              • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                                                                              • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 847 41837f-4183bf 848 4183c1-4183cc call 418197 847->848 849 4183dc-4183ec call 418160 847->849 854 4183d2-4183d8 848->854 855 418517-41851d 848->855 856 4183f6-41840b 849->856 857 4183ee-4183f1 849->857 854->849 858 418417-418423 856->858 859 41840d-418415 856->859 857->855 860 418427-418442 call 41739b 858->860 859->860 863 418444-41845d CreateFileW 860->863 864 41845f-418475 CreateFileA 860->864 865 418477-41847c 863->865 864->865 866 4184c2-4184c7 865->866 867 41847e-418495 GetLastError free 865->867 870 4184d5-418501 memset call 418758 866->870 871 4184c9-4184d3 866->871 868 4184b5-4184c0 call 444706 867->868 869 418497-4184b3 call 41837f 867->869 868->855 869->855 877 418506-418515 free 870->877 871->870 877->855
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                                                                              • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                                                                                              • GetLastError.KERNEL32 ref: 0041847E
                                                                                                                              • free.MSVCRT ref: 0041848B
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateFile$ErrorLastfree
                                                                                                                              • String ID: |A
                                                                                                                              • API String ID: 77810686-1717621600
                                                                                                                              • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                                              • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                                                                              • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                                                                                              • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0041249C
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00002A88), ref: 004124D2
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000350), ref: 00412510
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,0000000E), ref: 00412582
                                                                                                                              • LoadIconW.USER32(00000000,00000065), ref: 0041258B
                                                                                                                              • wcscpy.MSVCRT ref: 004125A0
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                                                                              • String ID: r!A
                                                                                                                              • API String ID: 2791114272-628097481
                                                                                                                              • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                                              • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                                                                              • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                                                                                              • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                                • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                                                                                • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                                                                                • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                                                                                • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                                                                                • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                                • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                                                                                • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                                                                                • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                              • _wcslwr.MSVCRT ref: 0040C817
                                                                                                                                • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                                                                                • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                                                                              • wcslen.MSVCRT ref: 0040C82C
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$free$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                                                                              • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                                                                              • API String ID: 2936932814-4196376884
                                                                                                                              • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                              • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                                                                              • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                                                                              • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                                                                              • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                                                                                              • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                                                                              • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                                                                              • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                                                                              • memcpy.MSVCRT(00000000,00000000,00000000), ref: 0040B60D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                                                                              • String ID: BIN
                                                                                                                              • API String ID: 1668488027-1015027815
                                                                                                                              • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                              • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                                                                              • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                                                                              • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                                                • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                                              • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                                                                                              • wcslen.MSVCRT ref: 0040BE06
                                                                                                                              • wcsncmp.MSVCRT ref: 0040BE38
                                                                                                                              • memset.MSVCRT ref: 0040BE91
                                                                                                                              • memcpy.MSVCRT(?,?,?,00000001,?,?,?,00000000,?), ref: 0040BEB2
                                                                                                                              • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                                                                                              • wcschr.MSVCRT ref: 0040BF24
                                                                                                                              • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$CredEnumerateFreeLocal_wcsnicmpmemcpymemsetwcschrwcslenwcsncmp
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 697348961-0
                                                                                                                              • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                                              • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                                                                                              • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                                                                                              • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00403CBF
                                                                                                                              • memset.MSVCRT ref: 00403CD4
                                                                                                                              • memset.MSVCRT ref: 00403CE9
                                                                                                                              • memset.MSVCRT ref: 00403CFE
                                                                                                                              • memset.MSVCRT ref: 00403D13
                                                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                              • memset.MSVCRT ref: 00403DDA
                                                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                                              • String ID: Waterfox$Waterfox\Profiles
                                                                                                                              • API String ID: 3527940856-11920434
                                                                                                                              • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                              • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                                                                              • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                                                                              • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00403E50
                                                                                                                              • memset.MSVCRT ref: 00403E65
                                                                                                                              • memset.MSVCRT ref: 00403E7A
                                                                                                                              • memset.MSVCRT ref: 00403E8F
                                                                                                                              • memset.MSVCRT ref: 00403EA4
                                                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                              • memset.MSVCRT ref: 00403F6B
                                                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                                              • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                                                                              • API String ID: 3527940856-2068335096
                                                                                                                              • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                              • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                                                                              • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                                                                              • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00403FE1
                                                                                                                              • memset.MSVCRT ref: 00403FF6
                                                                                                                              • memset.MSVCRT ref: 0040400B
                                                                                                                              • memset.MSVCRT ref: 00404020
                                                                                                                              • memset.MSVCRT ref: 00404035
                                                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                                                                                • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                                                                                • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                                                                                • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                                                                              • memset.MSVCRT ref: 004040FC
                                                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                                                                                              • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                                                                              • API String ID: 3527940856-3369679110
                                                                                                                              • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                              • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                                                                              • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                                                                              • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(00000048,00451D40,0000002C,000003FF,00445FAE,?,00000000,?,0040B879), ref: 004444E3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy
                                                                                                                              • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                                                                              • API String ID: 3510742995-2641926074
                                                                                                                              • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                              • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                                                                              • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                                                                                              • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040B633: free.MSVCRT ref: 0040B63A
                                                                                                                                • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                                                                                • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                                                                              • memset.MSVCRT ref: 004033B7
                                                                                                                              • memcpy.MSVCRT(?,00000000,0000121C), ref: 004033D0
                                                                                                                              • wcscmp.MSVCRT ref: 004033FC
                                                                                                                              • _wcsicmp.MSVCRT ref: 00403439
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$_wcsicmpfreememcpywcscmpwcsrchr
                                                                                                                              • String ID: $0.@
                                                                                                                              • API String ID: 2758756878-1896041820
                                                                                                                              • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                              • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                                                                              • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                                                                              • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2941347001-0
                                                                                                                              • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                                              • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                                                                                              • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                                                                                              • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00403C09
                                                                                                                              • memset.MSVCRT ref: 00403C1E
                                                                                                                                • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                                                                                • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                                                                              • wcscat.MSVCRT ref: 00403C47
                                                                                                                                • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                                                                                • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                                • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                                                                              • wcscat.MSVCRT ref: 00403C70
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memsetwcscat$Closewcscpywcslen
                                                                                                                              • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                                                                              • API String ID: 3249829328-1174173950
                                                                                                                              • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                              • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                                                                              • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                                                                              • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040A824
                                                                                                                              • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                              • wcscpy.MSVCRT ref: 0040A854
                                                                                                                              • wcscat.MSVCRT ref: 0040A86A
                                                                                                                              • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                              • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 669240632-0
                                                                                                                              • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                              • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                                                                              • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                                                                              • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                                                                              APIs
                                                                                                                              • wcschr.MSVCRT ref: 00414458
                                                                                                                              • _snwprintf.MSVCRT ref: 0041447D
                                                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                                                                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                                                                              • String ID: "%s"
                                                                                                                              • API String ID: 1343145685-3297466227
                                                                                                                              • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                              • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                                                                              • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                                                                              • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                                                                                              • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressHandleModuleProcProcessTimes
                                                                                                                              • String ID: GetProcessTimes$kernel32.dll
                                                                                                                              • API String ID: 1714573020-3385500049
                                                                                                                              • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                              • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                                                                              • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                                                                              • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004087D6
                                                                                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                                • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                                                                              • memset.MSVCRT ref: 00408828
                                                                                                                              • memset.MSVCRT ref: 00408840
                                                                                                                              • memset.MSVCRT ref: 00408858
                                                                                                                              • memset.MSVCRT ref: 00408870
                                                                                                                              • memset.MSVCRT ref: 00408888
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2911713577-0
                                                                                                                              • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                              • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                                                                              • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                                                                              • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                                                                              APIs
                                                                                                                              • memcmp.MSVCRT(?,?,00000004,?,00000065,004381DF,00000065,00000000,00000007,?,00000000), ref: 0041F202
                                                                                                                              • memcmp.MSVCRT(?,SQLite format 3,00000010,?,00000065,004381DF,00000065,00000000), ref: 0041F22D
                                                                                                                              • memcmp.MSVCRT(?,@ ,00000003,?,?,00000065,004381DF,00000065,00000000), ref: 0041F299
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcmp
                                                                                                                              • String ID: @ $SQLite format 3
                                                                                                                              • API String ID: 1475443563-3708268960
                                                                                                                              • Opcode ID: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                                              • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                                                                              • Opcode Fuzzy Hash: bc797f5c287fbec082bfe36368e8bdb92b626008a1b8340b8f00afaa449410d4
                                                                                                                              • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                                              • memset.MSVCRT ref: 00414C87
                                                                                                                              • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                                                                              • wcscpy.MSVCRT ref: 00414CFC
                                                                                                                                • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                                                                              Strings
                                                                                                                              • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressCloseProcVersionmemsetwcscpy
                                                                                                                              • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                                                              • API String ID: 2705122986-2036018995
                                                                                                                              • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                              • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                                                                              • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                                                                              • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmpqsort
                                                                                                                              • String ID: /nosort$/sort
                                                                                                                              • API String ID: 1579243037-1578091866
                                                                                                                              • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                              • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                                                                              • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                                                                              • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040E60F
                                                                                                                              • memset.MSVCRT ref: 0040E629
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              Strings
                                                                                                                              • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                                                                              • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                                                                                              • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                                                                              • API String ID: 3354267031-2114579845
                                                                                                                              • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                              • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                                                                              • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                                                                              • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                                                                              APIs
                                                                                                                              • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                                                                                              • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                                                                              • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                                                                              • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Resource$FindLoadLockSizeof
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3473537107-0
                                                                                                                              • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                              • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                                                                              • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                                                                              • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??3@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 613200358-0
                                                                                                                              • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                              • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                                                                              • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                                                                              • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset
                                                                                                                              • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                                                                              • API String ID: 2221118986-1725073988
                                                                                                                              • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                              • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                                                                              • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                                                                              • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                                                                              APIs
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00412966,/deleteregkey,/savelangfile), ref: 004125C3
                                                                                                                              • DeleteObject.GDI32(00000000), ref: 004125E7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??3@DeleteObject
                                                                                                                              • String ID: r!A
                                                                                                                              • API String ID: 1103273653-628097481
                                                                                                                              • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                                              • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                                                                              • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                                                                              • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                                                                              APIs
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1033339047-0
                                                                                                                              • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                                              • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                                                                              • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                                                                                              • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                                                                                                • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                                                                                              • memcmp.MSVCRT(?,0044EC68,00000010,?,00000000,?), ref: 00444BA5
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$memcmp
                                                                                                                              • String ID: $$8
                                                                                                                              • API String ID: 2808797137-435121686
                                                                                                                              • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                              • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                                                                              • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                                                                              • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                                                                                • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                                                                                • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                                                                                                • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                                                                                • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                                                                                • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                                                                                • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                                                                                • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                                                                                • Part of subcall function 0040E01E: CloseHandle.KERNELBASE(?), ref: 0040E13E
                                                                                                                              • CloseHandle.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                                                                                                • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                                                                                • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                                                                                • Part of subcall function 0040E2AB: memcpy.MSVCRT(?,-00000121,00000008,0044E518,00000000,00000000,75572EE0), ref: 0040E3EC
                                                                                                                              • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                                                                              • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                                                                                                • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                                                                                • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                                                                                • Part of subcall function 0040E175: free.MSVCRT ref: 0040E28B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Handle$Close$ProcessViewmemset$CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintffreememcpywcschr
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1979745280-0
                                                                                                                              • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                              • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                                                                              • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                                                                              • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                                                                                • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                                                                                • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                                                                              • memset.MSVCRT ref: 00403A55
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memsetwcscatwcslen$free$AttributesFilememcpywcscpy
                                                                                                                              • String ID: history.dat$places.sqlite
                                                                                                                              • API String ID: 2641622041-467022611
                                                                                                                              • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                              • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                                                                              • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                                                                              • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                                                                                • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                                                                              • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                                                                                              • GetLastError.KERNEL32 ref: 00417627
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$File$PointerRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 839530781-0
                                                                                                                              • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                              • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                                                                              • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                                                                              • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileFindFirst
                                                                                                                              • String ID: *.*$index.dat
                                                                                                                              • API String ID: 1974802433-2863569691
                                                                                                                              • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                              • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                                                                              • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                                                                              • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                                                                              APIs
                                                                                                                              • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                                                                                              • GetLastError.KERNEL32 ref: 004175A2
                                                                                                                              • GetLastError.KERNEL32 ref: 004175A8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLast$FilePointer
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1156039329-0
                                                                                                                              • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                              • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                                                                              • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                                                                              • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                              • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                              • CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateHandleTime
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3397143404-0
                                                                                                                              • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                              • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                                                                              • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                                                                              • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                                                                              APIs
                                                                                                                              • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                                                                              • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Temp$DirectoryFileNamePathWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1125800050-0
                                                                                                                              • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                              • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                                                                              • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                                                                              • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                                                                              APIs
                                                                                                                              • Sleep.KERNEL32(00000064), ref: 004175D0
                                                                                                                              • CloseHandle.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseHandleSleep
                                                                                                                              • String ID: }A
                                                                                                                              • API String ID: 252777609-2138825249
                                                                                                                              • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                              • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                                                                              • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                                                                              • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                                                                              APIs
                                                                                                                              • malloc.MSVCRT ref: 00409A10
                                                                                                                              • memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                              • free.MSVCRT ref: 00409A31
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: freemallocmemcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3056473165-0
                                                                                                                              • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                                              • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                                                                              • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                                                                                              • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: d
                                                                                                                              • API String ID: 0-2564639436
                                                                                                                              • Opcode ID: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                                              • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                                                                              • Opcode Fuzzy Hash: b7bdb433cc21537495b9453c0ef7e1d4136cbb83a95eb0b3518e055101e122e1
                                                                                                                              • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset
                                                                                                                              • String ID: BINARY
                                                                                                                              • API String ID: 2221118986-907554435
                                                                                                                              • Opcode ID: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                                                                                              • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                                                                              • Opcode Fuzzy Hash: 423c094908dc07756a2ef734edd9c41c0411f3bff0f864234720e07ca5cd074c
                                                                                                                              • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmp
                                                                                                                              • String ID: /stext
                                                                                                                              • API String ID: 2081463915-3817206916
                                                                                                                              • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                              • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                                                                              • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                                                                              • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmp
                                                                                                                              • String ID: .Wu
                                                                                                                              • API String ID: 2081463915-3424199868
                                                                                                                              • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                              • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                                                                              • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                                                                              • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                                                                                • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                                                                              • CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2445788494-0
                                                                                                                              • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                              • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                                                                              • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                                                                              • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                              • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3150196962-0
                                                                                                                              • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                                              • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                                                                              • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                                                                                              • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: malloc
                                                                                                                              • String ID: failed to allocate %u bytes of memory
                                                                                                                              • API String ID: 2803490479-1168259600
                                                                                                                              • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                              • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                                                                              • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                                                                              • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0041BDDF
                                                                                                                              • memcmp.MSVCRT(00001388,?,00000010,?,00000065,00000065,?,?,?,?,?,0041F1B4,?,00000065,004381DF,00000065), ref: 0041BDF1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcmpmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1065087418-0
                                                                                                                              • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                              • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                                                                              • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                                                                              • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                                              • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                                                                              • CloseHandle.KERNELBASE(?), ref: 00410654
                                                                                                                                • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                                • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                                                                                • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                                                                                • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1381354015-0
                                                                                                                              • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                                              • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                                                                              • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                                                                                              • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004301AD
                                                                                                                              • memcpy.MSVCRT(000001A8,?,00000020,?,00000000,00000000,00443DCE,00000000,00000000,00000000,?,00445FAE,?), ref: 004301CD
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpymemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1297977491-0
                                                                                                                              • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                                                              • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                                                                                              • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                                                                                              • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1294909896-0
                                                                                                                              • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                                              • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                                                                                              • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                                                                                              • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                                                                                • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                                                                                • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                                                                                • Part of subcall function 0040A02C: CloseHandle.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                                                                                              • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$Time$CloseCompareCreateHandlememset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2154303073-0
                                                                                                                              • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                              • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                                                                              • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                                                                              • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3150196962-0
                                                                                                                              • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                                              • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                                                                                              • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                                                                                              • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                                                                                              APIs
                                                                                                                              • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$PointerRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3154509469-0
                                                                                                                              • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                              • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                                                                              • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                                                                              • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                                                                              APIs
                                                                                                                              • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                                                                                • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                                                                                • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                                                                                • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PrivateProfile$StringWrite_itowmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4232544981-0
                                                                                                                              • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                              • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                                                                              • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                                                                              • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                                                                              APIs
                                                                                                                              • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeLibrary
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3664257935-0
                                                                                                                              • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                              • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                                                                              • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                                                                              • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                                                                                                • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                                                                                              • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$FileModuleName
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3859505661-0
                                                                                                                              • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                              • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                                                                              • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                                                                              • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                                                                              APIs
                                                                                                                              • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2738559852-0
                                                                                                                              • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                              • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                                                                              • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                                                                              • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                                                                              APIs
                                                                                                                              • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileWrite
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3934441357-0
                                                                                                                              • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                              • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                                                                              • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                                                                              • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                                                                              APIs
                                                                                                                              • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeLibrary
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3664257935-0
                                                                                                                              • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                              • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                                                                              • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                                                                              • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateFile
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 823142352-0
                                                                                                                              • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                              • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                                                                              • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                                                                              • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateFile
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 823142352-0
                                                                                                                              • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                              • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                                                                              • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                                                                              • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                                                                              APIs
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??3@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 613200358-0
                                                                                                                              • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                              • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                                                                              • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                                                                              • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                                                                              APIs
                                                                                                                              • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeLibrary
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3664257935-0
                                                                                                                              • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                              • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                                                                              • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                                                                              • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                                                                              APIs
                                                                                                                              • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: EnumNamesResource
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3334572018-0
                                                                                                                              • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                              • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                                                                              • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                                                                              • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                                                                              APIs
                                                                                                                              • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FreeLibrary
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3664257935-0
                                                                                                                              • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                              • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                                                                              • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                                                                              • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                                                                              APIs
                                                                                                                              • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CloseFind
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1863332320-0
                                                                                                                              • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                              • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                                                                              • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                                                                              • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                                                                              APIs
                                                                                                                              • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Open
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 71445658-0
                                                                                                                              • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                              • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                                                                              • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                                                                              • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                                                                              APIs
                                                                                                                              • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AttributesFile
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3188754299-0
                                                                                                                              • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                              • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                                                                              • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                                                                              • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID:
                                                                                                                              • API String ID:
                                                                                                                              • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                              • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                                                                              • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                                                                              • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004095FC
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                                                                                • Part of subcall function 004091B8: memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,00000143,00000000), ref: 004092C9
                                                                                                                                • Part of subcall function 004091B8: memcmp.MSVCRT(00000000,0045A4F0,00000006,?,?,?,?,?,?,?,?,?,?,?,?,00000143), ref: 004092D9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3655998216-0
                                                                                                                              • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                              • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                                                                              • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                                                                              • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00445426
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                                                                                • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                                                                                • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                                                                                • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1828521557-0
                                                                                                                              • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                              • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                                                                              • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                                                                              • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                                • Part of subcall function 004062A6: SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                                                                                              • memcpy.MSVCRT(00000000,00000000,?,00000000,00000000,?,00000000,0040627C), ref: 00406942
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@FilePointermemcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 609303285-0
                                                                                                                              • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                              • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                                                                              • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                                                                              • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                              • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateErrorHandleLastRead
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2136311172-0
                                                                                                                              • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                              • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                                                                              • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                                                                              • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT(00000000,00401B44,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040B052
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,00000001,00401E7F), ref: 0040AFD8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@??3@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1936579350-0
                                                                                                                              • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                                              • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                                                                              • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                                                                                              • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1294909896-0
                                                                                                                              • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                                              • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                                                                              • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                                                                                              • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1294909896-0
                                                                                                                              • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                                              • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                                                                              • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                                                                                              • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1294909896-0
                                                                                                                              • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                                              • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                                                                                              • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                                                                                              • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                                                                                              APIs
                                                                                                                              • EmptyClipboard.USER32 ref: 004098EC
                                                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                                                                              • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 00409927
                                                                                                                              • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 0040994C
                                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                                                                              • GetLastError.KERNEL32 ref: 0040995D
                                                                                                                              • CloseHandle.KERNEL32(?), ref: 00409969
                                                                                                                              • GetLastError.KERNEL32 ref: 00409974
                                                                                                                              • CloseClipboard.USER32 ref: 0040997D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleLockReadSizeUnlock
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3604893535-0
                                                                                                                              • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                              • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                                                                              • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                                                                              • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                                                                              APIs
                                                                                                                              • EmptyClipboard.USER32 ref: 00409882
                                                                                                                              • wcslen.MSVCRT ref: 0040988F
                                                                                                                              • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                                                                              • GlobalLock.KERNEL32(00000000), ref: 004098AC
                                                                                                                              • memcpy.MSVCRT(00000000,?,00000002,?,?,?,00411A1E,-00000210), ref: 004098B5
                                                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 004098BE
                                                                                                                              • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                                                                              • CloseClipboard.USER32 ref: 004098D7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClipboardGlobal$AllocCloseDataEmptyLockUnlockmemcpywcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1213725291-0
                                                                                                                              • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                                              • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                                                                              • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                                                                              • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                                                                              APIs
                                                                                                                              • GetLastError.KERNEL32 ref: 004182D7
                                                                                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                                                                              • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                                                                              • LocalFree.KERNEL32(?), ref: 00418342
                                                                                                                              • free.MSVCRT ref: 00418370
                                                                                                                                • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                                                                                                • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FormatMessage$ByteCharErrorFreeLastLocalMultiVersionWidefreemalloc
                                                                                                                              • String ID: OsError 0x%x (%u)
                                                                                                                              • API String ID: 2360000266-2664311388
                                                                                                                              • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                                              • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                                                                              • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                                                                                              • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                                                                              APIs
                                                                                                                              • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Version
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1889659487-0
                                                                                                                              • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                                              • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                                                                              • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                                                                              • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                                                                              APIs
                                                                                                                              • _wcsicmp.MSVCRT ref: 004022A6
                                                                                                                              • _wcsicmp.MSVCRT ref: 004022D7
                                                                                                                              • _wcsicmp.MSVCRT ref: 00402305
                                                                                                                              • _wcsicmp.MSVCRT ref: 00402333
                                                                                                                                • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                                                                                • Part of subcall function 0040AA29: memcpy.MSVCRT(?,?,00000000,00000001,00401B3C,0044E518,?,00000001,00401B95,?,00401EE4), ref: 0040AA5B
                                                                                                                              • memset.MSVCRT ref: 0040265F
                                                                                                                              • memcpy.MSVCRT(?,?,00000011), ref: 0040269B
                                                                                                                                • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                                                                                                • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                                                                              • memcpy.MSVCRT(?,?,0000001C,?,?,00000000,?), ref: 004026FF
                                                                                                                              • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                                                                                              • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                                                                              • API String ID: 577499730-1134094380
                                                                                                                              • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                              • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                                                                              • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                                                                              • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                                                                              • String ID: :stringdata$ftp://$http://$https://
                                                                                                                              • API String ID: 2787044678-1921111777
                                                                                                                              • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                                              • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                                                                              • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                                                                              • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                                                                              • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                                                                              • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00414088
                                                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                                                                              • GetDC.USER32 ref: 004140E3
                                                                                                                              • wcslen.MSVCRT ref: 00414123
                                                                                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                                                                              • ReleaseDC.USER32(?,?), ref: 00414181
                                                                                                                              • _snwprintf.MSVCRT ref: 00414244
                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                                                                              • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                                                                              • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                                                                              • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                                                                              • GetClientRect.USER32(?,?), ref: 004142E1
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                                                                              • GetClientRect.USER32(?,?), ref: 0041433B
                                                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                                                                              • String ID: %s:$EDIT$STATIC
                                                                                                                              • API String ID: 2080319088-3046471546
                                                                                                                              • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                              • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                                                                              • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                                                                              • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                                                                              APIs
                                                                                                                              • EndDialog.USER32(?,?), ref: 00413221
                                                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                                                                              • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                                                                              • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                                                                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                                                                              • memset.MSVCRT ref: 00413292
                                                                                                                              • memset.MSVCRT ref: 004132B4
                                                                                                                              • memset.MSVCRT ref: 004132CD
                                                                                                                              • memset.MSVCRT ref: 004132E1
                                                                                                                              • memset.MSVCRT ref: 004132FB
                                                                                                                              • memset.MSVCRT ref: 00413310
                                                                                                                              • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                                                                              • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                                                                              • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                                                                              • memset.MSVCRT ref: 004133C0
                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                                                                              • memcpy.MSVCRT(?,0045AA90,0000021C), ref: 004133FC
                                                                                                                              • wcscpy.MSVCRT ref: 0041341F
                                                                                                                              • _snwprintf.MSVCRT ref: 0041348E
                                                                                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                                                                              • SetFocus.USER32(00000000), ref: 004134B7
                                                                                                                              Strings
                                                                                                                              • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                                                                              • {Unknown}, xrefs: 004132A6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                                                                              • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                                                                              • API String ID: 4111938811-1819279800
                                                                                                                              • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                              • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                                                                              • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                                                                              • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                                                                              • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                                                                              • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                                                                              • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                                                                              • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                                                                              • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                                                                              • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                                                                              • EndDialog.USER32(?,?), ref: 0040135E
                                                                                                                              • DeleteObject.GDI32(?), ref: 0040136A
                                                                                                                              • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                                                                              • ShowWindow.USER32(00000000), ref: 00401398
                                                                                                                              • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                                                                              • ShowWindow.USER32(00000000), ref: 004013A7
                                                                                                                              • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                                                                              • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                                                                              • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 829165378-0
                                                                                                                              • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                              • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                                                                              • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                                                                              • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00404172
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                                                                                • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                                                                                • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                                                                                • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              • wcscpy.MSVCRT ref: 004041D6
                                                                                                                              • wcscpy.MSVCRT ref: 004041E7
                                                                                                                              • memset.MSVCRT ref: 00404200
                                                                                                                              • memset.MSVCRT ref: 00404215
                                                                                                                              • _snwprintf.MSVCRT ref: 0040422F
                                                                                                                              • wcscpy.MSVCRT ref: 00404242
                                                                                                                              • memset.MSVCRT ref: 0040426E
                                                                                                                              • memset.MSVCRT ref: 004042CD
                                                                                                                              • memset.MSVCRT ref: 004042E2
                                                                                                                              • _snwprintf.MSVCRT ref: 004042FE
                                                                                                                              • wcscpy.MSVCRT ref: 00404311
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                                                                              • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                                                                              • API String ID: 2454223109-1580313836
                                                                                                                              • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                              • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                                                                              • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                                                                              • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                                                                                              • SetMenu.USER32(?,00000000), ref: 00411453
                                                                                                                              • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                                                                                              • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                                                                                              • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                                                                                              • memcpy.MSVCRT(?,?,00002008,/nosaveload,00000000,00000001), ref: 004115C8
                                                                                                                              • ShowWindow.USER32(?,?), ref: 004115FE
                                                                                                                              • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                                                                              • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                                                                              • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                                                                              • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                                                                                              • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                                                                                                • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                                                                                • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                                                                                              • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                                                                                              • API String ID: 4054529287-3175352466
                                                                                                                              • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                              • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                                                                                              • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                                                                                              • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscat$_snwprintfmemset$wcscpy
                                                                                                                              • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                                                                                              • API String ID: 3143752011-1996832678
                                                                                                                              • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                                                              • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                                                                                              • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                                                                                              • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                                                                              • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                                                                                              • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                                                                                              • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                                                                                              • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                                                                                              • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                                                                                              • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                                                                                              • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                                                                                              • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                              • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                                                                              • API String ID: 667068680-2887671607
                                                                                                                              • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                              • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                                                                              • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                                                                              • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                                                                              • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                                                                              • API String ID: 1607361635-601624466
                                                                                                                              • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                                                              • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                                                                              • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                                                                              • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintf$memset$wcscpy
                                                                                                                              • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                                                                              • API String ID: 2000436516-3842416460
                                                                                                                              • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                              • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                                                                              • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                                                                              • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                                                                                • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                                                                                • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                                • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                                • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                                • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                                • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                                • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                                                                              • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                                                                              • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                                                                              • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                                                                              • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                                                                              • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                                                                              • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                                                                              • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                                                                              • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                                                                              • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1043902810-0
                                                                                                                              • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                              • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                                                                              • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                                                                              • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                                                                              APIs
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                                              • _snwprintf.MSVCRT ref: 0044488A
                                                                                                                              • wcscpy.MSVCRT ref: 004448B4
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,00000000,?,OriginalFileName,00000000,?,LegalCopyright,00000000,?,InternalName,00000000,?,CompanyName,00000000,?,ProductVersion), ref: 00444964
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@??3@_snwprintfwcscpy
                                                                                                                              • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                                                                              • API String ID: 2899246560-1542517562
                                                                                                                              • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                                                              • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                                                                              • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                                                                                              • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040DBCD
                                                                                                                              • memset.MSVCRT ref: 0040DBE9
                                                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                                • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT(?,?,0040DC1B,?,00000000), ref: 0044480A
                                                                                                                                • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                                                                                                • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                                                                                              • wcscpy.MSVCRT ref: 0040DC2D
                                                                                                                              • wcscpy.MSVCRT ref: 0040DC3C
                                                                                                                              • wcscpy.MSVCRT ref: 0040DC4C
                                                                                                                              • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                                                                                              • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                                                                                              • wcscpy.MSVCRT ref: 0040DCC3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                                                                                              • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                                                                                              • API String ID: 3330709923-517860148
                                                                                                                              • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                                                              • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                                                                                              • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                                                                                              • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                                                                                • Part of subcall function 0040CC26: CloseHandle.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                                                                                                • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                                                                              • memset.MSVCRT ref: 0040806A
                                                                                                                              • memset.MSVCRT ref: 0040807F
                                                                                                                              • _wtoi.MSVCRT(00000000,00000000,00000136,00000000,00000135,00000000,00000134,00000000,00000133,00000000,00000132,00000000,00000131,00000000,00000130,00000000), ref: 004081AF
                                                                                                                              • _wcsicmp.MSVCRT ref: 004081C3
                                                                                                                              • memset.MSVCRT ref: 004081E4
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                                                                                                • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                                                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                                                                                                • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                                                • Part of subcall function 00407E1E: _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                                                • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                                                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                                                • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$CloseFileHandleSize_wtoi_wtoi64wcscpy
                                                                                                                              • String ID: logins$null
                                                                                                                              • API String ID: 2148543256-2163367763
                                                                                                                              • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                                                              • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                                                                                              • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                                                                                              • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000001,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 0040859D
                                                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                              • memset.MSVCRT ref: 004085CF
                                                                                                                              • memset.MSVCRT ref: 004085F1
                                                                                                                              • memset.MSVCRT ref: 00408606
                                                                                                                              • strcmp.MSVCRT ref: 00408645
                                                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086DB
                                                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?), ref: 004086FA
                                                                                                                              • memset.MSVCRT ref: 0040870E
                                                                                                                              • strcmp.MSVCRT ref: 0040876B
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000001E), ref: 0040879D
                                                                                                                              • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                                                                              • String ID: ---
                                                                                                                              • API String ID: 3437578500-2854292027
                                                                                                                              • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                                              • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                                                                              • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                                                                                              • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0041087D
                                                                                                                              • memset.MSVCRT ref: 00410892
                                                                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                                                                              • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                                                                              • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                                                                              • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                                                                              • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                                                                              • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                                                                              • GetSysColor.USER32(0000000F), ref: 00410999
                                                                                                                              • DeleteObject.GDI32(?), ref: 004109D0
                                                                                                                              • DeleteObject.GDI32(?), ref: 004109D6
                                                                                                                              • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1010922700-0
                                                                                                                              • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                                              • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                                                                              • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                                                                              • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                                                                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                                                                              • malloc.MSVCRT ref: 004186B7
                                                                                                                              • free.MSVCRT ref: 004186C7
                                                                                                                              • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                                                                              • free.MSVCRT ref: 004186E0
                                                                                                                              • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                                                                              • malloc.MSVCRT ref: 004186FE
                                                                                                                              • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                                                                              • free.MSVCRT ref: 00418716
                                                                                                                              • free.MSVCRT ref: 0041872A
                                                                                                                              • free.MSVCRT ref: 00418749
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$FullNamePath$malloc$Version
                                                                                                                              • String ID: |A
                                                                                                                              • API String ID: 3356672799-1717621600
                                                                                                                              • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                                              • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                                                                              • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                                                                                              • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmp
                                                                                                                              • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                                                                              • API String ID: 2081463915-1959339147
                                                                                                                              • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                                              • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                                                                              • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                                                                              • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                                                                                              • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                              • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                                                                              • API String ID: 2012295524-70141382
                                                                                                                              • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                                              • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                                                                              • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                                                                                              • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                                                                              • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                                                                                              • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$HandleModule
                                                                                                                              • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                                                                              • API String ID: 667068680-3953557276
                                                                                                                              • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                              • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                                                                              • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                                                                              • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                                                                              APIs
                                                                                                                              • GetDC.USER32(00000000), ref: 004121FF
                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                                                                              • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                                                                              • SelectObject.GDI32(?,?), ref: 00412251
                                                                                                                              • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                                                                              • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                                                                                • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                                                                                • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                                                                                • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                                                                              • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                                                                              • SetCursor.USER32(00000000), ref: 004122BC
                                                                                                                              • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                                                                              • memcpy.MSVCRT(?,?,00002008), ref: 0041234D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1700100422-0
                                                                                                                              • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                              • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                                                                              • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                                                                              • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                                                                              APIs
                                                                                                                              • GetClientRect.USER32(?,?), ref: 004111E0
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                                                                              • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                                                                              • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                                                                              • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                                                                              • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                                                                              • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                                                                              • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 552707033-0
                                                                                                                              • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                              • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                                                                              • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                                                                              • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                                                                              APIs
                                                                                                                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                                                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                                                                                • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                                                                                • Part of subcall function 0040BFF3: memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                              • memcpy.MSVCRT(00000000,?,00000004,00000000,?,?,?,?), ref: 0040C11B
                                                                                                                              • strchr.MSVCRT ref: 0040C140
                                                                                                                              • strchr.MSVCRT ref: 0040C151
                                                                                                                              • _strlwr.MSVCRT ref: 0040C15F
                                                                                                                              • memset.MSVCRT ref: 0040C17A
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                                                                                              • String ID: 4$h
                                                                                                                              • API String ID: 4066021378-1856150674
                                                                                                                              • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                              • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                                                                              • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                                                                              • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$_snwprintf
                                                                                                                              • String ID: %%0.%df
                                                                                                                              • API String ID: 3473751417-763548558
                                                                                                                              • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                                              • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                                                                              • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                                                                              • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                                                                              APIs
                                                                                                                              • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                                                                              • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                                                                              • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                                                                              • GetTickCount.KERNEL32 ref: 0040610B
                                                                                                                              • GetParent.USER32(?), ref: 00406136
                                                                                                                              • SendMessageW.USER32(00000000), ref: 0040613D
                                                                                                                              • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                                                                              • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                                                                              • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                                                                              • String ID: A
                                                                                                                              • API String ID: 2892645895-3554254475
                                                                                                                              • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                              • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                                                                              • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                                                                              • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                                                                              APIs
                                                                                                                              • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                                                                                • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                                                                                • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                                                                                • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                                                                                • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                                                                              • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                                                                              • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                                                                              • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                                                                              • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                                                                              • memset.MSVCRT ref: 0040DA23
                                                                                                                              • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                                                                              • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                                                                              • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                                                                                • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                                                                              • String ID: caption
                                                                                                                              • API String ID: 973020956-4135340389
                                                                                                                              • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                                              • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                                                                              • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                                                                              • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                                                                              • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                                                                              • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                                                                              • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$_snwprintf$wcscpy
                                                                                                                              • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                                                                              • API String ID: 1283228442-2366825230
                                                                                                                              • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                                              • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                                                                              • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                                                                              • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                                                                              APIs
                                                                                                                              • wcschr.MSVCRT ref: 00413972
                                                                                                                              • wcscpy.MSVCRT ref: 00413982
                                                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                                              • wcscpy.MSVCRT ref: 004139D1
                                                                                                                              • wcscat.MSVCRT ref: 004139DC
                                                                                                                              • memset.MSVCRT ref: 004139B8
                                                                                                                                • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                                                                                • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                                                                              • memset.MSVCRT ref: 00413A00
                                                                                                                              • memcpy.MSVCRT(?,?,00000004,?,?,00000000,00000208,?), ref: 00413A1B
                                                                                                                              • wcscat.MSVCRT ref: 00413A27
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                                                                              • String ID: \systemroot
                                                                                                                              • API String ID: 4173585201-1821301763
                                                                                                                              • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                                              • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                                                                              • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                                                                              • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscpy
                                                                                                                              • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                                                                                              • API String ID: 1284135714-318151290
                                                                                                                              • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                                                              • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                                                                                              • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                                                                                              • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                                                                              • String ID: 0$6
                                                                                                                              • API String ID: 4066108131-3849865405
                                                                                                                              • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                              • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                                                                              • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                                                                              • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004082EF
                                                                                                                                • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                                                                              • memset.MSVCRT ref: 00408362
                                                                                                                              • memset.MSVCRT ref: 00408377
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$ByteCharMultiWide
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 290601579-0
                                                                                                                              • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                                              • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                                                                              • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                                                                                              • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                                                                              APIs
                                                                                                                              • memchr.MSVCRT ref: 00444EBF
                                                                                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                              • memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                              • memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                              • memcpy.MSVCRT(?,0044EB0C,0000000B), ref: 00444FAF
                                                                                                                              • memcpy.MSVCRT(?,00000001,00000008), ref: 00444FC1
                                                                                                                              • memcpy.MSVCRT(PD,?,00000008,?,?), ref: 00445010
                                                                                                                              • memset.MSVCRT ref: 0044505E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memchrmemset
                                                                                                                              • String ID: PD$PD
                                                                                                                              • API String ID: 1581201632-2312785699
                                                                                                                              • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                                                              • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                                                                                              • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                                                                                              • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                                                                                              APIs
                                                                                                                              • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                                                                                              • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                                                                                              • GetDC.USER32(00000000), ref: 00409F6E
                                                                                                                              • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                                                                                              • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                                                                                              • GetParent.USER32(?), ref: 00409FA5
                                                                                                                              • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                                                                                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2163313125-0
                                                                                                                              • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                                              • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                                                                                              • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                                                                                              • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$wcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3592753638-3916222277
                                                                                                                              • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                                              • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                                                                              • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                                                                                              • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040A47B
                                                                                                                              • _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                              • wcslen.MSVCRT ref: 0040A4BA
                                                                                                                              • memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                              • wcslen.MSVCRT ref: 0040A4E0
                                                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpywcslen$_snwprintfmemset
                                                                                                                              • String ID: %s (%s)$YV@
                                                                                                                              • API String ID: 3979103747-598926743
                                                                                                                              • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                                              • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                                                                              • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                                                                              • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                                                                              APIs
                                                                                                                              • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                                                                              • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                                                                              • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$AddressFreeLoadMessageProc
                                                                                                                              • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                                                                              • API String ID: 2780580303-317687271
                                                                                                                              • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                              • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                                                                              • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                                                                              • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                                                                              APIs
                                                                                                                              • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                                                                              • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                                                                              • wcslen.MSVCRT ref: 0040A6B1
                                                                                                                              • wcscpy.MSVCRT ref: 0040A6C1
                                                                                                                              • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                                                                              • wcscpy.MSVCRT ref: 0040A6DB
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                                                                              • String ID: Unknown Error$netmsg.dll
                                                                                                                              • API String ID: 2767993716-572158859
                                                                                                                              • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                                              • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                                                                              • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                                                                              • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                                                                              • wcscpy.MSVCRT ref: 0040DAFB
                                                                                                                              • wcscpy.MSVCRT ref: 0040DB0B
                                                                                                                              • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                                                                                • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                                                                              • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                                                                              • API String ID: 3176057301-2039793938
                                                                                                                              • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                                                              • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                                                                              • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                                                                              • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              • database %s is already in use, xrefs: 0042F6C5
                                                                                                                              • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                                                                              • unable to open database: %s, xrefs: 0042F84E
                                                                                                                              • out of memory, xrefs: 0042F865
                                                                                                                              • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                                                                              • too many attached databases - max %d, xrefs: 0042F64D
                                                                                                                              • database is already attached, xrefs: 0042F721
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpymemset
                                                                                                                              • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                                                              • API String ID: 1297977491-2001300268
                                                                                                                              • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                                              • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                                                                              • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                                                                              • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EB3F
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,00000000), ref: 0040EB5B
                                                                                                                              • memcpy.MSVCRT(?,0045A248,00000014), ref: 0040EB80
                                                                                                                              • memcpy.MSVCRT(?,0045A234,00000014,?,0045A248,00000014), ref: 0040EB94
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC17
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C,00000000), ref: 0040EC21
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040EC59
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                                                                              • String ID: ($d
                                                                                                                              • API String ID: 1140211610-1915259565
                                                                                                                              • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                                                                                              • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                                                                              • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                                                                                              • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                                                                              APIs
                                                                                                                              • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                                                                              • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                                                                              • GetLastError.KERNEL32 ref: 004178FB
                                                                                                                              • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$ErrorLastLockSleepUnlock
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3015003838-0
                                                                                                                              • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                              • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                                                                              • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                                                                              • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00407E44
                                                                                                                              • memset.MSVCRT ref: 00407E5B
                                                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407E7E
                                                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407ED7
                                                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407EEE
                                                                                                                              • _mbscpy.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00407F01
                                                                                                                              • wcscpy.MSVCRT ref: 00407F10
                                                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 59245283-0
                                                                                                                              • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                                                              • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                                                                                              • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                                                                                              • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                                                                                              APIs
                                                                                                                              • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                                                                                              • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                                                                              • GetLastError.KERNEL32 ref: 0041855C
                                                                                                                              • Sleep.KERNEL32(00000064), ref: 00418571
                                                                                                                              • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                                                                                              • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                                                                              • GetLastError.KERNEL32 ref: 0041858E
                                                                                                                              • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                                                                              • free.MSVCRT ref: 004185AC
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$AttributesDeleteErrorLastSleep$free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2802642348-0
                                                                                                                              • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                                              • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                                                                              • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                                                                                              • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(004032AB,&quot;,0000000C,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EB6
                                                                                                                              • memcpy.MSVCRT(004032AB,&amp;,0000000A,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EE2
                                                                                                                              • memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy
                                                                                                                              • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                                                                                              • API String ID: 3510742995-3273207271
                                                                                                                              • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                                              • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                                                                                              • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                                                                                              • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                                                                                              APIs
                                                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                                                                              • memset.MSVCRT ref: 00413ADC
                                                                                                                              • memset.MSVCRT ref: 00413AEC
                                                                                                                                • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                                                                              • memset.MSVCRT ref: 00413BD7
                                                                                                                              • wcscpy.MSVCRT ref: 00413BF8
                                                                                                                              • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                                                                              • String ID: 3A
                                                                                                                              • API String ID: 3300951397-293699754
                                                                                                                              • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                                                              • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                                                                              • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                                                                              • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                              • wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                                                                                • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                                                                              • wcslen.MSVCRT ref: 0040D1D3
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                              • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                              • memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,0040D142,00402E6F), ref: 0040D0CC
                                                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,0040D142,00402E6F), ref: 0040D0EA
                                                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D108
                                                                                                                                • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT(00000000,00000000,00000000,00000000,0040D142,00402E6F), ref: 0040D126
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                                                                              • String ID: strings
                                                                                                                              • API String ID: 3166385802-3030018805
                                                                                                                              • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                              • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                                                                              • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                                                                              • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00411AF6
                                                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                              • wcsrchr.MSVCRT ref: 00411B14
                                                                                                                              • wcscat.MSVCRT ref: 00411B2E
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                                                                              • String ID: AE$.cfg$General$EA
                                                                                                                              • API String ID: 776488737-1622828088
                                                                                                                              • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                                                              • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                                                                              • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                                                                              • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040D8BD
                                                                                                                              • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                                                                              • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                                                                              • memset.MSVCRT ref: 0040D906
                                                                                                                              • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                                                                              • _wcsicmp.MSVCRT ref: 0040D92F
                                                                                                                                • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                                                                                • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                                                                              • String ID: sysdatetimepick32
                                                                                                                              • API String ID: 1028950076-4169760276
                                                                                                                              • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                                              • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                                                                              • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                                                                              • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(00000000,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B911
                                                                                                                              • memcpy.MSVCRT(?,00000000,00000000,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B923
                                                                                                                              • memcpy.MSVCRT(?,-journal,00000008,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B93B
                                                                                                                              • memcpy.MSVCRT(?,00000000,00000000,?,?,?,?,?,?,00000000,00000000,00000000,?,0041EF66,00000000,00000000), ref: 0041B958
                                                                                                                              • memcpy.MSVCRT(?,-wal,00000004,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 0041B970
                                                                                                                              • memset.MSVCRT ref: 0041BA3D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memset
                                                                                                                              • String ID: -journal$-wal
                                                                                                                              • API String ID: 438689982-2894717839
                                                                                                                              • Opcode ID: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                                                                                                              • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                                                                              • Opcode Fuzzy Hash: dbb6fae49c61f74d6f433767b436fbd9ec9999f6e4b570cef93805d1319e1532
                                                                                                                              • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                                                                              • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                                                                              • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                                                                                • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                                                                                • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                                                                              • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                                                                              • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Item$Dialog$MessageSend
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3975816621-0
                                                                                                                              • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                                              • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                                                                              • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                                                                              • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                                                                              APIs
                                                                                                                              • _wcsicmp.MSVCRT ref: 00444D09
                                                                                                                              • _wcsicmp.MSVCRT ref: 00444D1E
                                                                                                                              • _wcsicmp.MSVCRT ref: 00444D33
                                                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                                                                                • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                                                                                • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmp$wcslen$_memicmp
                                                                                                                              • String ID: .save$http://$https://$log profile$signIn
                                                                                                                              • API String ID: 1214746602-2708368587
                                                                                                                              • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                                                              • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                                                                                              • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                                                                                              • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                                                                                              APIs
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000C), ref: 00405DE1
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 00405DFD
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E23
                                                                                                                              • memset.MSVCRT ref: 00405E33
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?), ref: 00405E62
                                                                                                                              • InvalidateRect.USER32(?,00000000,00000000,?,?,?,?), ref: 00405EAF
                                                                                                                              • SetFocus.USER32(?,?,?,?), ref: 00405EB8
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?), ref: 00405EC8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2313361498-0
                                                                                                                              • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                                                                                              • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                                                                                              • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                                                                                              • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                                                                                              APIs
                                                                                                                              • GetClientRect.USER32(?,?), ref: 00405F65
                                                                                                                              • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                                                                                              • GetWindow.USER32(00000000), ref: 00405F80
                                                                                                                                • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                                                                                              • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                                                                                              • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                                                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                                                                                              • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                                                                                              • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$ItemMessageRectSend$Client
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2047574939-0
                                                                                                                              • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                                                              • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                                                                                              • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                                                                                              • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                                                                                              APIs
                                                                                                                              • GetSystemTime.KERNEL32(?), ref: 00418836
                                                                                                                              • memcpy.MSVCRT(?,?,00000010), ref: 00418845
                                                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00418856
                                                                                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418869
                                                                                                                              • GetTickCount.KERNEL32 ref: 0041887D
                                                                                                                              • memcpy.MSVCRT(?,?,00000004), ref: 00418890
                                                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 004188A6
                                                                                                                              • memcpy.MSVCRT(?,?,00000008), ref: 004188B6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4218492932-0
                                                                                                                              • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                              • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                                                                              • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                                                                              • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                                                                                • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                                • Part of subcall function 0044A6E0: memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A8BF
                                                                                                                              • memcpy.MSVCRT(?,?,00000004,00000000), ref: 0044A90C
                                                                                                                              • memcpy.MSVCRT(?,?,00000040), ref: 0044A988
                                                                                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000040,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A422
                                                                                                                                • Part of subcall function 0044A3F0: memcpy.MSVCRT(?,0044A522,00000008,?,?,?,0044A522,?,?,?,?,0044A93F,?,?,?,00000000), ref: 0044A46E
                                                                                                                              • memcpy.MSVCRT(?,?,00000000), ref: 0044A9D8
                                                                                                                              • memcpy.MSVCRT(?,?,00000020,?,?,?,?,00000000), ref: 0044AA19
                                                                                                                              • memcpy.MSVCRT(00000000,?,00000020,?,?,?,?,?,?,?,00000000), ref: 0044AA4A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memset
                                                                                                                              • String ID: gj
                                                                                                                              • API String ID: 438689982-4203073231
                                                                                                                              • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                              • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                                                                              • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                                                                              • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(00000000,?,00000000,00000000,00000000), ref: 00430D77
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy
                                                                                                                              • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                                                                                              • API String ID: 3510742995-2446657581
                                                                                                                              • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                                              • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                                                                                              • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                                                                                              • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                                                                              • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                                                                              • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                                                                              • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                                                                              • memset.MSVCRT ref: 00405ABB
                                                                                                                              • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                                                                              • SetFocus.USER32(?), ref: 00405B76
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$FocusItemmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4281309102-0
                                                                                                                              • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                                              • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                                                                              • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                                                                              • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintfwcscat
                                                                                                                              • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                                                                              • API String ID: 384018552-4153097237
                                                                                                                              • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                                                              • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                                                                              • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                                                                              • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ItemMenu$CountInfomemsetwcschr
                                                                                                                              • String ID: 0$6
                                                                                                                              • API String ID: 2029023288-3849865405
                                                                                                                              • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                                              • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                                                                              • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                                                                              • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                                                                              • memset.MSVCRT ref: 00405455
                                                                                                                              • memset.MSVCRT ref: 0040546C
                                                                                                                              • memset.MSVCRT ref: 00405483
                                                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00405498
                                                                                                                              • memcpy.MSVCRT(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004054AD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$memcpy$ErrorLast
                                                                                                                              • String ID: 6$\
                                                                                                                              • API String ID: 404372293-1284684873
                                                                                                                              • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                                              • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                                                                              • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                                                                              • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                                                                              APIs
                                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                                                                              • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                                                                              • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                                                                              • wcscpy.MSVCRT ref: 0040A0D9
                                                                                                                              • wcscat.MSVCRT ref: 0040A0E6
                                                                                                                              • wcscat.MSVCRT ref: 0040A0F5
                                                                                                                              • wcscpy.MSVCRT ref: 0040A107
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1331804452-0
                                                                                                                              • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                              • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                                                                              • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                                                                              • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                                                                                              • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                                                                              • String ID: advapi32.dll
                                                                                                                              • API String ID: 2012295524-4050573280
                                                                                                                              • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                                              • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                                                                                              • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                                                                                              • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                                                                              • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                                                                              • <%s>, xrefs: 004100A6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$_snwprintf
                                                                                                                              • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                                                                              • API String ID: 3473751417-2880344631
                                                                                                                              • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                              • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                                                                              • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                                                                              • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscat$_snwprintfmemset
                                                                                                                              • String ID: %2.2X
                                                                                                                              • API String ID: 2521778956-791839006
                                                                                                                              • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                              • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                                                                              • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                                                                              • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintfwcscpy
                                                                                                                              • String ID: dialog_%d$general$menu_%d$strings
                                                                                                                              • API String ID: 999028693-502967061
                                                                                                                              • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                                              • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                                                                              • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                                                                              • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                                                                              APIs
                                                                                                                              • strlen.MSVCRT ref: 00408DFA
                                                                                                                                • Part of subcall function 00408D18: memcpy.MSVCRT(?,?,00000008,00000008,00000010,00000040,?,?), ref: 00408D44
                                                                                                                              • memset.MSVCRT ref: 00408E46
                                                                                                                              • memcpy.MSVCRT(00000000,?,?,00000000,00000000,00000000), ref: 00408E59
                                                                                                                              • memcpy.MSVCRT(?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408E6C
                                                                                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,?,?,00000000,?,00000000,00000000,?,00000000), ref: 00408EB2
                                                                                                                              • memcpy.MSVCRT(?,?,?,00000000,?,00000000,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00408EC5
                                                                                                                              • memcpy.MSVCRT(00000000,00000000,00000014,?,00000000,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408EF2
                                                                                                                              • memcpy.MSVCRT(?,00000000,00000014,00000000,00000060,00000000,?,?,?,00000000,?,00000000), ref: 00408F07
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memsetstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2350177629-0
                                                                                                                              • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                                                              • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                                                                                              • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                                                                                              • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset
                                                                                                                              • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                                                                                              • API String ID: 2221118986-1606337402
                                                                                                                              • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                                                              • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                                                                                              • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                                                                                              • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                                                                                              APIs
                                                                                                                              • _mbscpy.MSVCRT(?,00000000,00000000,?,00000001), ref: 00408F50
                                                                                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,?,?,00000010,?,00000000,?,00000001), ref: 00408FB3
                                                                                                                              • memset.MSVCRT ref: 00408FD4
                                                                                                                              • memcmp.MSVCRT(?,?,00000010,0040951D,?,?,00000010,?,00000000,?,00000001), ref: 00409025
                                                                                                                              • memset.MSVCRT ref: 00409042
                                                                                                                              • memcpy.MSVCRT(?,?,00000018,00000001,?,?,00000020,?,?,?,?,00000000,?,00000001), ref: 00409079
                                                                                                                                • Part of subcall function 00408C3C: strlen.MSVCRT ref: 00408C96
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 265355444-0
                                                                                                                              • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                                                              • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                                                                                              • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                                                                                              • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1AE
                                                                                                                                • Part of subcall function 0040B1AB: free.MSVCRT ref: 0040B1B6
                                                                                                                                • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                                                                                • Part of subcall function 0040A9CE: free.MSVCRT ref: 0040A9DD
                                                                                                                              • memset.MSVCRT ref: 0040C439
                                                                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                                                                              • _wcsupr.MSVCRT ref: 0040C481
                                                                                                                                • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A908
                                                                                                                                • Part of subcall function 0040A8D0: free.MSVCRT ref: 0040A92B
                                                                                                                                • Part of subcall function 0040A8D0: memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                              • memset.MSVCRT ref: 0040C4D0
                                                                                                                              • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4131475296-0
                                                                                                                              • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                                                              • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                                                                              • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                                                                              • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004116FF
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                                • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                              • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                                                                              • API String ID: 2618321458-3614832568
                                                                                                                              • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                                              • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                                                                              • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                                                                              • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: AttributesFilefreememset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2507021081-0
                                                                                                                              • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                                              • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                                                                              • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                                                                                              • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                                                                              APIs
                                                                                                                              • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                                                                              • malloc.MSVCRT ref: 00417524
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                                                                              • free.MSVCRT ref: 00417544
                                                                                                                              • free.MSVCRT ref: 00417562
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWidefree$ApisFilemalloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4131324427-0
                                                                                                                              • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                                              • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                                                                              • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                                                                                              • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                                                                              APIs
                                                                                                                              • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                                                                                              • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                                                                                              • free.MSVCRT ref: 0041822B
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PathTemp$free
                                                                                                                              • String ID: %s\etilqs_$etilqs_
                                                                                                                              • API String ID: 924794160-1420421710
                                                                                                                              • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                                              • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                                                                              • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                                                                                              • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040FDD5
                                                                                                                                • Part of subcall function 00414E7F: memcpy.MSVCRT(004032AD,&lt;,00000008,?,?,00000000,0040FDF6,?,?,?,<item>), ref: 00414EFC
                                                                                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                              • _snwprintf.MSVCRT ref: 0040FE1F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                                                                                              • String ID: <%s>%s</%s>$</item>$<item>
                                                                                                                              • API String ID: 1775345501-2769808009
                                                                                                                              • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                                                              • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                                                                                              • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                                                                                              • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                                                                                              APIs
                                                                                                                              • wcscpy.MSVCRT ref: 0041477F
                                                                                                                              • wcscpy.MSVCRT ref: 0041479A
                                                                                                                              • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscpy$CloseCreateFileHandle
                                                                                                                              • String ID: General
                                                                                                                              • API String ID: 999786162-26480598
                                                                                                                              • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                                              • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                                                                              • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                                                                              • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ErrorLastMessage_snwprintf
                                                                                                                              • String ID: Error$Error %d: %s
                                                                                                                              • API String ID: 313946961-1552265934
                                                                                                                              • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                                              • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                                                                              • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                                                                              • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID:
                                                                                                                              • String ID: foreign key constraint failed$new$oid$old
                                                                                                                              • API String ID: 0-1953309616
                                                                                                                              • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                                              • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                                                                              • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                                                                              • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                                                                              • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                                                                              • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy
                                                                                                                              • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                                                                              • API String ID: 3510742995-272990098
                                                                                                                              • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                              • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                                                                              • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                                                                              • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0044A6EB
                                                                                                                              • memset.MSVCRT ref: 0044A6FB
                                                                                                                              • memcpy.MSVCRT(?,?,?,00000000,?,?,00000000,?,?,00000000), ref: 0044A75D
                                                                                                                              • memcpy.MSVCRT(?,?,?,?,?,00000000,?,?,00000000), ref: 0044A7AA
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpymemset
                                                                                                                              • String ID: gj
                                                                                                                              • API String ID: 1297977491-4203073231
                                                                                                                              • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                                              • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                                                                              • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                                                                              • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                                • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E961
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E974
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000001,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E987
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,00411CA8,00000000,?,00412766,00000000,00000000), ref: 0040E99A
                                                                                                                              • free.MSVCRT ref: 0040E9D3
                                                                                                                                • Part of subcall function 0040AA04: free.MSVCRT ref: 0040AA0B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??3@$free
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2241099983-0
                                                                                                                              • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                                              • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                                                                              • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                                                                                              • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                                                                              APIs
                                                                                                                              • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                                                                              • malloc.MSVCRT ref: 004174BD
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                                                                              • free.MSVCRT ref: 004174E4
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$ApisFilefreemalloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4053608372-0
                                                                                                                              • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                                              • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                                                                              • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                                                                                              • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                                                                              APIs
                                                                                                                              • GetParent.USER32(?), ref: 0040D453
                                                                                                                              • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                                                                              • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                                                                              • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                                                                              • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Window$Rect$ClientParentPoints
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 4247780290-0
                                                                                                                              • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                              • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                                                                              • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                                                                              • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(0000000A,?,?,00000104), ref: 004450BE
                                                                                                                              • memset.MSVCRT ref: 004450CD
                                                                                                                                • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00000104), ref: 004450F0
                                                                                                                                • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,0044EB0C,0000000B,?,?,?,00000000,00000000,00000000), ref: 00444F63
                                                                                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,00000001,00000008,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00444F75
                                                                                                                                • Part of subcall function 00444E84: memcpy.MSVCRT(?,?,00000010,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00444F9D
                                                                                                                              • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1471605966-0
                                                                                                                              • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                                              • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                                                                              • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                                                                                              • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                                                                              APIs
                                                                                                                              • wcscpy.MSVCRT ref: 0044475F
                                                                                                                              • wcscat.MSVCRT ref: 0044476E
                                                                                                                              • wcscat.MSVCRT ref: 0044477F
                                                                                                                              • wcscat.MSVCRT ref: 0044478E
                                                                                                                                • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                                                                                • Part of subcall function 004099C6: memcpy.MSVCRT(?,?,00000104,?,0040BAA5,00445FAE), ref: 004099E3
                                                                                                                                • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?,004447CD,?,?,?,00000000,?), ref: 00409AA5
                                                                                                                                • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                                                                              • String ID: \StringFileInfo\
                                                                                                                              • API String ID: 102104167-2245444037
                                                                                                                              • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                                              • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                                                                              • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                                                                              • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                                                                              APIs
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8EC
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E8FA
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E90B
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E922
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT(?,?,?,0040EB18), ref: 0040E92B
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??3@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 613200358-0
                                                                                                                              • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                              • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                                                                              • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                                                                              • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _memicmpwcslen
                                                                                                                              • String ID: @@@@$History
                                                                                                                              • API String ID: 1872909662-685208920
                                                                                                                              • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                                                              • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                                                                              • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                                                                              • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004100FB
                                                                                                                              • memset.MSVCRT ref: 00410112
                                                                                                                                • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                                                                                • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                                                                              • _snwprintf.MSVCRT ref: 00410141
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                                                                              • String ID: </%s>
                                                                                                                              • API String ID: 3400436232-259020660
                                                                                                                              • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                              • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                                                                              • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                                                                              • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040D58D
                                                                                                                              • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                                                                              • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ChildEnumTextWindowWindowsmemset
                                                                                                                              • String ID: caption
                                                                                                                              • API String ID: 1523050162-4135340389
                                                                                                                              • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                                              • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                                                                              • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                                                                              • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                                                                                • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                                                                              • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                                                                              • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                                                                              • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                                                                              • String ID: MS Sans Serif
                                                                                                                              • API String ID: 210187428-168460110
                                                                                                                              • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                              • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                                                                              • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                                                                              • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ClassName_wcsicmpmemset
                                                                                                                              • String ID: edit
                                                                                                                              • API String ID: 2747424523-2167791130
                                                                                                                              • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                                                              • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                                                                                              • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                                                                                              • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                                                                                              • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                                                                                              • String ID: SHAutoComplete$shlwapi.dll
                                                                                                                              • API String ID: 3150196962-1506664499
                                                                                                                              • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                                                              • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                                                                                              • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                                                                                              • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(?,00000000,00000030,00000000), ref: 0041D8A6
                                                                                                                              • memcpy.MSVCRT(?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8BC
                                                                                                                              • memcmp.MSVCRT(?,?,00000030,?,-00000030,00000030,?,00000000,00000030,00000000), ref: 0041D8CB
                                                                                                                              • memcmp.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,00000000), ref: 0041D913
                                                                                                                              • memcpy.MSVCRT(?,?,00000030,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0041D92E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memcmp
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3384217055-0
                                                                                                                              • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                              • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                                                                              • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                                                                              • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$memcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 368790112-0
                                                                                                                              • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                                                              • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                                                                              • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                                                                              • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                                                                                                • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                                                                                                • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                                                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                                                                                                • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                                                                                              • GetMenu.USER32(?), ref: 00410F8D
                                                                                                                              • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                                                                                              • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                                                                                              • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1889144086-0
                                                                                                                              • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                                              • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                                                                                              • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                                                                                              • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                                                                                              APIs
                                                                                                                              • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                                                                                              • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                                                                                              • GetLastError.KERNEL32 ref: 0041810A
                                                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$CloseCreateErrorHandleLastMappingView
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1661045500-0
                                                                                                                              • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                                              • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                                                                                              • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                                                                                              • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                                                                                              • memcpy.MSVCRT(?,?,?), ref: 0042EC7A
                                                                                                                              Strings
                                                                                                                              • virtual tables may not be altered, xrefs: 0042EBD2
                                                                                                                              • sqlite_altertab_%s, xrefs: 0042EC4C
                                                                                                                              • Cannot add a column to a view, xrefs: 0042EBE8
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpymemset
                                                                                                                              • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                                                                                              • API String ID: 1297977491-2063813899
                                                                                                                              • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                                              • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                                                                                              • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                                                                                              • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040560C
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                                • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                                                                                • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4D2
                                                                                                                                • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                                                                                • Part of subcall function 0040A45A: memcpy.MSVCRT(?,?,?,?,?,?,?,?,?,00000400,%s (%s),?,?), ref: 0040A4F3
                                                                                                                                • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                                                                              • String ID: *.*$dat$wand.dat
                                                                                                                              • API String ID: 2618321458-1828844352
                                                                                                                              • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                                              • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                                                                              • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                                                                              • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT(00000000), ref: 0040ECF9
                                                                                                                                • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0040EDC0
                                                                                                                              • wcslen.MSVCRT ref: 00410C74
                                                                                                                              • _wtoi.MSVCRT(?), ref: 00410C80
                                                                                                                              • _wcsicmp.MSVCRT ref: 00410CCE
                                                                                                                              • _wcsicmp.MSVCRT ref: 00410CDF
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1549203181-0
                                                                                                                              • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                                                              • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                                                                                              • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                                                                                              • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00412057
                                                                                                                                • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                                                                              • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                                                                              • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                                                                              • GetKeyState.USER32(00000010), ref: 0041210D
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3550944819-0
                                                                                                                              • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                              • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                                                                              • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                                                                              • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                                                                              APIs
                                                                                                                              • free.MSVCRT ref: 0040F561
                                                                                                                              • memcpy.MSVCRT(00000000,?,00000001,g4@,00000000,0000121C,?,?,?,00403467), ref: 0040F573
                                                                                                                              • memcpy.MSVCRT(00000000,?,?,00000000), ref: 0040F5A6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$free
                                                                                                                              • String ID: g4@
                                                                                                                              • API String ID: 2888793982-2133833424
                                                                                                                              • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                                              • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                                                                              • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                                                                                              • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129CF
                                                                                                                              • memcpy.MSVCRT(?,?,00000040,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 004129F9
                                                                                                                              • memcpy.MSVCRT(?,?,00000013,00000001,0044EB0C,?,?,004131CA,?,0044EB0C), ref: 00412A1D
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy
                                                                                                                              • String ID: @
                                                                                                                              • API String ID: 3510742995-2766056989
                                                                                                                              • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                              • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                                                                              • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                                                                              • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                                                                              APIs
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF07
                                                                                                                              • memset.MSVCRT ref: 0040AF18
                                                                                                                              • memcpy.MSVCRT(0045A474,?,?,00000000,00000000,?,00000000,?,?,00401516,?,?,?,?,00457660,0000000C), ref: 0040AF24
                                                                                                                              • ??3@YAXPAX@Z.MSVCRT ref: 0040AF31
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@??3@memcpymemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1865533344-0
                                                                                                                              • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                                                                                              • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                                                                                              • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                                                                                              • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 004144E7
                                                                                                                                • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                                                                                • Part of subcall function 0040A353: memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                                                                              • memset.MSVCRT ref: 0041451A
                                                                                                                              • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1127616056-0
                                                                                                                              • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                                              • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                                                                              • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                                                                              • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(?,?,00000068,sqlite_master), ref: 0042FEC6
                                                                                                                              • memset.MSVCRT ref: 0042FED3
                                                                                                                              • memcpy.MSVCRT(?,?,00000068,?,?,?,00000000,?,?,?,?,?,?,?,sqlite_master), ref: 0042FF04
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memset
                                                                                                                              • String ID: sqlite_master
                                                                                                                              • API String ID: 438689982-3163232059
                                                                                                                              • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                                                              • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                                                                                              • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                                                                                              • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                                                                                              APIs
                                                                                                                              • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                                                                                              • wcscpy.MSVCRT ref: 00414DF3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: BrowseFolderFromListMallocPathwcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3917621476-0
                                                                                                                              • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                                                              • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                                                                                              • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                                                                                              • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                                                                                • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                                                                                • Part of subcall function 0040D134: memcpy.MSVCRT(00000000,00000002,?,?,00402E6F), ref: 0040D24C
                                                                                                                              • _snwprintf.MSVCRT ref: 00410FE1
                                                                                                                              • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                                                                                                • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                                                                                • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                                                                                • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                                                                              • _snwprintf.MSVCRT ref: 0041100C
                                                                                                                              • wcscat.MSVCRT ref: 0041101F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 822687973-0
                                                                                                                              • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                                                              • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                                                                                              • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                                                                                              • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                                                                                              APIs
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7556DF80,?,0041755F,?), ref: 00417452
                                                                                                                              • malloc.MSVCRT ref: 00417459
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7556DF80,?,0041755F,?), ref: 00417478
                                                                                                                              • free.MSVCRT ref: 0041747F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$freemalloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2605342592-0
                                                                                                                              • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                                              • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                                                                              • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                                                                                              • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                                                                              APIs
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                                                                              • RegisterClassW.USER32(?), ref: 00412428
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                                                                              • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: HandleModule$ClassCreateRegisterWindow
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2678498856-0
                                                                                                                              • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                                              • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                                                                              • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                                                                              • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                                                                              APIs
                                                                                                                              • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                                                                              • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                                                                              • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                                                                              • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSend$Item
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3888421826-0
                                                                                                                              • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                                              • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                                                                              • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                                                                              • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00417B7B
                                                                                                                              • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                                                                              • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                                                                              • GetLastError.KERNEL32 ref: 00417BB5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: File$ErrorLastLockUnlockmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3727323765-0
                                                                                                                              • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                                                              • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                                                                              • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                                                                              • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040F673
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                                                                              • strlen.MSVCRT ref: 0040F6A2
                                                                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2754987064-0
                                                                                                                              • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                                              • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                                                                              • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                                                                              • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040F6E2
                                                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                                                                              • strlen.MSVCRT ref: 0040F70D
                                                                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2754987064-0
                                                                                                                              • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                                              • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                                                                              • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                                                                              • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 00402FD7
                                                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                                                                                              • strlen.MSVCRT ref: 00403006
                                                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2754987064-0
                                                                                                                              • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                                                              • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                                                                                              • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                                                                                              • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                                                                                • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                                                                                • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                                                                              • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                                                                              • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                                                                              • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                                                                              • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 764393265-0
                                                                                                                              • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                              • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                                                                              • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                                                                              • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                                                                              APIs
                                                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                                                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                                                                              • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: Time$System$File$LocalSpecific
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 979780441-0
                                                                                                                              • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                              • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                                                                              • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                                                                              • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(0045A808,?,00000050,?,0040155D,?), ref: 004134E0
                                                                                                                              • memcpy.MSVCRT(0045A538,?,000002CC,0045A808,?,00000050,?,0040155D,?), ref: 004134F2
                                                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                                                                              • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$DialogHandleModuleParam
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1386444988-0
                                                                                                                              • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                              • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                                                                              • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                                                                              • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                                                                              APIs
                                                                                                                              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                                                                                              • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: InvalidateMessageRectSend
                                                                                                                              • String ID: d=E
                                                                                                                              • API String ID: 909852535-3703654223
                                                                                                                              • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                                                              • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                                                                                              • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                                                                                              • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                                                                                              APIs
                                                                                                                              • wcschr.MSVCRT ref: 0040F79E
                                                                                                                              • wcschr.MSVCRT ref: 0040F7AC
                                                                                                                                • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                                                                                • Part of subcall function 0040AA8C: memcpy.MSVCRT(00000000,?,00000000,00000000,?,0000002C,?,0040F7F4,?,?,?,?,004032AB,?), ref: 0040AACB
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcschr$memcpywcslen
                                                                                                                              • String ID: "
                                                                                                                              • API String ID: 1983396471-123907689
                                                                                                                              • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                                              • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                                                                              • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                                                                              • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                                                                              • _memicmp.MSVCRT ref: 0040C00D
                                                                                                                              • memcpy.MSVCRT(?,?,00000004,00000000,?,?,?,?,?,?,?,?,*.*,0040C2BF,00000000), ref: 0040C024
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FilePointer_memicmpmemcpy
                                                                                                                              • String ID: URL
                                                                                                                              • API String ID: 2108176848-3574463123
                                                                                                                              • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                                              • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                                                                                              • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                                                                                              • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                                                                                              APIs
                                                                                                                              • _snwprintf.MSVCRT ref: 0040A398
                                                                                                                              • memcpy.MSVCRT(?,00000000,00000006,00000000,0000000A,%2.2X ,?), ref: 0040A3A8
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintfmemcpy
                                                                                                                              • String ID: %2.2X
                                                                                                                              • API String ID: 2789212964-323797159
                                                                                                                              • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                                              • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                                                                              • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                                                                              • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: _snwprintf
                                                                                                                              • String ID: %%-%d.%ds
                                                                                                                              • API String ID: 3988819677-2008345750
                                                                                                                              • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                                              • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                                                                              • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                                                                              • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040E770
                                                                                                                              • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: MessageSendmemset
                                                                                                                              • String ID: F^@
                                                                                                                              • API String ID: 568519121-3652327722
                                                                                                                              • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                                              • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                                                                              • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                                                                              • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                                                                              APIs
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: PlacementWindowmemset
                                                                                                                              • String ID: WinPos
                                                                                                                              • API String ID: 4036792311-2823255486
                                                                                                                              • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                                              • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                                                                              • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                                                                              • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                                                                              • wcsrchr.MSVCRT ref: 0040DCE9
                                                                                                                              • wcscat.MSVCRT ref: 0040DCFF
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: FileModuleNamewcscatwcsrchr
                                                                                                                              • String ID: _lng.ini
                                                                                                                              • API String ID: 383090722-1948609170
                                                                                                                              • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                                                              • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                                                                                              • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                                                                                              • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                                                                                • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                                                                                • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                                                                                • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                                                                                                • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                                                                                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                                                                                              • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                                                                                              • API String ID: 2773794195-880857682
                                                                                                                              • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                                                              • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                                                                                              • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                                                                                              • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                                                                                              APIs
                                                                                                                              • memcpy.MSVCRT(?,?,00000000,?), ref: 0042BA5F
                                                                                                                              • memcpy.MSVCRT(?,?,?,?), ref: 0042BA98
                                                                                                                              • memset.MSVCRT ref: 0042BAAE
                                                                                                                              • memcpy.MSVCRT(?,?,00000000,?,?,?,?,?,?,?), ref: 0042BAE7
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcpy$memset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 438689982-0
                                                                                                                              • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                                              • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                                                                              • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                                                                              • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 0040A13C: memset.MSVCRT ref: 0040A14A
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT ref: 0040E84D
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E874
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E895
                                                                                                                              • ??2@YAPAXI@Z.MSVCRT(00000014), ref: 0040E8B6
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??2@$memset
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1860491036-0
                                                                                                                              • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                                              • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                                                                              • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                                                                                              • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                                                                              APIs
                                                                                                                              • wcslen.MSVCRT ref: 0040A8E2
                                                                                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                              • free.MSVCRT ref: 0040A908
                                                                                                                              • free.MSVCRT ref: 0040A92B
                                                                                                                              • memcpy.MSVCRT(?,?,000000FF,00000000,?,?,00000000,?,0040320A,00000000,000000FF), ref: 0040A94F
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$memcpy$mallocwcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 726966127-0
                                                                                                                              • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                                              • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                                                                              • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                                                                                              • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                                                                              APIs
                                                                                                                              • wcslen.MSVCRT ref: 0040B1DE
                                                                                                                              • free.MSVCRT ref: 0040B201
                                                                                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                              • free.MSVCRT ref: 0040B224
                                                                                                                              • memcpy.MSVCRT(?,00000000,-00000002,00000000,00000000,?,?,?,?,0040B319,0040B432,00000000,?,?,0040B432,00000000), ref: 0040B248
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$memcpy$mallocwcslen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 726966127-0
                                                                                                                              • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                                              • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                                                                              • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                                                                                              • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                                                                              APIs
                                                                                                                              • memcmp.MSVCRT(?,004599B8,00000010,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408AF3
                                                                                                                                • Part of subcall function 00408A6E: memcmp.MSVCRT(00409690,00408B12,00000004,000000FF), ref: 00408A8C
                                                                                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(00000363,004096AA,4415FF50,?), ref: 00408ABB
                                                                                                                                • Part of subcall function 00408A6E: memcpy.MSVCRT(-00000265,004096AF,00000060,00000363,004096AA,4415FF50,?), ref: 00408AD0
                                                                                                                              • memcmp.MSVCRT(?,00000000,0000000E,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B2B
                                                                                                                              • memcmp.MSVCRT(?,00000000,0000000B,00000000,00409690,?,00408C27,00409690,?,00409690,00408801,00000000), ref: 00408B5C
                                                                                                                              • memcpy.MSVCRT(0000023E,00409690,?), ref: 00408B79
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memcmp$memcpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 231171946-0
                                                                                                                              • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                                              • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                                                                              • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                                                                              • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                                                                              APIs
                                                                                                                              • strlen.MSVCRT ref: 0040B0D8
                                                                                                                              • free.MSVCRT ref: 0040B0FB
                                                                                                                                • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                                                                                • Part of subcall function 004099F4: memcpy.MSVCRT(00000000,?,?,?,?,004027EB,00000004,?,?,?,00401F8F,00000000), ref: 00409A28
                                                                                                                                • Part of subcall function 004099F4: free.MSVCRT ref: 00409A31
                                                                                                                              • free.MSVCRT ref: 0040B12C
                                                                                                                              • memcpy.MSVCRT(?,?,00000000,00000000,0040B35A,?), ref: 0040B159
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: free$memcpy$mallocstrlen
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 3669619086-0
                                                                                                                              • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                                              • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                                                                              • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                                                                                              • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                                                                              APIs
                                                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                                                                              • malloc.MSVCRT ref: 00417407
                                                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                                                                              • free.MSVCRT ref: 00417425
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ByteCharMultiWide$freemalloc
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 2605342592-0
                                                                                                                              • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                                              • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                                                                              • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                                                                                              • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000010.00000002.1587408627.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_16_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: wcslen$wcscat$wcscpy
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 1961120804-0
                                                                                                                              • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                                                              • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                                                                                              • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                                                                                              • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E

                                                                                                                              Execution Graph

                                                                                                                              Execution Coverage:2.4%
                                                                                                                              Dynamic/Decrypted Code Coverage:20.2%
                                                                                                                              Signature Coverage:0.2%
                                                                                                                              Total number of Nodes:855
                                                                                                                              Total number of Limit Nodes:19
                                                                                                                              execution_graph 34114 40fc40 70 API calls 34287 403640 21 API calls 34115 427fa4 42 API calls 34288 412e43 _endthreadex 34289 425115 76 API calls __fprintf_l 34290 43fe40 133 API calls 34118 425115 83 API calls __fprintf_l 34119 401445 memcpy memcpy DialogBoxParamA 34120 440c40 34 API calls 33236 444c4a 33255 444e38 33236->33255 33238 444c56 GetModuleHandleA 33239 444c68 __set_app_type __p__fmode __p__commode 33238->33239 33241 444cfa 33239->33241 33242 444d02 __setusermatherr 33241->33242 33243 444d0e 33241->33243 33242->33243 33256 444e22 _controlfp 33243->33256 33245 444d13 _initterm __getmainargs _initterm 33246 444d6a GetStartupInfoA 33245->33246 33248 444d9e GetModuleHandleA 33246->33248 33257 40cf44 33248->33257 33252 444dcf _cexit 33254 444e04 33252->33254 33253 444dc8 exit 33253->33252 33255->33238 33256->33245 33308 404a99 LoadLibraryA 33257->33308 33259 40cf60 33294 40cf64 33259->33294 33316 410d0e 33259->33316 33261 40cf6f 33320 40ccd7 ??2@YAPAXI 33261->33320 33263 40cf9b 33334 407cbc 33263->33334 33268 40cfc4 33352 409825 memset 33268->33352 33269 40cfd8 33357 4096f4 memset 33269->33357 33274 407e30 _strcmpi 33276 40cfee 33274->33276 33275 40d181 ??3@YAXPAX 33277 40d1b3 33275->33277 33278 40d19f DeleteObject 33275->33278 33280 40cff2 RegDeleteKeyA 33276->33280 33281 40d007 EnumResourceTypesA 33276->33281 33381 407948 free free 33277->33381 33278->33277 33280->33275 33283 40d047 33281->33283 33284 40d02f MessageBoxA 33281->33284 33282 40d1c4 33382 4080d4 free 33282->33382 33286 40d0a0 CoInitialize 33283->33286 33362 40ce70 33283->33362 33284->33275 33379 40cc26 strncat memset RegisterClassA CreateWindowExA 33286->33379 33287 40d1cd 33383 407948 free free 33287->33383 33292 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33380 40c256 PostMessageA 33292->33380 33294->33252 33294->33253 33295 40d061 ??3@YAXPAX 33295->33277 33298 40d084 DeleteObject 33295->33298 33296 40d09e 33296->33286 33298->33277 33300 40d0f9 GetMessageA 33301 40d17b CoUninitialize 33300->33301 33302 40d10d 33300->33302 33301->33275 33303 40d113 TranslateAccelerator 33302->33303 33305 40d145 IsDialogMessage 33302->33305 33306 40d139 IsDialogMessage 33302->33306 33303->33302 33304 40d16d GetMessageA 33303->33304 33304->33301 33304->33303 33305->33304 33307 40d157 TranslateMessage DispatchMessageA 33305->33307 33306->33304 33306->33305 33307->33304 33309 404ac4 GetProcAddress 33308->33309 33310 404aec 33308->33310 33311 404ad4 33309->33311 33312 404add FreeLibrary 33309->33312 33314 404b13 33310->33314 33315 404afc MessageBoxA 33310->33315 33311->33312 33312->33310 33313 404ae8 33312->33313 33313->33310 33314->33259 33315->33259 33317 410d17 LoadLibraryA 33316->33317 33318 410d3c 33316->33318 33317->33318 33319 410d2b GetProcAddress 33317->33319 33318->33261 33319->33318 33321 40cd08 ??2@YAPAXI 33320->33321 33323 40cd26 33321->33323 33325 40cd2d 33321->33325 33391 404025 6 API calls 33323->33391 33326 40cd66 33325->33326 33327 40cd59 DeleteObject 33325->33327 33384 407088 33326->33384 33327->33326 33329 40cd6b 33387 4019b5 33329->33387 33332 4019b5 strncat 33333 40cdbf _mbscpy 33332->33333 33333->33263 33393 407948 free free 33334->33393 33336 407e04 33394 407a55 33336->33394 33339 407ddc 33339->33336 33406 407a1f 33339->33406 33340 407a1f malloc memcpy free free 33346 407cf7 33340->33346 33342 407d7a free 33342->33346 33346->33336 33346->33339 33346->33340 33346->33342 33397 40796e 7 API calls 33346->33397 33398 406f30 33346->33398 33348 407e30 33349 407e57 33348->33349 33351 407e38 33348->33351 33349->33268 33349->33269 33350 407e41 _strcmpi 33350->33349 33350->33351 33351->33349 33351->33350 33412 4097ff 33352->33412 33354 409854 33417 409731 33354->33417 33358 4097ff 3 API calls 33357->33358 33359 409723 33358->33359 33437 40966c 33359->33437 33451 4023b2 33362->33451 33368 40ced3 33540 40cdda 7 API calls 33368->33540 33369 40cece 33372 40cf3f 33369->33372 33492 40c3d0 memset GetModuleFileNameA strrchr 33369->33492 33372->33295 33372->33296 33375 40ceed 33519 40affa 33375->33519 33379->33292 33380->33300 33381->33282 33382->33287 33383->33294 33392 406fc7 memset _mbscpy 33384->33392 33386 40709f CreateFontIndirectA 33386->33329 33388 4019e1 33387->33388 33389 4019c2 strncat 33388->33389 33390 4019e5 memset LoadIconA 33388->33390 33389->33388 33390->33332 33391->33325 33392->33386 33393->33346 33395 407a65 33394->33395 33396 407a5b free 33394->33396 33395->33348 33396->33395 33397->33346 33399 406f37 malloc 33398->33399 33400 406f7d 33398->33400 33402 406f73 33399->33402 33403 406f58 33399->33403 33400->33346 33402->33346 33404 406f6c free 33403->33404 33405 406f5c memcpy 33403->33405 33404->33402 33405->33404 33407 407a38 33406->33407 33408 407a2d free 33406->33408 33410 406f30 3 API calls 33407->33410 33409 407a43 33408->33409 33411 40796e 7 API calls 33409->33411 33410->33409 33411->33336 33428 406f96 GetModuleFileNameA 33412->33428 33414 409805 strrchr 33415 409814 33414->33415 33416 409817 _mbscat 33414->33416 33415->33416 33416->33354 33429 44b090 33417->33429 33422 40930c 3 API calls 33423 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33422->33423 33424 4097c5 LoadStringA 33423->33424 33427 4097db 33424->33427 33426 4097f3 33426->33275 33427->33424 33427->33426 33436 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33427->33436 33428->33414 33430 40973e _mbscpy _mbscpy 33429->33430 33431 40930c 33430->33431 33432 44b090 33431->33432 33433 409319 memset GetPrivateProfileStringA 33432->33433 33434 409374 33433->33434 33435 409364 WritePrivateProfileStringA 33433->33435 33434->33422 33435->33434 33436->33427 33447 406f81 GetFileAttributesA 33437->33447 33439 409675 33440 4096ee 33439->33440 33441 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33439->33441 33440->33274 33448 409278 GetPrivateProfileStringA 33441->33448 33443 4096c9 33449 409278 GetPrivateProfileStringA 33443->33449 33445 4096da 33450 409278 GetPrivateProfileStringA 33445->33450 33447->33439 33448->33443 33449->33445 33450->33440 33542 409c1c 33451->33542 33454 401e69 memset 33581 410dbb 33454->33581 33457 401ec2 33611 4070e3 strlen _mbscat _mbscpy _mbscat 33457->33611 33458 401ed4 33596 406f81 GetFileAttributesA 33458->33596 33461 401ee6 strlen strlen 33463 401f15 33461->33463 33464 401f28 33461->33464 33612 4070e3 strlen _mbscat _mbscpy _mbscat 33463->33612 33597 406f81 GetFileAttributesA 33464->33597 33467 401f35 33598 401c31 33467->33598 33470 401f75 33610 410a9c RegOpenKeyExA 33470->33610 33471 401c31 7 API calls 33471->33470 33473 401f91 33474 402187 33473->33474 33475 401f9c memset 33473->33475 33477 402195 ExpandEnvironmentStringsA 33474->33477 33478 4021a8 _strcmpi 33474->33478 33613 410b62 RegEnumKeyExA 33475->33613 33622 406f81 GetFileAttributesA 33477->33622 33478->33368 33478->33369 33480 40217e RegCloseKey 33480->33474 33481 401fd9 atoi 33482 401fef memset memset sprintf 33481->33482 33489 401fc9 33481->33489 33614 410b1e 33482->33614 33485 402165 33485->33480 33486 402076 memset memset strlen strlen 33486->33489 33487 4070e3 strlen _mbscat _mbscpy _mbscat 33487->33489 33488 4020dd strlen strlen 33488->33489 33489->33480 33489->33481 33489->33485 33489->33486 33489->33487 33489->33488 33490 406f81 GetFileAttributesA 33489->33490 33491 402167 _mbscpy 33489->33491 33621 410b62 RegEnumKeyExA 33489->33621 33490->33489 33491->33480 33493 40c422 33492->33493 33494 40c425 _mbscat _mbscpy _mbscpy 33492->33494 33493->33494 33495 40c49d 33494->33495 33496 40c512 33495->33496 33497 40c502 GetWindowPlacement 33495->33497 33498 40c538 33496->33498 33643 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33496->33643 33497->33496 33636 409b31 33498->33636 33502 40ba28 33503 40ba87 33502->33503 33509 40ba3c 33502->33509 33646 406c62 LoadCursorA SetCursor 33503->33646 33505 40ba8c 33647 4107f1 33505->33647 33650 403c16 33505->33650 33726 410a9c RegOpenKeyExA 33505->33726 33727 404734 33505->33727 33735 404785 33505->33735 33506 40ba43 _mbsicmp 33506->33509 33507 40baa0 33508 407e30 _strcmpi 33507->33508 33512 40bab0 33508->33512 33509->33503 33509->33506 33738 40b5e5 10 API calls 33509->33738 33510 40bafa SetCursor 33510->33375 33512->33510 33513 40baf1 qsort 33512->33513 33513->33510 34098 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33519->34098 33521 40b00e 33522 40b016 33521->33522 33523 40b01f GetStdHandle 33521->33523 34099 406d1a CreateFileA 33522->34099 33525 40b01c 33523->33525 33526 40b035 33525->33526 33527 40b12d 33525->33527 34100 406c62 LoadCursorA SetCursor 33526->34100 34104 406d77 9 API calls 33527->34104 33530 40b136 33541 40c580 28 API calls 33530->33541 33531 40b087 33538 40b0a1 33531->33538 34102 40a699 12 API calls 33531->34102 33532 40b042 33532->33531 33532->33538 34101 40a57c strlen WriteFile 33532->34101 33535 40b116 CloseHandle 33536 40b11f SetCursor 33535->33536 33536->33530 33537 40b0d6 33537->33535 33537->33536 33538->33537 34103 406d77 9 API calls 33538->34103 33540->33369 33541->33372 33554 409a32 33542->33554 33545 409c80 memcpy memcpy 33546 409cda 33545->33546 33546->33545 33547 408db6 12 API calls 33546->33547 33548 409d18 ??2@YAPAXI ??2@YAPAXI 33546->33548 33547->33546 33549 409d54 ??2@YAPAXI 33548->33549 33550 409d8b 33548->33550 33549->33550 33564 409b9c 33550->33564 33553 4023c1 33553->33454 33555 409a44 33554->33555 33556 409a3d ??3@YAXPAX 33554->33556 33557 409a52 33555->33557 33558 409a4b ??3@YAXPAX 33555->33558 33556->33555 33559 409a5c ??3@YAXPAX 33557->33559 33561 409a63 33557->33561 33558->33557 33559->33561 33560 409a83 ??2@YAPAXI ??2@YAPAXI 33560->33545 33561->33560 33562 409a73 ??3@YAXPAX 33561->33562 33563 409a7c ??3@YAXPAX 33561->33563 33562->33563 33563->33560 33565 407a55 free 33564->33565 33566 409ba5 33565->33566 33567 407a55 free 33566->33567 33568 409bad 33567->33568 33569 407a55 free 33568->33569 33570 409bb5 33569->33570 33571 407a55 free 33570->33571 33572 409bbd 33571->33572 33573 407a1f 4 API calls 33572->33573 33574 409bd0 33573->33574 33575 407a1f 4 API calls 33574->33575 33576 409bda 33575->33576 33577 407a1f 4 API calls 33576->33577 33578 409be4 33577->33578 33579 407a1f 4 API calls 33578->33579 33580 409bee 33579->33580 33580->33553 33582 410d0e 2 API calls 33581->33582 33583 410dca 33582->33583 33584 410dfd memset 33583->33584 33623 4070ae 33583->33623 33585 410e1d 33584->33585 33626 410a9c RegOpenKeyExA 33585->33626 33589 401e9e strlen strlen 33589->33457 33589->33458 33590 410e4a 33591 410e7f _mbscpy 33590->33591 33627 410d3d _mbscpy 33590->33627 33591->33589 33593 410e5b 33628 410add RegQueryValueExA 33593->33628 33595 410e73 RegCloseKey 33595->33591 33596->33461 33597->33467 33629 410a9c RegOpenKeyExA 33598->33629 33600 401c4c 33601 401cad 33600->33601 33630 410add RegQueryValueExA 33600->33630 33601->33470 33601->33471 33603 401c6a 33604 401c71 strchr 33603->33604 33605 401ca4 RegCloseKey 33603->33605 33604->33605 33606 401c85 strchr 33604->33606 33605->33601 33606->33605 33607 401c94 33606->33607 33631 406f06 strlen 33607->33631 33609 401ca1 33609->33605 33610->33473 33611->33458 33612->33464 33613->33489 33634 410a9c RegOpenKeyExA 33614->33634 33616 410b34 33617 410b5d 33616->33617 33635 410add RegQueryValueExA 33616->33635 33617->33489 33619 410b4c RegCloseKey 33619->33617 33621->33489 33622->33478 33624 4070bd GetVersionExA 33623->33624 33625 4070ce 33623->33625 33624->33625 33625->33584 33625->33589 33626->33590 33627->33593 33628->33595 33629->33600 33630->33603 33632 406f17 33631->33632 33633 406f1a memcpy 33631->33633 33632->33633 33633->33609 33634->33616 33635->33619 33637 409b40 33636->33637 33639 409b4e 33636->33639 33644 409901 memset SendMessageA 33637->33644 33640 409b99 33639->33640 33641 409b8b 33639->33641 33640->33502 33645 409868 SendMessageA 33641->33645 33643->33498 33644->33639 33645->33640 33646->33505 33648 410807 33647->33648 33649 4107fc FreeLibrary 33647->33649 33648->33507 33649->33648 33651 4107f1 FreeLibrary 33650->33651 33652 403c30 LoadLibraryA 33651->33652 33653 403c74 33652->33653 33654 403c44 GetProcAddress 33652->33654 33656 4107f1 FreeLibrary 33653->33656 33654->33653 33655 403c5e 33654->33655 33655->33653 33660 403c6b 33655->33660 33657 403c7b 33656->33657 33658 404734 3 API calls 33657->33658 33659 403c86 33658->33659 33739 4036e5 33659->33739 33660->33657 33663 4036e5 27 API calls 33664 403c9a 33663->33664 33665 4036e5 27 API calls 33664->33665 33666 403ca4 33665->33666 33667 4036e5 27 API calls 33666->33667 33668 403cae 33667->33668 33751 4085d2 33668->33751 33676 403ce5 33677 403cf7 33676->33677 33934 402bd1 40 API calls 33676->33934 33797 410a9c RegOpenKeyExA 33677->33797 33680 403d0a 33681 403d1c 33680->33681 33935 402bd1 40 API calls 33680->33935 33798 402c5d 33681->33798 33685 4070ae GetVersionExA 33686 403d31 33685->33686 33816 410a9c RegOpenKeyExA 33686->33816 33688 403d51 33689 403d61 33688->33689 33936 402b22 47 API calls 33688->33936 33817 410a9c RegOpenKeyExA 33689->33817 33692 403d87 33693 403d97 33692->33693 33937 402b22 47 API calls 33692->33937 33818 410a9c RegOpenKeyExA 33693->33818 33696 403dbd 33697 403dcd 33696->33697 33938 402b22 47 API calls 33696->33938 33819 410808 33697->33819 33701 404785 FreeLibrary 33702 403de8 33701->33702 33823 402fdb 33702->33823 33705 402fdb 34 API calls 33706 403e00 33705->33706 33839 4032b7 33706->33839 33715 403e3b 33717 403e73 33715->33717 33718 403e46 _mbscpy 33715->33718 33886 40fb00 33717->33886 33940 40f334 334 API calls 33718->33940 33726->33507 33728 404785 FreeLibrary 33727->33728 33729 40473b LoadLibraryA 33728->33729 33730 40474c GetProcAddress 33729->33730 33733 40476e 33729->33733 33731 404764 33730->33731 33730->33733 33731->33733 33732 404781 33732->33507 33733->33732 33734 404785 FreeLibrary 33733->33734 33734->33732 33736 4047a3 33735->33736 33737 404799 FreeLibrary 33735->33737 33736->33507 33737->33736 33738->33509 33740 4037c5 33739->33740 33741 4036fb 33739->33741 33740->33663 33941 410863 UuidFromStringA UuidFromStringA memcpy CoTaskMemFree 33741->33941 33743 40370e 33743->33740 33744 403716 strchr 33743->33744 33744->33740 33745 403730 33744->33745 33942 4021b6 memset 33745->33942 33747 40373f _mbscpy _mbscpy strlen 33748 4037a4 _mbscpy 33747->33748 33749 403789 sprintf 33747->33749 33943 4023e5 16 API calls 33748->33943 33749->33748 33752 4085e2 33751->33752 33944 4082cd 11 API calls 33752->33944 33756 408600 33757 403cba 33756->33757 33758 40860b memset 33756->33758 33769 40821d 33757->33769 33947 410b62 RegEnumKeyExA 33758->33947 33760 4086d2 RegCloseKey 33760->33757 33762 408637 33762->33760 33763 40865c memset 33762->33763 33948 410a9c RegOpenKeyExA 33762->33948 33951 410b62 RegEnumKeyExA 33762->33951 33949 410add RegQueryValueExA 33763->33949 33766 408694 33950 40848b 10 API calls 33766->33950 33768 4086ab RegCloseKey 33768->33762 33952 410a9c RegOpenKeyExA 33769->33952 33771 40823f 33772 403cc6 33771->33772 33773 408246 memset 33771->33773 33781 4086e0 33772->33781 33953 410b62 RegEnumKeyExA 33773->33953 33775 4082bf RegCloseKey 33775->33772 33777 40826f 33777->33775 33954 410a9c RegOpenKeyExA 33777->33954 33955 4080ed 11 API calls 33777->33955 33956 410b62 RegEnumKeyExA 33777->33956 33780 4082a2 RegCloseKey 33780->33777 33957 4045db 33781->33957 33783 4088ef 33965 404656 33783->33965 33787 408737 wcslen 33787->33783 33793 40876a 33787->33793 33788 40877a wcsncmp 33788->33793 33790 404734 3 API calls 33790->33793 33791 404785 FreeLibrary 33791->33793 33792 408812 memset 33792->33793 33794 40883c memcpy wcschr 33792->33794 33793->33783 33793->33788 33793->33790 33793->33791 33793->33792 33793->33794 33795 4088c3 LocalFree 33793->33795 33968 40466b _mbscpy 33793->33968 33794->33793 33795->33793 33796 410a9c RegOpenKeyExA 33796->33676 33797->33680 33969 410a9c RegOpenKeyExA 33798->33969 33800 402c7a 33801 402da5 33800->33801 33802 402c87 memset 33800->33802 33801->33685 33970 410b62 RegEnumKeyExA 33802->33970 33804 402d9c RegCloseKey 33804->33801 33805 410b1e 3 API calls 33806 402ce4 memset sprintf 33805->33806 33971 410a9c RegOpenKeyExA 33806->33971 33808 402d28 33809 402d3a sprintf 33808->33809 33972 402bd1 40 API calls 33808->33972 33973 410a9c RegOpenKeyExA 33809->33973 33814 402cb2 33814->33804 33814->33805 33815 402d9a 33814->33815 33974 402bd1 40 API calls 33814->33974 33975 410b62 RegEnumKeyExA 33814->33975 33815->33804 33816->33688 33817->33692 33818->33696 33820 410816 33819->33820 33821 4107f1 FreeLibrary 33820->33821 33822 403ddd 33821->33822 33822->33701 33976 410a9c RegOpenKeyExA 33823->33976 33825 402ff9 33826 403006 memset 33825->33826 33827 40312c 33825->33827 33977 410b62 RegEnumKeyExA 33826->33977 33827->33705 33829 403122 RegCloseKey 33829->33827 33830 410b1e 3 API calls 33831 403058 memset sprintf 33830->33831 33978 410a9c RegOpenKeyExA 33831->33978 33833 4030a2 memset 33979 410b62 RegEnumKeyExA 33833->33979 33835 410b62 RegEnumKeyExA 33838 403033 33835->33838 33836 4030f9 RegCloseKey 33836->33838 33838->33829 33838->33830 33838->33833 33838->33835 33838->33836 33980 402db3 26 API calls 33838->33980 33840 4032d5 33839->33840 33841 4033a9 33839->33841 33981 4021b6 memset 33840->33981 33854 4034e4 memset memset 33841->33854 33843 4032e1 33982 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33843->33982 33845 4032ea 33846 4032f8 memset GetPrivateProfileSectionA 33845->33846 33983 4023e5 16 API calls 33845->33983 33846->33841 33851 40332f 33846->33851 33848 40339b strlen 33848->33841 33848->33851 33850 403350 strchr 33850->33851 33851->33841 33851->33848 33984 4021b6 memset 33851->33984 33985 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33851->33985 33986 4023e5 16 API calls 33851->33986 33855 410b1e 3 API calls 33854->33855 33856 40353f 33855->33856 33857 40357f 33856->33857 33858 403546 _mbscpy 33856->33858 33862 403985 33857->33862 33987 406d55 strlen _mbscat 33858->33987 33860 403565 _mbscat 33988 4033f0 19 API calls 33860->33988 33989 40466b _mbscpy 33862->33989 33866 4039aa 33867 4039ff 33866->33867 33990 40f460 memset memset 33866->33990 34011 40f6e2 33866->34011 34027 4038e8 21 API calls 33866->34027 33869 404785 FreeLibrary 33867->33869 33870 403a0b 33869->33870 33871 4037ca memset memset 33870->33871 34035 444551 memset 33871->34035 33873 4038e2 33873->33715 33939 40f334 334 API calls 33873->33939 33876 40382e 33877 406f06 2 API calls 33876->33877 33878 403843 33877->33878 33879 406f06 2 API calls 33878->33879 33880 403855 strchr 33879->33880 33881 403884 _mbscpy 33880->33881 33882 403897 strlen 33880->33882 33883 4038bf _mbscpy 33881->33883 33882->33883 33884 4038a4 sprintf 33882->33884 34047 4023e5 16 API calls 33883->34047 33884->33883 33887 44b090 33886->33887 33888 40fb10 RegOpenKeyExA 33887->33888 33889 403e7f 33888->33889 33890 40fb3b RegOpenKeyExA 33888->33890 33900 40f96c 33889->33900 33891 40fb55 RegQueryValueExA 33890->33891 33892 40fc2d RegCloseKey 33890->33892 33893 40fc23 RegCloseKey 33891->33893 33894 40fb84 33891->33894 33892->33889 33893->33892 33895 404734 3 API calls 33894->33895 33896 40fb91 33895->33896 33896->33893 33897 40fc19 LocalFree 33896->33897 33898 40fbdd memcpy memcpy 33896->33898 33897->33893 34052 40f802 11 API calls 33898->34052 33901 4070ae GetVersionExA 33900->33901 33902 40f98d 33901->33902 33903 4045db 7 API calls 33902->33903 33904 40f9a9 33903->33904 33905 40fae6 33904->33905 33906 40f9bf CredEnumerateW 33904->33906 33913 40f9d1 33904->33913 33907 404656 FreeLibrary 33905->33907 33906->33913 33908 403e85 33907->33908 33914 4442ea memset 33908->33914 33909 40fa13 memset WideCharToMultiByte 33910 40fa43 _strnicmp 33909->33910 33909->33913 33911 40fa5b WideCharToMultiByte 33910->33911 33910->33913 33912 40fa88 WideCharToMultiByte 33911->33912 33911->33913 33912->33913 33913->33905 33913->33909 33915 410dbb 9 API calls 33914->33915 33916 444329 33915->33916 34053 40759e strlen strlen 33916->34053 33921 410dbb 9 API calls 33922 444350 33921->33922 33923 40759e 3 API calls 33922->33923 33924 44435a 33923->33924 33925 444212 65 API calls 33924->33925 33926 444366 memset memset 33925->33926 33927 410b1e 3 API calls 33926->33927 33928 4443b9 ExpandEnvironmentStringsA strlen 33927->33928 33929 4443f4 _strcmpi 33928->33929 33930 4443e5 33928->33930 33931 403e91 33929->33931 33932 44440c 33929->33932 33930->33929 33931->33507 33933 444212 65 API calls 33932->33933 33933->33931 33934->33677 33935->33681 33936->33689 33937->33693 33938->33697 33939->33715 33940->33717 33941->33743 33942->33747 33943->33740 33945 40841c 33944->33945 33946 410a9c RegOpenKeyExA 33945->33946 33946->33756 33947->33762 33948->33762 33949->33766 33950->33768 33951->33762 33952->33771 33953->33777 33954->33777 33955->33780 33956->33777 33958 404656 FreeLibrary 33957->33958 33959 4045e3 LoadLibraryA 33958->33959 33960 404651 33959->33960 33961 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33959->33961 33960->33783 33960->33787 33962 40463d 33961->33962 33963 404643 33962->33963 33964 404656 FreeLibrary 33962->33964 33963->33960 33964->33960 33966 403cd2 33965->33966 33967 40465c FreeLibrary 33965->33967 33966->33796 33967->33966 33968->33793 33969->33800 33970->33814 33971->33808 33972->33809 33973->33814 33974->33814 33975->33814 33976->33825 33977->33838 33978->33838 33979->33838 33980->33838 33981->33843 33982->33845 33983->33846 33984->33850 33985->33851 33986->33851 33987->33860 33988->33857 33989->33866 34028 4078ba 33990->34028 33993 4078ba _mbsnbcat 33994 40f5a3 RegOpenKeyExA 33993->33994 33995 40f5c3 RegQueryValueExA 33994->33995 33996 40f6d9 33994->33996 33997 40f6d0 RegCloseKey 33995->33997 33998 40f5f0 33995->33998 33996->33866 33997->33996 33998->33997 33999 40f675 33998->33999 34032 40466b _mbscpy 33998->34032 33999->33997 34033 4012ee strlen 33999->34033 34001 40f611 34003 404734 3 API calls 34001->34003 34008 40f616 34003->34008 34004 40f69e RegQueryValueExA 34004->33997 34005 40f6c1 34004->34005 34005->33997 34006 40f66a 34007 404785 FreeLibrary 34006->34007 34007->33999 34008->34006 34009 40f661 LocalFree 34008->34009 34010 40f645 memcpy 34008->34010 34009->34006 34010->34009 34034 40466b _mbscpy 34011->34034 34013 40f6fa 34014 4045db 7 API calls 34013->34014 34015 40f708 34014->34015 34016 404734 3 API calls 34015->34016 34021 40f7e2 34015->34021 34022 40f715 34016->34022 34017 404656 FreeLibrary 34018 40f7f1 34017->34018 34019 404785 FreeLibrary 34018->34019 34020 40f7fc 34019->34020 34020->33866 34021->34017 34022->34021 34023 40f797 WideCharToMultiByte 34022->34023 34024 40f7b8 strlen 34023->34024 34025 40f7d9 LocalFree 34023->34025 34024->34025 34026 40f7c8 _mbscpy 34024->34026 34025->34021 34026->34025 34027->33866 34029 4078e6 34028->34029 34030 4078c7 _mbsnbcat 34029->34030 34031 4078ea 34029->34031 34030->34029 34031->33993 34032->34001 34033->34004 34034->34013 34048 410a9c RegOpenKeyExA 34035->34048 34037 40381a 34037->33873 34046 4021b6 memset 34037->34046 34038 44458b 34038->34037 34049 410add RegQueryValueExA 34038->34049 34040 4445a4 34041 4445dc RegCloseKey 34040->34041 34050 410add RegQueryValueExA 34040->34050 34041->34037 34043 4445c1 34043->34041 34051 444879 30 API calls 34043->34051 34045 4445da 34045->34041 34046->33876 34047->33873 34048->34038 34049->34040 34050->34043 34051->34045 34052->33897 34054 4075c9 34053->34054 34055 4075bb _mbscat 34053->34055 34056 444212 34054->34056 34055->34054 34073 407e9d 34056->34073 34059 44424d 34060 444274 34059->34060 34061 444258 34059->34061 34081 407ef8 34059->34081 34062 407e9d 9 API calls 34060->34062 34094 444196 52 API calls 34061->34094 34069 4442a0 34062->34069 34064 407ef8 9 API calls 34064->34069 34065 4442ce 34091 407f90 34065->34091 34069->34064 34069->34065 34071 444212 65 API calls 34069->34071 34095 407e62 strcmp strcmp 34069->34095 34070 407f90 FindClose 34072 4442e4 34070->34072 34071->34069 34072->33921 34074 407f90 FindClose 34073->34074 34075 407eaa 34074->34075 34076 406f06 2 API calls 34075->34076 34077 407ebd strlen strlen 34076->34077 34078 407ee1 34077->34078 34079 407eea 34077->34079 34096 4070e3 strlen _mbscat _mbscpy _mbscat 34078->34096 34079->34059 34082 407f03 FindFirstFileA 34081->34082 34083 407f24 FindNextFileA 34081->34083 34084 407f3f 34082->34084 34085 407f46 strlen strlen 34083->34085 34086 407f3a 34083->34086 34084->34085 34089 407f7f 34084->34089 34087 407f76 34085->34087 34085->34089 34088 407f90 FindClose 34086->34088 34097 4070e3 strlen _mbscat _mbscpy _mbscat 34087->34097 34088->34084 34089->34059 34092 407fa3 34091->34092 34093 407f99 FindClose 34091->34093 34092->34070 34093->34092 34094->34059 34095->34069 34096->34079 34097->34089 34098->33521 34099->33525 34100->33532 34101->33531 34102->33538 34103->33537 34104->33530 34122 411853 RtlInitializeCriticalSection memset 34123 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34296 40a256 13 API calls 34298 432e5b 17 API calls 34300 43fa5a 20 API calls 34125 401060 41 API calls 34303 427260 CloseHandle memset memset 33194 410c68 FindResourceA 33195 410c81 SizeofResource 33194->33195 33196 410cae 33194->33196 33195->33196 33197 410c92 LoadResource 33195->33197 33197->33196 33198 410ca0 LockResource 33197->33198 33198->33196 34305 405e69 14 API calls 34130 433068 15 API calls __fprintf_l 34307 414a6d 18 API calls 34308 43fe6f 134 API calls 34132 424c6d 15 API calls __fprintf_l 34309 426741 19 API calls 34134 440c70 17 API calls 34135 443c71 44 API calls 34138 427c79 24 API calls 34312 416e7e memset __fprintf_l 34142 42800b 47 API calls 34143 425115 85 API calls __fprintf_l 34315 41960c 61 API calls 34144 43f40c 122 API calls __fprintf_l 34147 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34148 43f81a 20 API calls 34150 414c20 memset memset 34151 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34319 414625 18 API calls 34320 404225 modf 34321 403a26 strlen WriteFile 34323 40422a 12 API calls 34327 427632 memset memset memcpy 34328 40ca30 59 API calls 34329 404235 26 API calls 34152 42ec34 61 API calls __fprintf_l 34153 425115 76 API calls __fprintf_l 34330 425115 77 API calls __fprintf_l 34332 44223a 38 API calls 34159 43183c 112 API calls 34333 44b2c5 _onexit __dllonexit 34338 42a6d2 memcpy __allrem 34161 405cda 65 API calls 34346 43fedc 138 API calls 34347 4116e1 16 API calls __fprintf_l 34164 4244e6 19 API calls 34166 42e8e8 127 API calls __fprintf_l 34167 4118ee RtlLeaveCriticalSection 34352 43f6ec 22 API calls 34169 425115 119 API calls __fprintf_l 33184 410cf3 EnumResourceNamesA 34355 4492f0 memcpy memcpy 34357 43fafa 18 API calls 34359 4342f9 15 API calls __fprintf_l 34170 4144fd 19 API calls 34361 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34362 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34365 443a84 _mbscpy 34367 43f681 17 API calls 34173 404487 22 API calls 34369 415e8c 16 API calls __fprintf_l 34177 411893 RtlDeleteCriticalSection __fprintf_l 34178 41a492 42 API calls 34373 403e96 34 API calls 34374 410e98 memset SHGetPathFromIDList SendMessageA 34180 426741 109 API calls __fprintf_l 34181 4344a2 18 API calls 34182 4094a2 10 API calls 34377 4116a6 15 API calls __fprintf_l 34378 43f6a4 17 API calls 34379 440aa3 20 API calls 34381 427430 45 API calls 34185 4090b0 7 API calls 34186 4148b0 15 API calls 34188 4118b4 RtlEnterCriticalSection 34189 4014b7 CreateWindowExA 34190 40c8b8 19 API calls 34192 4118bf RtlTryEnterCriticalSection 34386 42434a 18 API calls __fprintf_l 34388 405f53 12 API calls 34200 43f956 59 API calls 34202 40955a 17 API calls 34203 428561 36 API calls 34204 409164 7 API calls 34392 404366 19 API calls 34396 40176c ExitProcess 34399 410777 42 API calls 34209 40dd7b 51 API calls 34210 425d7c 16 API calls __fprintf_l 34401 43f6f0 25 API calls 34402 42db01 22 API calls 34211 412905 15 API calls __fprintf_l 34403 403b04 54 API calls 34404 405f04 SetDlgItemTextA GetDlgItemTextA 34405 44b301 ??3@YAXPAX 34408 4120ea 14 API calls 3 library calls 34409 40bb0a 8 API calls 34411 413f11 strcmp 34215 434110 17 API calls __fprintf_l 34218 425115 108 API calls __fprintf_l 34412 444b11 _onexit 34220 425115 76 API calls __fprintf_l 34223 429d19 10 API calls 34415 444b1f __dllonexit 34416 409f20 _strcmpi 34225 42b927 31 API calls 34419 433f26 19 API calls __fprintf_l 34420 44b323 FreeLibrary 34421 427f25 46 API calls 34422 43ff2b 17 API calls 34423 43fb30 19 API calls 34232 414d36 16 API calls 34234 40ad38 7 API calls 34425 433b38 16 API calls __fprintf_l 34105 44b33b 34106 44b344 ??3@YAXPAX 34105->34106 34107 44b34b 34105->34107 34106->34107 34108 44b354 ??3@YAXPAX 34107->34108 34109 44b35b 34107->34109 34108->34109 34110 44b364 ??3@YAXPAX 34109->34110 34111 44b36b 34109->34111 34110->34111 34112 44b374 ??3@YAXPAX 34111->34112 34113 44b37b 34111->34113 34112->34113 34238 426741 21 API calls 34239 40c5c3 125 API calls 34241 43fdc5 17 API calls 34426 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34244 4161cb memcpy memcpy memcpy memcpy 33199 44b3cf 33200 44b3e6 33199->33200 33202 44b454 33199->33202 33200->33202 33206 44b40e 33200->33206 33203 44b405 33203->33202 33204 44b435 VirtualProtect 33203->33204 33204->33202 33205 44b444 VirtualProtect 33204->33205 33205->33202 33207 44b413 33206->33207 33209 44b454 33207->33209 33213 44b42b 33207->33213 33210 44b41c 33210->33209 33211 44b435 VirtualProtect 33210->33211 33211->33209 33212 44b444 VirtualProtect 33211->33212 33212->33209 33214 44b431 33213->33214 33215 44b435 VirtualProtect 33214->33215 33217 44b454 33214->33217 33216 44b444 VirtualProtect 33215->33216 33215->33217 33216->33217 34431 43ffc8 18 API calls 34245 4281cc 15 API calls __fprintf_l 34433 4383cc 110 API calls __fprintf_l 34246 4275d3 41 API calls 34434 4153d3 22 API calls __fprintf_l 34247 444dd7 _XcptFilter 34439 4013de 15 API calls 34441 425115 111 API calls __fprintf_l 34442 43f7db 18 API calls 34445 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34249 4335ee 16 API calls __fprintf_l 34447 429fef 11 API calls 34250 444deb _exit _c_exit 34448 40bbf0 138 API calls 34253 425115 79 API calls __fprintf_l 34452 437ffa 22 API calls 34257 4021ff 14 API calls 34258 43f5fc 149 API calls 34453 40e381 9 API calls 34260 405983 40 API calls 34261 42b186 27 API calls __fprintf_l 34262 427d86 76 API calls 34263 403585 20 API calls 34265 42e58e 18 API calls __fprintf_l 34268 425115 75 API calls __fprintf_l 34270 401592 8 API calls 33185 410b92 33188 410a6b 33185->33188 33187 410bb2 33189 410a77 33188->33189 33190 410a89 GetPrivateProfileIntA 33188->33190 33193 410983 memset _itoa WritePrivateProfileStringA 33189->33193 33190->33187 33192 410a84 33192->33187 33193->33192 34457 434395 16 API calls 34272 441d9c memcmp 34459 43f79b 119 API calls 34273 40c599 43 API calls 34460 426741 87 API calls 34277 4401a6 21 API calls 34279 426da6 memcpy memset memset memcpy 34280 4335a5 15 API calls 34282 4299ab memset memset memcpy memset memset 34283 40b1ab 8 API calls 34465 425115 76 API calls __fprintf_l 34469 4113b2 18 API calls 2 library calls 34473 40a3b8 memset sprintf SendMessageA 33218 410bbc 33221 4109cf 33218->33221 33222 4109dc 33221->33222 33223 410a23 memset GetPrivateProfileStringA 33222->33223 33224 4109ea memset 33222->33224 33229 407646 strlen 33223->33229 33234 4075cd sprintf memcpy 33224->33234 33227 410a0c WritePrivateProfileStringA 33228 410a65 33227->33228 33230 40765a 33229->33230 33232 40765c 33229->33232 33230->33228 33231 4076a3 33231->33228 33232->33231 33235 40737c strtoul 33232->33235 33234->33227 33235->33232 34285 40b5bf memset memset _mbsicmp

                                                                                                                              Control-flow Graph

                                                                                                                              • Executed
                                                                                                                              • Not Executed
                                                                                                                              control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0040832F
                                                                                                                              • memset.MSVCRT ref: 00408343
                                                                                                                              • memset.MSVCRT ref: 0040835F
                                                                                                                              • memset.MSVCRT ref: 00408376
                                                                                                                              • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                                                                                              • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                                                                                              • strlen.MSVCRT ref: 004083E9
                                                                                                                              • strlen.MSVCRT ref: 004083F8
                                                                                                                              • memcpy.MSVCRT(?,000000A3,00000010,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040840A
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000011.00000002.1580108470.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_17_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                                                                                              • String ID: 5$H$O$b$i$}$}
                                                                                                                              • API String ID: 1832431107-3760989150
                                                                                                                              • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                                                              • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                                                                                              • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                                                                                              • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65

                                                                                                                              Control-flow Graph

                                                                                                                              APIs
                                                                                                                              • memset.MSVCRT ref: 0044430B
                                                                                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                                                                                                • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                                                                                                • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                                                                                                • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                                                                                                • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                                                                                                • Part of subcall function 00410DBB: _mbscpy.MSVCRT(00000000,?,?,?,?,?,?,00000104), ref: 00410E87
                                                                                                                              • memset.MSVCRT ref: 00444379
                                                                                                                              • memset.MSVCRT ref: 00444394
                                                                                                                                • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                                                                                              • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                                                                                              • strlen.MSVCRT ref: 004443DB
                                                                                                                              • _strcmpi.MSVCRT ref: 00444401
                                                                                                                              Strings
                                                                                                                              • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                                                                                              • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                                                                                              • \Microsoft\Windows Mail, xrefs: 00444329
                                                                                                                              • Store Root, xrefs: 004443A5
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000011.00000002.1580108470.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_17_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                                                                                              • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                                                                                              • API String ID: 832325562-2578778931
                                                                                                                              • Opcode ID: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                                                                                              • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                                                                                              • Opcode Fuzzy Hash: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                                                                                              • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A
                                                                                                                              APIs
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000011.00000002.1580108470.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_17_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ??3@
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 613200358-0
                                                                                                                              • Opcode ID: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                                              • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                                                                                              • Opcode Fuzzy Hash: 0ad1635ea08d581da3d46e9cfe4a801b3f478eb4f35f0f6f88290fc2b5bda708
                                                                                                                              • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                                                                                              APIs
                                                                                                                                • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                                                                                                • Part of subcall function 00406FC7: _mbscpy.MSVCRT(?,?,?,00000000,0000003C,?,?,00401018,MS Sans Serif,0000000A,00000001), ref: 00407011
                                                                                                                              • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                                                                                              Strings
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000011.00000002.1580108470.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_17_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: CreateFontIndirect_mbscpymemset
                                                                                                                              • String ID: Arial
                                                                                                                              • API String ID: 3853255127-493054409
                                                                                                                              • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                                                                                              • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                                                                                              • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                                                                                              • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                                                                                              Memory Dump Source
                                                                                                                              • Source File: 00000011.00000002.1580108470.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                              Joe Sandbox IDA Plugin
                                                                                                                              • Snapshot File: hcaresult_17_2_400000_UNK_.jbxd
                                                                                                                              Similarity
                                                                                                                              • API ID: ProtectVirtual
                                                                                                                              • String ID:
                                                                                                                              • API String ID: 544645111-0
                                                                                                                              • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                              • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                                                                                              • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                                                                              • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA